Securing Digital Rights for Communities (Game Theory and Governance of Scalable Blockchains for Use in Digital Network States)
Chapter 11. De-Governance
Where Consensus Meets Human Judgment
Audio Version:
Introduction
Blockchains inevitably require a consensus mechanism some form of governance to decide how data is validated, how upgrades occur, and who ultimately exerts control. Yet many projects misunderstand governance, defaulting to simplistic models that invite centralisation. This chapter examines three major paradigms Proof-of-Work, Proof-of-Stake, and Delegated Proof-of-Stake while highlighting how true decentralisation for communities and social systems requires more refined “parameterised” voting systems. We then show why neutral, ownerless blockchains must avoid founders, VC's, and pre-mines, and how community-driven governance can act as a counterbalance against takeover attempts and regulatory threats.
11.1. Governance Is Unavoidable
Why We Need It
No matter how “hands-off” a blockchain claims to be, someone must decide on software patches, security fixes, and emergency measures. Even “code-is-law” projects have humans writing and changing that code. When attackers strike or improvements are needed, effective governance enables swift, community-backed decisions rather than letting one party (like a founder or corporation) take over.
De-Governance?
Some blockchains say they have “no governance” or “minimal governance,” but that usually means governance is hidden or de facto centralised. True decentralisation conducts its governance out in the open and spreads it among stakeholders, rather than pretending it can be removed entirely, or conducted on a separate, web2 layer such as Reddit, which is often the case in existing blockchain systems.
11.2. Proof-of-Work (PoW)
Otherwise Known as Infrastructure Voting
In PoW, computational power (energy plus hardware) is the mechanism to secure the chain. Nodes around the world expend resources to compete for block rewards, effectively “voting” with their electricity bills.
Security vs. limitations:
Advantages of Proof of Work:
- Highly resistant to censorship
If enough miners operate globally it is difficult to fake mining since you need real hardware and energy expenditures. - Good for large amounts of permissionless liquidity and collateral. It allows everyone access to liquidity as long as they can afford the high fee.
- Global Infrastructure and High Security: The sheer capital required to replicate or outvote the network discourages attacks.
- Censorship Resistance: Dispersed mining pools and hardware prevent easy shutdown or forced compliance (in theory).
Disadvantages of Proof of Work:
- Centralising Tendencies
Over time, mining typically coalesces into a handful of pools (e.g., two or three major ones). Smaller participants must join these pools, eliminating the grass-roots, democratic element. - Limited Governance Flexibility
PoW is primarily designed to confirm transactions and maintain an immutable ledger. It does not inherently solve on-chain governance it cannot easily upgrade network rules or incorporate dynamic features for social media or consensus-driven proposals. - Scaling Constraints
Storing large volumes of data or performing fast transactions under PoW is cumbersome. Blocks with high throughput require more computational and energy overhead. Miners rarely want to expand block sizes indefinitely because it increases node storage demands and can hamper decentralisation. - Exclusive to Elites Only
Exclusive to those elites who can afford the fee, by design. It must be high fee to preserve the security
budget, since there is no other way to incentivise this with the dominant PoW chain at present (Bitcoin) having a capped supply. - Centralised Mining
Mining typically centralises into large pools or in it being expensive to operate a validator, since everyday people can’t afford specialized infrastructure. - Validators Not Accountable to Community
The validators are not accountable to the community, since they vote themselves into consensus with their own hardware power. - 51% Attacks Cost Money to Defend
During a money attack (51% hashing rate) takeover, there is no way to fork away from the attacker without it costing the community money since the defender must out-compete the attacker and gain back 51% of the hashing power on the new fork. You also cannot identify the attacker since you cannot see who they are due to the fact that there is no on-chain reputation system.
Replicating Bitcoin’s Scale
Bitcoin’s success in censorship resistance rests on a massive, expensive global mining network. Starting a new PoW chain at that scale is nearly impossible today, because you’d have to attract billions in hardware investment. Smaller PoW chains can be 51% attacked more easily by the main chain, unless they can convince PoW miners to switch to their own hashing algorithm. There is therefore, most likely only one winner in PoW mining.
