In this issue: The 3rd place story of the Terminological Twists contest – and a list of honorable mentions. Plus, an invitation to the SoP25 kickoff and research server, and another teaching fellow spotlight.
DHCP
The midnight rain hammered against the windows of New Kenzai's Lower Wards as Inspector Hideo Mori hunted through the cramped apartment. Behind him, the tenant – a hollow-eyed woman with fading NexusMind implant scars – watched in silent resignation. "Network Access Commission records show three illegal network identities operating from this location," Hideo sighed, his augmented vision highlighting contraband hardware.
"Unlicensed brain computer interface activity is a Class Two connectivity violation."
"We can't afford the monthly Identity Licenses," she murmured. "My daughter needs specialized education software. Without multiple network identities, she can't access both school and therapy."
Hideo's regulation-issue CognaTech implant pinged with her profile. District 17. Widowed. One dependent. Income bracket: subsistence. He should report her immediately to Enforcement.
He closed the detection interface.
“I didn't find anything today. Make sure it stays that way.” he told the mother. Her daughter, lost in a therapy simulation, didn’t look up.
Ten years in the Network Access Commission, and Hideo no longer knew whether he was protecting the system – or protecting people from it.
His superior, Director Park, was waiting for him at precinct headquarters. "The Minister expects our quarterly connectivity violation quotas to increase by thirty percent," she informed him. "Corporate divisions are adjusting their host allocation algorithms again."
Before the Address Collapse, the problem had seemed minor. Early brain-computer interfaces had used unique network identities – addresses assigned through corporate Dynamic Host Configuration Protocol servers. These DHCP servers were the central databases that allocated and managed the unique network identities each neural implant required to function. Each corporation developed proprietary systems, incompatible with competitors but fighting for the same limited spectrum space.
"When did you get your first implant?" Park asked unexpectedly.
Hideo touched the geometric pattern on his temple. "CognaTech Analyst Series. Government subsidy program."
Park nodded. "ThoughtSpace Diplomat Model. Back when they still claimed unlimited address capacity."
The irony wasn't lost on him. The very corporations whose reckless competition had caused the Address Collapse now controlled the licensing and allocation of the world's most precious resource – unique network identities for BCI users. Before the Collapse, identity was abundant. Every neural interface – CognaTech, NexusMind, ThoughtSpace – promised unlimited growth. Each corporation built its own proprietary Dynamic Host Configuration Protocol servers to assign unique neural IDs. But the electromagnetic spectrum was finite, and the systems weren’t built to share.
Then came the Address Collapse. When overlapping signals overwhelmed the allocation systems, people lost access to essential knowledge externalized to their implants. Languages forgotten. Diagnoses lost. Professionals rendered incompetent overnight.
The corporations survived. They rebuilt with one lesson: scarcity was profitable.
Now, unique neural identities were leased, licensed, and locked – available to those who paid, and denied to those who couldn’t.
The next morning, Hideo noticed something strange on his internal monitor. Connectivity requests were spiking in Lower Ward Sectors 8 through 11 – but violations hadn’t increased.
He ran a diagnostic. Thousands of BCI interfaces were live. Legally unlicensed, yet not triggering alerts. Identities were resolving to something called ForkNet.
No one had authorized it. And yet – it worked.
He’d tracked the origin of the ForkNet signal to this location, expecting to find a rogue node. Now he found himself standing in a dim server alcove of a repurposed school library in Sector 12. It hummed softly, full of salvaged racks and mesh relays. Walking quietly through the stacks, he found a public terminal glowing with system stats and a hand-scrawled welcome sign taped to the wall:
“ForkNet Civic Node 27 – For medical, education, and municipal access. Entertainment identities limited to 2/hr per household. Contribute code? Ask for Jin.”
A voice came from behind a dusty partition.
“You’re either lost or inspecting. You don’t look lost.”
A wiry woman emerged – mid-30s, rolled sleeves, datapad in one hand, open relay node in the other.
“Jin,” she said, answering his unspoken question. “And you’re N.A.C., right? Or ex?”
“Still technically in,” Hideo replied. “This system... it’s allocating thousands of identities. How’s that possible given that we’ve already allocated all of the spectrum?”
Jin raised an eyebrow. “It’s just using it better.”
She gestured toward the relay logs. “You know what the old system did? Assigned identities permanently. Static leases. Corporate users hogged identities 24/7 – even when idle. And every sector had to reserve buffer capacity for premium redundancy.”
“And ForkNet doesn’t?”
“No. Our protocol reclaims identities the moment they're unused. They expire like session tokens – auto-refreshable. Think just-in-time addressing, not permanent entitlement.”
“But the physical spectrum – ” Hideo began.
“Still finite, yes. But ForkNet offloads anything it can to local mesh. Your kid’s therapy session? She gets a local cache unless the program updates. Educational modules rotate on a predictable cycle. And we prioritize based on declared needs. Public health beats immersive dating sims. Simple math.”
