The Infrastructure Layer of Freedom
Money, Identity & Digital Control
“The feudal lord determined your right to exist on the land. The digital state determines your right to exist in the economy.”
Feudalism Never Left. It Upgraded Its Tools
Under the feudal system, your right to occupy land required the lord’s permission. You were not a tenant by contract: you were a subject by birth. Under Louis XIV, even the lords were possessions of the crown. The modern era appeared to break this pattern: monarchies were abolished, land was redistributed, rights were codified into constitutions that no individual could override by fiat.
The democratization of property was real. But it was incomplete. Taxation remained, modernized from tribute into a coordination mechanism, but structurally similar: pay or face state force. That tension is manageable so long as the governed have meaningful input into how the funds are used. What is not manageable is the emergence of a layer beneath property: the digital infrastructure of money, identity, and mobility, and the quiet re-centralization of control over that layer.
The arc is not difficult to trace:
Feudal Era
Existence requires lord’s permission. You are property, not a person with rights.
Modern Era
Property democratized. Monarchies abolished. Rights codified, but tax as entry fee remains, and legitimacy of that fee is contested by design.
Digital Era
The layer below property, covering digital money, digital identity, and digital mobility, is being re-centralized. The question of who controls the infrastructure is the question of who determines participation.
Feudal Era
Existence requires lord’s permission. You are property, not a person with rights.
Modern Era
Property democratized. Monarchies abolished. Rights codified, but tax as entry fee remains, and legitimacy of that fee is contested by design.
Digital Era
The layer below property, covering digital money, digital identity, and digital mobility, is being re-centralized. The question of who controls the infrastructure is the question of who determines participation.
← now
Tax Was Originally a Fee for Breathing
The original function of tribute was unambiguous: pay or be killed. Modernized through centuries of constitutional development, taxation became: pay or be imprisoned. This is not an argument against taxation. Coordination at the scale of millions of individuals requires a mechanism for collective resource allocation: that mechanism cannot be purely voluntary without collapsing the commons. The argument is about what determines the legitimacy of the fee. Coercion is not the problem. Coercion without contestability is.
The standard liberal answer is consent via representative democracy: you voted for a party, the party chose a fiscal structure. But the DDR and Soviet Russia demonstrate that the performance of consent, including elections, constitutions, and ministries, is separable from its substance. What matters is not that an election occurred. What matters is whether the governed have meaningful, contestable input into how funds are spent, not just at the party level, but at the line-item level. A voter who chose a party for its healthcare policy has no clean mechanism to contest that same party’s military spending. The bundling of fiscal decisions into partisan packages is not a technical inevitability. It is a design choice, one that concentrates fiscal authority at the party level and removes it from the citizen level.
The legitimacy of taxation depends on two conditions: that the governed can contest how funds are allocated, and that the contestation mechanism has teeth, meaning a procedural requirement that forces a response, not a suggestion that can be ignored. Equiplurism addresses this through its proposal mechanism: section-level challenges to spending structures with mandatory deliberation timelines. This is not radical. Swiss cantonal referenda on budget items and Porto Alegre’s participatory budgeting (which involved 50,000 citizens annually in line-item fiscal decisions) demonstrate that direct fiscal contestability is technically and politically viable. What remains is a design problem: what accountability infrastructure would make the fee legitimate, rather than merely legal?
Digital Money as the New Enclosure
China’s digital yuan (e-CNY) is not a speculative future: it is operational (PBOC, 2022). The structural features already deployed or technically available define a new class of monetary instrument:
- Programmable restrictions: money can be limited by merchant category, geography, or time window. Not what you choose to spend it on, but what you are permitted to spend it on.
- Expiration dates: pilot programs have tested monthly expiry to force spending velocity, functionally converting savings into a temporary allocation.
- Full transaction surveillance: every unit traceable by the issuing state, with no privacy mode and no technical barrier to retroactive audit.
- Social linkage potential: the architecture is compatible with social credit integration: spending blocked or restricted based on behavioral scoring.
The dystopian scenario is not science fiction. If your CBDC wallet expires monthly, who can save? If geofenced currency and geofenced vehicles operate in combination (already technically feasible), then flight becomes a government permission. The exit option that has historically constrained state power disappears, not through prohibition but through infrastructure architecture.
The EU’s approach under eIDAS 2.0 is structurally different but raises parallel concerns. Mandatory digital identity wallets for EU citizens by 2026. Single sign-on with government services. The ETSI standards allow selective disclosure zero-knowledge-proof compatible, minimal data exposure by design. That is the good version. Centralized implementation risks remain: single point of failure, mission creep, scope expansion through secondary legislation that the original mandate did not anticipate.
See also: Atlantic Council CBDC Tracker (134 countries in active CBDC development or deployment as of 2024) and BIS working paper on CBDC risks.