Using the most expensive hardware, with the most resource intensive hashing algorithm to secure the network is the most logical solution since it makes the network more expensive to attack. If an alternative fork attempts to go to a cheaper hashing algorithm, then the dominant chain can 51% attack the new fork if it was seen as a threat.
11.2.1 Mitigations for Proof of Work Attacks
- Non Custodial Layer 2 Options
Make sure Layer 2's are non custodial, since Layer 1 fees will be so high, there will be a tendency for exchanges and Layer 2 systems to custodialise funds. With enough custodial funds collaborating and unsuspecting people operating on them, it is possible for the custodial stakes to fork the original chain and dictate which version of Bitcoin will be accepted on their custodial systems.
11.2.2 Longer Term Accumulation Attacks on a PoW Chain
In a Proof of Work chain, a group of people who collaborate with a large amount of the total stake can collude with other major stakeholders, exchanges and businesses to create a new fork of the original chain and dictate which version (their version during an attack) that the on and off ramps will use, excluding the original (and legitimate fork). This can be more easily defended against on DPoS chains where human readable, named accounts that have built reputation via long term stake distribution and voting mechanisms can form a popular, community fork made up of reputed community members, regardless of their total stake size, around which the legitimate community can gather to continue on away from the attackers.
Conclusion (PoW): Proof of Work is a powerful security solution analogous to a “Panzer tank” but is less flexible and not easily repurposed for rapid governance, high-volume social use, or swift on-chain decision-making.
11.2.3 Attacking the Largest Bitcoin Block Producers
There are only a few large block producers on Bitcoin where most of the hashing power that secures the chain is centred. Coordinating governments could therefore physically cut the honest actors of those block producers off from the network, write legislation that prohibits them, or force them to operate under mining licenses, while setting up competing, government compliant block producers. Small “free” block producers could then try to “pop up”, but the larger governments would potentially overpower them.
11.2.4 Why We Call PoW "Infrastructure Voting"
This system should also be referred to as Infrastructure Voting, since the community recognises the longest chain when forks split the consensus. The longest chain is normally formed only by the chain which has been able to deploy the most infrastructure and thereby the most computing power to secure the consensus. Eventually infrastructure operation becomes expensive and resource intensive, making it economically viable only to those who have the money to invest in large amounts of expensive equipment. Such a system is only therefore able to account for liquidity and collateral, but not the social nuances of communities and social governance.
11.3. Proof-of-Stake (PoS)
11.3.1 Otherwise Known as Un-Parameterised Coin Voting
In basic PoS, whoever holds the most tokens wields the most influence. Stakeholders “lock” coins to validate transactions or produce blocks. Over time, large holders typically become even larger, leading to potential centralisation around wealthy interests.
11.3.2 The Fundamental Idea
Pure Proof of Stake (PoS) equates the proportion of tokens owned to governance power. Each stakeholder’s influence stems solely from the size of their balance. On paper, this creates a “skin-in-the-game” scenario: attacking the network undermines the value of one’s own stake.
However, early real-world implementations of PoS often introduced no parameters; no rules to prevent or discourage centralising forces. Large token holders or custodial services (exchanges, pooling services) quickly dominate, rendering the chain effectively controlled by a few “whales.”
This makes PoS systems excellent for financial services and liquidity systems where there is no social nuance involved in making decisions. Money and yield are generally non political and do not directly affect culture and social systems. Having the top validators in a finance system those who have the most to lose is one of the best ways to make sure your financial yield stays neutral.
(For further information on PoS and UPCV see Annex I – Glossary of Terms and Acronyms).
