Statement of Parasovereign Principles 1. Parasovereignty is Necessary for Individual Autonomy Human beings are not only members of collectives; they are also individuals with needs, choices, and responsibilities. Parasovereign systems empower individuals to act freely in commerce, communication, and association without requiring permission. The printing press broke the monopoly of church and crown over knowledge. Samizdat publications pierced censorship in the Soviet bloc. Bitcoin, Nostr, and Tor extend this tradition digitally. 2. The Purpose of Parasovereignty is Constraint Parasovereign protocols are not alternatives to sovereignty but constraints upon its excess. They ensure that money cannot be endlessly debased, that speech cannot be wholly suppressed, and that association cannot be fully surveilled. Bitcoin constrains financial coercion. Nostr constrains censorship. Tor constrains surveillance. Each narrows the range of coercion available to sovereign or corporate power without violence. 3. Parasovereignty is Not Inherently Good or Evil Just as sovereignty can protect or oppress, parasovereign protocols can empower or harm. Nostr can host human rights activism, or it can host antisemitism. Bitcoin can provide lifelines to those under tyranny, or it can facilitate fraud. Parasovereignty is not a moral guarantee. Its value depends on how individuals choose to use the autonomy it provides. 4. The Problem is Capture Through Centralization Parasovereign systems remain resilient so long as individuals uphold their responsibility to keep them decentralized and voluntary. When users default to custodians, central relays, or corporate platforms, the system drifts toward sovereign-dependency. This is the ever-present danger: autonomy conceded not by suppression, but by convenience. Like the countless Bitcoin forks abandoned by the market, parasovereign systems persist only when autonomy is actively chosen. 5. The Challenge is Persistence Parasovereign systems cannot prevent suppression, but they can outlast it. Each time a sovereign power blocks a Tor exit node, another reappears. Each time a Nostr relay is censored, new ones come online. Each time Bitcoin is banned, miners and nodes shift to new jurisdictions. This is the “whack-a-mole” principle: degradation is possible, capture is not. Parasovereignty is a social commitment as much as a technical design, requiring vigilance, responsibility, and persistence.
Statement of Sovereign Principles 1. Sovereignty is Necessary for Collective Survival Human beings cannot survive alone. From the smallest kinship band to the modern nation-state, sovereignty organizes collective defence against threat and disorder. The lesson is dramatized in Seven Samurai and The Magnificent Seven: villagers, though many, cannot defend themselves without organizing under capable leaders. Sovereignty exists to ensure survival through collective action. 2. The Purpose of Sovereignty is Protection The sovereign order exists to defend the community and maintain peace within its territory. When governments meddle in every aspect of private life, they neglect this primary duty. This was the strongest criticism of Canada’s Trudeau government after 2021: it interfered in markets, provincial responsibilities, and daily life while ignoring its irreducible, primary responsibility, which is to defend Canadian territory, Canadians and Canadian institutions. 3. Sovereignty is Not Inherently Good or Evil Power itself is morally neutral. Like Bitcoin or Nostr, which can be used to empower or to harm, sovereign power can protect or oppress. There is a difference, however, between authoritarian dictatorships and liberal democracies. The latter, though flawed, embody institutions and norms that restrain abuse and better serve the collectivity. 4. The Problem is Concentration of Power Those most capable of leading in conflict are also most tempted to hold power indefinitely. Seven Samurai makes this point explicitly: warriors are necessary in crisis but dangerous if left unchecked in peacetime. The Roman ideal was Cincinnatus, the farmer who accepted dictatorial power only long enough to win a war, then returned to his fields. George Washington, though flawed, modeled the same restraint. Churchill led Britain through war, but was dismissed by the electorate the moment the war ended. True sovereignty requires leaders who are effective when needed, but restrained when not. 5. The Challenge is Restraint Across history, societies have developed institutions to limit sovereign overreach. Ancient Athens used ostracism to curb leaders who grew too powerful. As anthropologist Christopher Boehm observed, even small-scale hunter-gatherer societies practised “reverse dominance hierarchy,” banding together to check domineering leaders. These mechanisms, from ancient customs to modern checks and balances, ensure sovereignty remains a protector, not an oppressor.