Hideo folded his arms. “What about fairness? Doesn’t that just shift control from corporations to local bias?”
Jin laughed softly. “Maybe. But here, community rules are auditable. We elect stewards for resource allocation thresholds. Anyone can propose changes. The old system had zero accountability – unless you count shareholder reports.”
He looked at a screen showing live activity across the mesh. Active identities blinked like a constellation.
“You're scaling.”
“We didn’t plan to. It’s just… the rule’s better. More fair. More flexible. And once people see that – there’s no unseeing it.”
Hideo said nothing.
Over the next few days, he quietly began rerouting low-level, non-sensitive logs to public forums used by ForkNet stewards: outage patterns, bandwidth inefficiencies, abandoned relay nodes.
“It’s public record,” he told himself. “Just helping them see it.”
He told no one.
By week’s end, ForkNet had spread to fourteen sectors. Word of mouth, shared software bundles, radio transfer from rooftop repeaters.
The corporations scrambled – Hideo saw the firmware alerts flood the Commission’s internal board.
ForkNet’s dev logs surged in response. He watched the commits roll in from relay contributors he didn’t recognize, each patch marked with public keys and minimal commentary. The speed was staggering.
Park stormed into the monitor room, startling him. He calmed himself with the knowledge that he wasn’t doing anything wrong. And she wouldn’t read what was on his screen.
“Your district is losing control. Thousands of unlicensed users, and no enforcement? You’re either complicit or incompetent.”
Hideo kept himself from flinching. “We’re not losing control. We’re witnessing a system that works better than ours.”
Later that afternoon, needing air, he found himself at the observation deck that separated Upper City from the administrative sectors. The lone figure briskly crossing the plaza below pinged Hideo’s visual implant even from seven floors up. The man’s implant status display – visible only to Commission inspectors – showed seven active network identities: business, entertainment, recreation, social, private, enhanced cognitive, and an unlabeled “premium” identity. All authorized. All legal.
Seven identities for one man. In the Lower Wards, entire families shared one. He didn’t need a dashboard to confirm the pattern. He’d seen the consequences on every block of the Lower Wards.
As the man disappeared behind the next checkpoint, a slogan from Hideo’s training days surfaced uninvited. He could still hear Instructor Chen’s dry voice:
“Trainees... the original DHCP system was designed for equal distribution based on need…”
The next day, back at his station, Hideo skimmed ForkNet forums between diagnostics. A new post caught his eye.
They had posted a public call for credentials to access decommissioned NAC nodes – old infrastructure too remote, unstable, or forgotten to be claimed through official channels. And those credentials had begun leaking in. Inspectors, engineers, clerks. Some left names. Most didn’t.
Hideo added his own line to the growing thread: a relay map for Sectors 14 through 19, plus a decommissioned subnet index no one had touched in years. Alongside it, a note:
“Most of these nodes were never formally retired. Just left to rot. You’ll need a reverse handshake on the older protocols – they still expect legacy pings.”
Zora, steward at Node 27, scrolled through the growing packet stream.
“That’s not the only new map,” Jin said, scanning the latest hashes. “Two more maps just came in from Sector 3 and the old hospital grid.”
Zora nodded.
“They can’t patch this. It’s not one break-in. It’s entropy.”
Jin smiled. “It’s what happens when enough people stop pretending the old rules work.”
In week three, Park’s warning took form. Hideo watched enforcement feeds stream in – drones descending on clinics in Sector 5, routers ripped offline mid-session. Corporate spokespeople labeled ForkNet a “pirate infrastructure.”
And yet, every time a node went dark, Hideo saw, three more blinked online.
When a clinic lost service in Sector 5, its configuration was restored in Sector 6 through a shared hash. When the Upper City tried to firewall ForkNet packets, a coalition of municipal sysadmins rerouted them through public sanitation networks.
A new bulletin lit up Hideo’s inbox: twelve cities had joined something called the Open Allocation Accord, formally adopting ForkNet for public infrastructure.
That afternoon, a joint press release from CognaTech and NexusMind blinked into his display: “Unauthorized spectrum use. Potentially unstable.” Hideo archived it with a tap.
By then, he could already see it was too late for the corporations to regroup. ForkNet activity logs showed mass migrations – hospitals, schools, municipal services – rerouting their backbone systems to the open protocol. The Commission’s dashboards lit up with anomalies no one could explain away. Uptime was rising. Dropout rates were falling. In ForkNet zones, therapy adherence was climbing for the first time in years.
In ForkNet’s public forums, users were posting screenshots of school access restored.
By the end of the week, NexusMind was running full-page ads warning of “open access vulnerabilities.” ThoughtSpace announced a proprietary “security-enhanced” protocol fork.