11.3.3 Why Un-Parameterised Coin Voting (PoS) Tends to centralise
In “Un-Parameterised Coin Voting (UPCV),” staking pools become inevitable:
Pooling of User Funds
The paradox with PoS is that you do not want too many validators as it can necessarily overburden the network and validators with small stakes are not really contributing to the security of the block production process with such small skin in the game. Therefore, often a minimum staking for governance threshold is set where if users stake above this amount they can earn when mining in the network (on Ethereum for example, this limit is set to 32ETH or $80K as of time of writing). However this results in people who want to run validators but don’t have enough to stake and so they pool their stakes into mining pools in order to share mining rewards.Most small participants lack enough tokens or technical know-how to run a validator node. They deposit stake into large third-party pools, which then yield better returns through economies of scale. Eventually and naturally, one to three major pools emerge, dominating block production, making the chain far more centralised than it appears.
Staking to Vote Delays
Without mandatory waiting periods, exchanges can temporarily “power up” user funds to vote in governance without users’ explicit consent. This has happened historically on certain chains, allowing custodian-led attacks or hostile takeovers (for further information on Powering up and Powering Down see Annex I – Glossary of Terms and Acronyms). Both DPos and PoS chains must have lock up delays for governance voting when staking to vote in order to defend against custodial stake attacks by entities such as centralised exchanges. The same issues are true for hostile attackers with large stakes. The idea is that the delay for voting after staking to vote (often 1 month) allows the community time to determine if the entity staking significant amounts is hostile and take action to protect the chain.Long Lock-ups
PoS (and DPoS) chains that do not have long lock ups when staking to vote often are susceptible to takeover by those holding custodial stakes (such as large, centralised exchanges). This is because exchanges can use custodial, user funds that are deposited into their accounts for trading and stake them for short periods of time without the permission of the depositors in order to take control of the chain’s governance and carry out hostile takeover. There have been several instances of this occurring in the past and so this threat is very real. Exchanges can do this since they can use the short un-staking period to make depositors whole in a timely manner when they request to withdraw funds. With long lock up periods for governance, this type of attack is not possible. PoS chains that are not susceptible to this type of attack typically have 3 to 6 months lock ups for governance.
“Coin voting is amazing if parameterised correctly. UPCV (Un- Parameterised Coin Voting) is lazy: it centralises over time into massive staking pools that overshadow smaller individual stakeholders.”
11.3.4 Mitigations for PoS Attacks
In order to avoid centralising governance issues, users should be encouraged not to stake with large staking validators or exchanges and be informed on which forks that suit them ideologically in order to follow their best suited fork.
11.3.5 Danger of Centralisation
- Staking Pools Dominate: Users often stake through third-party pools (like lido Finance), which ends up resembling the pool dominance also seen in PoW mining.
- VC & Founder Advantage: Early insiders can hoard tokens cheaply, keeping governance under their control.
- High Fees, Slow Upgrades: Many proof-of-stake chains aim for “general-purpose” Layer-1 smart contracts processing not only transactions but also computation on the Layer 1. This often results in high fees to reward infrastructure operators and stakers, making day-to-day usage expensive and discouraging broad adoption.
- Fat Nodes: A common occurrence in blockchain where the operation of smart contract processing as well as transaction processing on all base layer nodes becomes the norm. This makes the standard on the chain the operation of large, heavy duty and therefore expensive, unprofitable nodes that have to be kept afloat by constantly minting new tokens (inflation) due to the chain charging artificially low fee transactions on the base layer. The point here is that most such chain validators are uncompetitive and as they scale, they have to charge proportionately higher fees which over time cannot compete against systems that keep the base layer simple and light weight and move the computation layer to the Layer 2.
11.3.6 The Necessity of Guardrails
To avoid these pitfalls, PoS (UPCV) needs constraints, time-locks, minimum validator counts, voting delays, and so forth. We’ll see in the next section how Delegated Proof of Stake introduces precisely these guardrails to preserve the core “skin-in-the-game” feature while preventing consolidation into a handful of players.