Web3: Anonymity as Defense, Anonymity as Cover
Web3 emerged partly as a technical response to exactly the centralization problem described above. Its contributions to the structural problem are genuine:
What it gets right
- W3C DID self-sovereign identity: you control your credential, no central operator
- Zero-knowledge proofs prove eligibility without revealing underlying data
- Non-custodial wallets: no bank can freeze assets unilaterally
- Censorship-resistant transactions: functional for political dissidents in closed systems
- Smart contracts: programmable agreements without a trusted third party intermediary
What it doesn’t solve
- On-ramps and off-ramps are regulated: KYC requirements at exchanges re-introduce the state
- Physical economic life still operates in state currency: volatility makes Web3 impractical for ordinary use
- Privacy tools (Tornado Cash) are regulated or banned in multiple jurisdictions
- Pseudonymity ≠ anonymity: blockchain forensics firms routinely de-anonymize on-chain activity
The real tension is a dual-use problem: Web3’s privacy architecture genuinely protects dissidents and minorities operating under authoritarian systems. The same architecture protects money laundering and sanctions evasion at scale. This is not a technical problem with a technical solution. It requires structural answers that distinguish between the legitimate use of privacy tools and their exploitation, without collapsing the privacy architecture entirely. Banning Tornado Cash does not eliminate money laundering. It eliminates the legitimate uses and leaves the criminal uses to migrate elsewhere.
What Equiplurism Requires
Constitutional Parity for Digital Money
Any CBDC must be subject to the same constitutional constraints as physical currency. No programmable restrictions on use that would be illegal for cash. Geographic lockdown of financial instruments is a structural rights violation under Axiom 1.
No Expiration on Store of Value
Expiration dates on money are a coercion mechanism, not a monetary policy tool. A currency that cannot be saved cannot be used to exit. The ability to accumulate capital, however modestly, is the material precondition for independence.
Self-Sovereign Identity as Baseline
W3C DID-based identity as the required standard. Zero-knowledge proofs for mandatory disclosures. No centralized identity registry without distributed audit. The surveillance state is not defeated by refusing ID. It is defeated by making the ID architecture cryptographically resistant to surveillance by design.
Distributed Monetary Governance
Monetary policy decisions require approval from multiple parties, not unilateral central bank or state control. Concentration of control over mobility and economic layers is prohibited at the same level as political monopoly Axiom 3
On tax legitimacy specifically: taxation is legitimate coordination, not a rights fee. The condition for legitimacy is not a signature on a social contract that predates the signatory by generations. It is that the governed have meaningful, procedurally enforced input into how collected funds are allocated, not just which party holds office, but how specific spending structures are designed and contested.
This distinction matters because it shifts the axis of the argument. The libertarian objection to taxation is fundamentally about consent. Equiplurism accepts the coordination argument for taxation while requiring that the coordination mechanism be genuinely participatory, not performatively so.
How These Systems Should Evolve
The architecture of monetary and identity systems should move in one direction: toward hybrid models that separate macro stability from individual sovereignty. These are separable problems. They have been architecturally conflated.
Hybrid monetary architecture
State-issued CBDC for macro stability and large-scale coordination. Private and Web3 rails for individual sovereignty. Neither layer has exclusive access to the other’s functions. The state does not control the savings layer; the private layer does not undermine macro policy. Separation of layers is not fragmentation. It is the precondition for both.
ZK-proof based compliance
Prove tax compliance without revealing transaction details. Prove eligibility for benefits without revealing identity. The technology for this exists. The institutional will to deploy it does not.
Monetary rights as human rights
Cross-border CBDC interoperability with baseline protections. No state may unilaterally freeze the assets of a person who has not been convicted of a crime. Digital identity as a human right: you cannot be denied a digital identity, and no entity can revoke it unilaterally.
The “last to leave” problem
The exit option has historically constrained state power. Those who can leave set a floor on how abusive governance can become before it loses its population. If exit requires a state-issued digital wallet, a geofenced vehicle, and a registered identity, all simultaneously, then the exit option has been technically eliminated without a single law explicitly prohibiting it.Axiom 3 addresses this directly: concentration of control over the mobility and economic layers is prohibited at the same level as political monopoly.
See also: Structural Freedom & SSI → · Freedom: Exit as system KPI → · Beings: Intelligence Architectures →
Sources & References
- Atlantic Council CBDC Tracker, global deployment status
- BIS Working Paper: Risks of CBDCs
- PBOC Theories and Practice of China’s e-CNY (2022)
- EUR-Lex Regulation (EU) 2024/1183 (eIDAS 2.0)
- W3C Decentralized Identifiers (DID) Core Specification
- Ethereum Foundation Zero-Knowledge Proofs Explainer
- Chainalysis Blockchain Forensics
- CoinDesk Tornado Cash: Roman Storm Case Explained (2024)