Hideo opened the patch log. He could see every new commit: changes logged, nodes versioned, keys verified. The protocol wasn’t a black box anymore. It wasn’t even a product. It was a public good.
The next day he didn’t even open the old dashboards, just watched the usage metrics. Adoption wasn’t stalling. People were done being customers of their own cognition.
Hideo didn’t mark the moment the system flipped. There was no announcement. No ceremony. Just a slow quieting of the old alerts – and the absence of new ones.
He took a job running civic infrastructure for a community clinic in Sector 11. The title didn’t matter. The network worked. People still called him “Inspector,” even though he hadn’t worn the uniform in months.
Hideo sat at the terminal in the clinic’s infrastructure alcove, reviewing spectrum logs from the outer mesh. Uptime was holding steady. Traffic was balancing without intervention.
Behind him, Zora leaned against the doorway, watching the same graphs on her handheld. He could hear her breathing over the hum of the monitors.
“We didn’t win,” he said. “But it’s better.”
She nodded. “It’s enough. For now.”
Hideo looked out the clinic window. On the horizon, distant ForkNet nodes blinked through the evening haze – quiet, steady, multiplying.
Get the AI-Writing Protocol for this story here. Interesting in AI writing experiments? Join the SoP Discord.
The Terminological Twists Shortlist
A big thank you to everyone who entered into the Terminological Twists protocol fiction contest. With a tidy 50 stories total, the competition was intense. We would have loved to provide detailed feedback to entrants, but chose to prioritize the review deadline set out. Ideas for future contests are already bubbling their way into our periphery, both in terms of new themes and the prospect of using community-based judging protocols.
The editorial philosophy of Protocolized is science fiction over fantasy. We believe that the world needs stories about strange new rules more than it needs stories about special people. That the future is complicated and full of traffic jams, but that it’s for everyone. Each finalist of Terminological Twists satisfied the contest’s central challenge: make a story from an engineering concept. And every submission raised the bar for protocol fiction as a budding subgenre of sci-fi. Well done. We would also like to congratulate, in no particular order, the other shortlisted writers:
Air Gap by Jack Lord
Time to Die by Ralph Witherall
Read-Only by Alexandre See
Fine Print by Griffin Stinson-Schroff
CHORUS PROTOPIA by Garance Solaires
The Proof of Europans-off-Jupiter’s Stake by Simon de la Rouviere
Proof of Personhood by Jordan Olmstead
Summer is Here
We invite you to join our kickoff for Summer of Protocols 2025, next Thursday, May 15th at 8am PDT! The event will be livestreamed on our YouTube channel (Catch issue #20 for a link, subscribe for a reminder). We also welcome the community to join via Zoom for a full experience – more instructions below.
Wondering if you should attend? First of all, we highly recommend for leisure researchers to join – it will be a great opportunity to meet some peers. Second, this year’s program has three tracks: education, scene-making, and technical foundations. So if you’re a teacher, writer, researcher, artist, engineer or analyst – join for a short talk and some go deep on the track that’s most interesting to you.
To get invited to the SoP25 Kickoff on Zoom, head to the SoP Discord server to introduce yourself and what you’re working on! Already there? No need to do anything – we’ll get you an invite.
SoP25 Spotlight
In each new issue of Protocolized, leading up to Protocol Worlds at Edge Esmeralda, we’ll introduce one of this year’s teaching fellows.
Helena Rong is an Assistant Professor Faculty Fellow of Interactive Media Business (IMB) at NYU Shanghai and affiliated with the Program on Creativity + Innovation (PCI). Her research operates at the nexus of urban studies, design, technology studies, data science, and public policy. She focuses on leveraging innovative technologies and methodologies to foster social impact in urban decision-making, aligning incentives across diverse stakeholders to maximize the societal benefits of technological innovation, and developing adaptive urban interfaces that respond to evolving community needs. Rong holds a PhD in Urban Planning, a Master of Science in Architecture and Urbanism, and a Bachelor of Architecture.
Tentative Course: Designing Trust – Protocols, Society, and Web 3.0
Next Week’s Protocol Town Hall
Join us next week for an 101-style presentation on the last two year’s of protocol research, featuring common terms, a couple of case studies, and guidance for how to integrate protocol thinking into your practice.
Tap on the thumbnail above to get a reminder via YouTube.
⬇️ Last Week’s Issue ⬇️
EGREGORETEX™️
In this issue: A Canadian design lab navigates the risks – and opportunities – posed by the widespread adoption of brain-computer interfaces in a world inhabited by metamegafauna. Also, an important update on tomorrow’s guest talk, a fresh hard tech horizon, and another SoP25 spotlight.
Great story! Love the emerging second layer protocol based on ephemeral identities aggregated at the client level. Very stateless micro services - although state has to go somewhere and causes problems wherever it ends up.
Did wonder “why didn’t they just NAT into private address spaces” but maybe that it’s on spectrum enforces the scarcity.