11.3.7 Why We Call This "Un-Parameterised Coin Voting (UPCV)"
The method should also be referred to as Un-Parameterised Coin Voting (UPCV) since consensus is set by stakeholders voting with their coins meaning the largest stake holder has the biggest influence on the governance of the chain, hence there are no parameters in place to prevent a “rich get richer” scenario or to incorporate any social nuance of the community into the governance system.
11.4. Delegated Proof-of-Stake (DPoS) or Parameterised Coin Voting (PCV)
Otherwise Known as Parameterised Coin Voting (PCV)
DPoS starts with the premise: Staked coins = skin in the game. Then it adds parameters to prevent the pitfalls of raw PoS.
Delegated Proof of Stake can be considered an evolution of coin voting. Rather than letting raw stake automatically produce blocks:
- Named Validators
Stakeholders elect a fixed number of block producers, commonly called “witnesses” or “validators.” They are elected by the community using stake weighted voting (not one account one vote) and the top 20 or 21 block producers are paid for securing the network and upholding consensus. - Parameter Constraints
- Stake Lock-ups: Voters must stake tokens for a certain duration (e.g., 13 weeks). This prevents custodial wallets (such as exchange accounts holding users funds) from freely flipping user deposits into governance attacks. This process is known as Powering Up on some DPoS chains. Un-staking is known as powering down (for further information see Annex I – Glossary of Terms and Acronyms).
- Voting Delay: The chain might enforce a waiting period, say, one month before newly staked tokens can actually cast votes. This gives the community time to spot potential aggressors powering up a suspiciously large stake.
- Minimum Validator Requirement: The protocol guarantees multiple active validators, e.g., 20 block producers instead of an unlimited or undefined number. The chain can then sustain high throughput (thanks to a limited set of block producers) but remain decentralised enough to prevent collusion.
- Community Accountability: Stakeholders can remove validators at any time if they fail or collude. This fosters an ongoing “immune system” against malicious actors.
- Many Elected Equally weighted Top Validators: A top 20 elected validator set are more akin to having 20 equally weighted staking pools, even though each validator can have a different stake size in the ecosystem. They are elected in and so, for example, the largest account in the ecosystem at best has equal influence to the other 19 elected validators, even though their stakes are likely much smaller in comparison. This is in contrast to most chains using other consensus mechanisms that cumulate into 2-3 more centralised staking pools staking custodial stake on behalf of users and thus becoming over bearing forces on governance, while having provided no value to earn such a position.
11.4.1 Community Reputation and Named Accounts
A key feature of many DPoS systems is human-readable account names. This fosters a social aspect:
- Users Earn Reputations: Engaging in core development, running reliable infrastructure, or promoting the ecosystem can earn community trust, which translates into witness votes.
- Social/Community-Driven: Instead of the “richest account wins,” smaller players can rally around a witness candidate who has proven contributions but may not hold much stake personally. The entire system becomes more social and less purely financial as a result.
11.4.2 Advantages Over Basic PoS
- Battle-Tested Against Exchange Attacks
By requiring lock-up periods or a “period of time before vote,” the chain can detect malicious power-ups (like large exchanges powering up user deposits to sway governance). - Faster and Cheaper Transactions With a limited, predictable set of elected block producers, block times can be short, fees minimal or non-existent, which is critical for social networks or content-based Dapps.