Sovereignty and Parasovereignty in Balance Sovereignty secures peace and prosperity in the material world. This is the classical liberal ideal, sometimes dismissed by collectivists as the “night watchman state.” The problem is not sovereignty itself, but what happens when collectivists, do-gooders, or corrupt elites capture the state and extend its remit beyond maintaining social peace and defending territory. Parasovereign systems, especially those deliberately engineered as engines of individual autonomy and cooperation, serve as the ultimate tools of constraint. They do not overthrow sovereignty but limit its excesses. By removing the most impactful means of coercion short of violence, they narrow the scope of state overreach. -Sound money (Bitcoin) constrains monetary manipulation and debasement. -Freedom of expression (Nostr) constrains censorship and narrative control. -Freedom of association (Tor) constrains surveillance and forced isolation. Together, these protocols rebalance the relationship between state power and individual autonomy. Sovereignty provides order; parasovereignty provides constraint. Both are necessary for human flourishing.
Sovereignty in the Physical, Parasovereignty in the Digital Sovereignty is the king of the physical world. States order territory, population, infrastructure, and resources because all human action ultimately takes place in space and time. Unless someone invents teleportation to bypass physical chokepoints, the sovereign order will persist as the framework for collective survival and security. Parasovereign protocols exist on a different plane. They operate in cyberspace, made possible by cryptography, distributed networks, and voluntary participation. Bitcoin, Nostr, and Tor do not command territory; they bypass it. Their resilience lies not in physical force, but in replication, persistence, and the refusal of users to bend to central control. The two orders are not rivals but complements. Sovereignty secures peace and prosperity in the material world. Parasovereignty secures autonomy in the digital world. Both are indispensable.
Parasovereignty is Fundamentally Social, Not Technological. Parasovereign protocols are not sustained by technology alone. Code and cryptography provide the rails, but they are only means to an end. The end is human action: individuals choosing to transact, communicate, and associate freely, without permission. Bitcoin, Nostr, and Tor persist because people continue to run nodes, sign messages, and route traffic. The resilience of these systems depends not only on their technical design but also on the willingness of individuals to uphold their rules voluntarily. Without this social foundation, the protocols degrade into tools captured by states or corporations. With it, they remain engines of autonomy.
The Whack-a-Mole Principle of Parasovereignty Individual parasovereign actors (node operators, relays, channel managers) can always be suppressed. States can arrest operators, seize hardware, block internet routes, or freeze communication channels. Suppression at this level is real and inevitable. Yet suppression at the node level is not capture at the network level. Parasovereign systems persist because new nodes can always be spun up, code can be redeployed, and protocols can be re-instantiated by anyone, anywhere. This creates the whack-a-mole effect: sovereign powers can degrade a network locally, but every act of suppression triggers reappearance elsewhere. The key distinction is between degradation and capture. Degradation happens when suppression reduces efficiency or scale. Capture would mean altering the rules of the system itself. Parasovereign protocols cannot be captured in principle, but they can be captured in practice if their individual operators renege on the responsibility to maintain protocol integrity. Persistence depends not only on design but also on users choosing to uphold the rules. Guarantee: Parasovereign systems survive because they are harder to eliminate than to regenerate, provided their participants remain committed to autonomy. Example 1: Bitcoin Mining Ban in China (2021) China banned all Bitcoin mining in May 2021. At the time, Chinese miners contributed over 50% of global hashpower. The network’s computational strength fell sharply, showing how vulnerable individual actors are to sovereign suppression. But within a year, hashpower fully recovered and exceeded past highs as miners relocated to North America, Central Asia, and elsewhere. No central authority coordinated this recovery. The Bitcoin protocol endured, but only because miners and node operators voluntarily upheld the rules. Lesson: Sovereign power can degrade Bitcoin, but cannot capture it unless operators themselves abandon protocol integrity. Example 2: Nostr Relays and Censorship Nostr relays are easy to suppress: a state could shut down a relay operator, seize servers, or block domains. But because the protocol is so lightweight, new relays can spin up quickly, and users can switch connections freely. The system persists as long as individuals continue to run relays and sign messages. Capture is only possible if users en masse default to using a single corporate or sovereign-dependent relay, thereby centralizing the network. Lesson: Resilience depends not just on code but on the willingness of individuals to keep participation decentralized. Example 3: Tor Exit Nodes Under Fire Tor exit nodes are frequent targets of law enforcement, ISPs, and regulators. Operators face harassment, lawsuits, or worse. Individual nodes vanish all the time. Yet Tor continues to function globally, because new exit nodes regularly appear and traffic reroutes through them. The protocol ensures persistence, but if users and volunteers stopped shouldering the risk of operating nodes, Tor could degrade into irrelevance. Lesson: Tor survives because enough individuals continue to run nodes despite risk. Suppression plays whack-a-mole, but capture becomes possible only if the community abdicates responsibility. Core point across all three: Parasovereign resilience is never absolute. It depends on individuals who uphold the rules voluntarily. Sovereigns can degrade networks, but capture only occurs if participants concede their autonomy.