- Continuous Distribution
Many DPoS systems reward users for content creation or running infrastructure, enabling them to acquire stake organically. This counters a “rich-get-richer” scenario. - Faster Block Production:
A fixed number of well-equipped witnesses can confirm transactions quickly. - Neutral Base Layer:
Protocol-level parameters (lock-up times, voting delays) prevent centralised takeovers. - Human Element:
Probably the most important distinction is that reputable people with smaller stakes, or even no stake at all can rise to validator positions without having the largest stake, because the community can delegate tokens to them or vote for them. This adds social nuance to the raw coin-vote model where they user or mining pool with the largest stake is the most influential in the network. - No Minimum Staking Threshold:
In contrast to PoS, DPoS does not need a minimum staking threshold for voting in governance. Instead witnesses are ordered in relevance to the block production process based on the amount of stake weighted voting they receive from the wider community. Since the chain dedicates a certain amount of newly minted tokens to pay witnesses, there is a limited amount of them that can operate profitably. After this limit witnesses operate at a loss or voluntarily. It is up to the chain to make sure it is as cheap as possible for a community member to run a node in order to maximise the number of back up witnesses. However, the advantage of this is that it makes the staking pools that are so common in PoS pointless and ensures that the chain forms into a minimum sized top witness set of 20 each with equal voting weight, regardless of their own stake or the stake voting for them (as long as they get enough votes to reach the top 20). This means that DPoS chains really are like having a minimum of 20 equally weighted staking pools, whereas PoS and PoW naturally settle to 2-3 major staking or mining pools, which is far more centralised when it comes down to defending against an attack.
11.4.3 Disadvantages of DPoS
- Voter Apathy
If the active stake that is voting is not the majority of stake in the ecosystem, then the ecosystem is subject to takeover. the community should therefore monitor to make sure at least 51% of the voting stake is constantly voting. - Preventing Voter Apathy:
A potential risk is that once voters pick witnesses, they leave their votes unchanged indefinitely. Some chains solve this by witness vote decay, an automatic reduction of vote weight over time, forcing users to reconfirm votes periodically. This “refresh cycle” fosters dynamic governance, ensuring people stay informed and new voices can emerge. - Large Stakeholder Risk
The biggest stake holder may accumulate a significant enough stake as to become a security risk when it comes to voting. The community should move to mitigate any such risk - Long Term Take Over
Susceptible to long term, slow accumulation of stake where the top elected witnesess are slowly replaced overtime without the community taking note and the new top witnesses operate code that is not in the best interests of the community. To mitigate this, the community should note the state of witnesses from a time when the chain operated in a way that reflected the ideals of the community and fork to return to this more representative validator set
11.5. The Importance of Parameterisation
Why Parameters Matter
Without guardrails, simple PoS (UPCV) quickly centralises around whales or single staking pools. Parameters act like traffic rules or guardrails on a winding road. Each parameter (e.g., minimum validator count, witness vote decay, lock-up times) is a protective measure so that real-world attacks don’t succeed.
Examples of Useful eters
- Minimum Validator Count: Ensures at least a set number (e.g., 20) of independent validators must coordinate, preventing one or two major pools from dominating.
- Lock-Up Before Voting: Newly staked tokens must wait weeks, giving the community time to spot suspicious activity (e.g., an exchange powering up customer deposits).
- Vote Decay: Stakeholders must periodically renew their votes, preventing perpetual voter apathy and forcing validators to remain accountable.
- Time-Delayed Un-staking: Prevents attackers from quickly exiting after a hostile manoeuvrer; they risk their stake being stuck if the community forks out hostile funds.
Distribution First
Even the best governance parameters fail if most tokens sit with early insiders or VC's. A broad token distribution, ideally through “value-for-value” earning mechanisms, is vital for meaningful decentralisation. Having people worldwide earn tokens from a neutral Layer 1 by contributing something valuable rather than buying at scale helps create a large middle class of voters.
Why We Call This "Parameterised Coin Voting (PCV)"
DPoS should also be referred to as Parameterised Coin Voting or PCV, since it is able to use parameters in the consensus that avoid a “Rich-Get-Richer” scenario. The parameters it uses mean the largest token holder seldom wields the most sway over governance. This maximises the chance that the social nuance of the general community and its values are reflected in the governance process and makes it ideal for self organising social, digital communities and Network States.
11.6. Why No Founders, No ICO, and No VC's
Central Attack Points
- Founders & CEOs: A single “visionary” becomes a legal or regulatory target. Governments can coerce them into compliance, leading to censorship or policy changes.
- VC Pre-Mines & Early Sales: Venture capital often demands a controlling stake, undermining decentralised governance. Unsuspecting retail users later serve as exit liquidity, and the interests of the founders and the late entry users are often therefore misaligned.
- Formal Companies: If a blockchain “company” holds trademarks or controls critical code, lawsuits and cease-and-desist orders can force compliance.
Community-Built & Ownerless
A truly decentralised chain has no formal owner or headquarters, making legal threats difficult to enforce. This was illustrated by the Hive community when a mining company attempted legal action over the “Hive” brand name. With no single entity to serve or respond to a lawsuit, it was later dropped.
11.7. Voting Models Are Everywhere
All Consensus Is Voting
Whether PoW (miners “vote” via computational work), PoS (largest stake “votes”), or DPoS (parametered stake “votes”), every system is some form of voting. Pretending “code is law” eliminates humans is naive. People choose how code upgrades, and they enforce or reject forks in emergencies. The distinction lies in:
- What do you vote with? (Mining power, tokens, or delegated tokens?)
- Which parameters ensure fair distribution? (Lock-ups, whitelists, minimum validators, etc.)
- How do you handle staked reputations, backups, or emergent crises?
Delegation and “Politicians”
Delegation allows a less technical holder to transfer voting power (not ownership) to a trusted witness or community leader. This replicates the concept of political representatives:
- Accountability: If the delegate misuses votes, the original stakeholder can revoke delegation.
- Reputation Building: Ambitious or service-oriented community members can gather delegated stake by proving themselves helpful, honest, and aligned with the network’s ethos.
In this way, stakeholders can delegate votes to witnesses or proxies, much like electing politicians. This ensures smaller holders or those without technical knowledge can still influence governance through trusted representatives. Reputation systems help identify benevolent proxies.
11.8. Accountability and Preventing AI/Big Tech Takeover
Human Element
Some blockchains incorrectly assume purely algorithmic approaches can settle disputes. Real communities need human judgment the chain’s social layer must be able to override purely technical missteps. Delegated Proof-of-Stake excels here because stakeholders can intervene if an actor (or an AI) accumulates stake maliciously.
As artificial intelligence matures, AI “sock-puppet accounts” could appear credible in online communities, slowly accumulating stake. However, a chain that places value on:
- Long-standing History
Accounts building trust over years are less likely to be AI, particularly if they started prior to AI's rise. - Community-based Identity
Reputations subjectively determined by real humans can guard against an AI that merely “posts content.” - Participate in Proof of Person systems where a known, trusted and reputed, real person holding an on chain account identifies a business such as a shop. Users who buy products and document the purchase on chain can prove they are a person without having to KYC (Know Your Customer – for further information see Annex I – Glossary of Terms and Acronyms).
This interplay of parametered coin voting, reputation, and human oversight forms a bulwark against AI-driven infiltration.
New “AI accounts” will lack such historical footprints, letting the community discount them in governance decisions.
11.9. Defining Web 2.5
Most self-proclaimed “Web3” protocols still rely on:
- Centralising Venture Capital: Early token pre-mines or private sales create small, powerful cliques controlling governance.
- High-Fee Layer 1: Forcing developers onto “Layer 2” solutions that are often themselves centralised.
- Corporate Entities: A chain might have an “official company” or “foundation” that can be targeted or regulated, leading to partial, superficial decentralisation.
These projects are best categorized as Web 2.5: they adopt some blockchain elements but remain vulnerable to corporate or government pressure.
Big Tech vs. Web 2.5
Traditional corporations (Web 2.0) profit from user data and can easily create “Web 2.5” solutions semi-centralised “blockchain-based” services where they still hold keys or run crucial servers. True Web3 demands protocols incentivize independent infrastructure globally. Without a genuine neutral layer, “convenience monsters” like large platforms can undercut smaller operators and reintroduce central points of failure.
11.10. Achieving True Web 3
A truly decentralised system has:
- No Pre-Mines or Founder Stakes
The network is community-owned from inception, so no single authority can be coerced into compliance or censorship. - Parameterised Coin Voting
Long lock-ups, minimum validators, well-tested distributions, and social reputation layers prevent accidental or malicious centralisation. - Community Accountability
Voting is frequent or re-evaluated; large custodial wallets cannot quietly hijack consensus. - Neutral, Incentive-Driven Infrastructure Nodes and Dapp operators are rewarded from the protocol’s minting of new tokens or fees, reducing reliance on corporate business models or KYC requirements.
Key Point: If a blockchain surrenders to large-scale pre-mines, venture capital dominance, or minimal parameters, it drifts into Web 2.5. Realizing the full promise of Web 3 requires structural safeguards and widely distributed stake, combined with robust governance that no single entity can subvert.
11.11 Putting It All Together
- PoW: Effective for base security at massive scales (like Bitcoin), but lacks governance flexibility, speed, low cost transactions and is nearly impossible to replicate in new projects. Ideal for large, permissionless liquidity and collateral provision.
- Basic PoS: Unchecked stake accumulates power; quickly centralises around whales, VC's, or exchanges. Ideal for financial yield systems.
- DPoS / Parameterised Coin Voting: Builds on stake = skin-in-the-game while adding crucial guardrails lock-ups, vote decay, minimum validator sets, reputation, etc. to foster true decentralisation. Ideal for socially nuanced communities and Network States
- Web 2.5 vs. Web 3 – Many “crypto” platforms remain significantly centralised. True decentralisation emerges when no founder, company, or small clique can capture the chain, and governance decisions arise from a fair, widely distributed stake, informed by real human reputations.
Crucial Tenets
- No Founders, No Pre-Mine, No VC: Removes single points of control; no one to coerce or sue.
- Open Infrastructure Incentives: Protocol must pay community-run nodes and developers, avoiding Web2 business models (data sales, ads, KYC).
- Large & Active Voting Base: Broad token distribution and user engagement protect the chain from hostile takeovers.
- Reputation & Human Oversight: Genuine communities rely on trust built over time. When code fails or AI tries to infiltrate, humans must step in.
- Long Voting Stake Lock Ups multi-week or multi-month stake lock-ups to vote.
- Minimum number of top validators and transparent reputations for block producers.
- Everyone Can Earn Users with small stakes to earn stake through proven contributions (content creation, infrastructure, etc.).
- Voting Decay & Ability to Delegate Votes healthy re-voting and proxy delegation to reduce voter apathy and ensure dynamic leadership.
Conclusion
De-governance is not about removing governance it’s about removing centralised governance and replacing it with a robust, multi-parameter system that’s hard to capture. Proof-of-Work provided a censorship-resistant foundation for Bitcoin, but it’s impractical to re-create and offers little room for social or high-throughput applications. Un-Parameterised Proof-of-Stake tends to centralise around large holders or exchanges and makes the person or mining pool with the most stake the most powerful and most rewarded on the network. Delegated Proof-of-Stake (DPoS) or more generally “Parameterised Coin Voting” adds social nuance: reputation, timed lock-ups, witness vote decay, stable, minimum node counts, and open development funding and allows even the people with the smallest accounts rise to the top of the witnesses and gain significant influence on the chain, provided they carry out the will of the community.
Under these conditions, communities can sustain vibrant digital ecosystems, censorship resistant social networks, governance systems, economies which are truly owned and operated by the people who rely on them. This is the vision of a scalable, democratic, and resilient blockchain, finally delivering what many call Web 3.
By enforcing decentralisation at the protocol level through no founders or companies, fair distribution, and layered defences against collusion these systems can achieve genuine freedom from censorship and regulatory strangleholds. The result is an ownerless, community-driven blockchain that stands the greatest chance of scaling into a fully fledged “digital Network State,” where user rights are coded and guarded by human consensus.