Permissionlessness

Kelsie Nabben, Blockchain Innovation Hub, RMIT University, Australia, kelsie.nabben@rmit.edu.au
Michael Zargham, BlockScience, Inc., United States

PUBLISHED ON: 11 Apr 2022 DOI: 10.14763/2022.2.1656

Abstract

“Permissionlessness” is a term often used in association with public blockchains. In this glossary entry, we explore the origins, evolution, and coexisting uses and meanings of the term “permissionless” to contextualise it. We argue that a technosocial system is deemed permissionless if it is possible to participate in the use, development, and governance of that system or infrastructure without requiring permission from an authority, by adhering to publicly stated procedures. This term is much more broadly applicable then just blockchain systems although it is relevant to decentralized systems. It can be conceptualised as a technical attribute, an ideology, and a cultural value, and links to the access, control, governance, entry and exit of an open information system.
Citation & publishing information
Received: September 23, 2021 Reviewed: March 6, 2022 Published: April 11, 2022
Licence: Creative Commons Attribution 3.0 Germany
Competing interests: The author has declared that no competing interests exist that have influenced the text.
Keywords: Permission, Blockchain, Access, Governance
Citation: Nabben, K. & Zargham, M. (2022). Permissionlessness. Internet Policy Review, 11(2). https://doi.org/10.14763/2022.2.1656

This article belongs to the Glossary of decentralised technosocial systems, a special section of Internet Policy Review.

Definition

A technosocial system is deemed permissionless if it is possible to participate in the use, development, and governance of that system or infrastructure without requiring permission from an authority, by adhering to publicly stated procedures.

Origin

The term ‘permission’ comes from the Latin word ‘permissio’—the act of permitting, in granting formal consent or authorisation (American Heritage Dictionary, 2000). In law, “permission” refers to the authority to act, as expressed or implied (Bouvier, 1856). The antithesis, ‘permissionless’, means without permission, or the ability to act without requiring another to allow that action. The notion of “permissionlessness” in relation to distributed technologies is both a technical attribute, and ideology, and a cultural value that emerged with the early internet. 

In a technical context, permissionlessness refers to the open technical specifications in the network layer of the underlying protocols of the internet that avoids the cost of “permissioning” when transmitting data packets. The higher-level protocols for displaying websites also adhered to open specifications (“Hypertext Transfer Protocol” or HTTP). This innovation means that anyone is free to read, write, and share digital information across interactive links without needing to seek permission from a central authority or gatekeeper, whereas prior to this, people were limited to local intranets on private networks. A culture of open source software development whereby anyone can verify or modify the underlying codebase helped enable permissionless protocols and innovation (Raymond, 2000).

The technical attributes of permissionless systems interplay with ideological values around freedom and anti-authoritarianism. For example, the “Cypherpunk” contributors to the technical developments and political ideology of decentralised digital infrastructure state “We're free individuals, able to say what we wish, meet in secret meetings without the permission of the government, and learn anything we wish to” (May, 1992).In a sociological context, permissionlessness is also a cultural value that emerged in early internet culture. “Permissionless innovation” is a counterculture value from the 1960s and 1970s about no central ownership or control, and not having to ask anyone for permission (Naughton, 2014; Web Foundation, 2017). Computer scientist and credited inventor of the World Wide Web, Tim Burners-Lee states that the internet is a force for free and open creativity outside of walled gardens: “It was all based on there being no central authority that you had to go to to ask permission” (Brooker, 2018). Digital networked infrastructures can be described as both social and technical, as “infrastructures for communication, cooperation and common value creation…allow for permission-less interlinking of human co-operators and their technological aids” (Kostakis and Bauwens, 2014, 55). An ideological purity towards free access to decentralised technologies developed in parallel to these technical capabilities, with some arguing that “true distributed networks are permission-less” and “not dependent on powerful obligatory hubs” (Bauwens, 2009). ‘Permissionlessness’ has come to broadly refer to anyone being able to use the infrastructure as common property with no selection process to participation. 

These technical and cultural values were strongly amplified by adherents to influential technology communities, such as the free-software and open-source software movements (Stallman, 2002; Raymond, 2000). In these movements, the source code for computer programmes is available for users to modify it for their own use. Some principles of “permissionlessness” have also been defended against political and regulatory institutions by organizations such as the Electronic Frontier Foundation (EFF), which was formed in 1990 to define and protect internet based civil liberties, such as open access to “Pretty Good Privacy” (PGP) digital encryption to rallying against bans on cryptocurrencies (Electronic Frontier Foundation, 2021).

Evolution

Permissionless protocols have required, and also enabled new forms of social organisation and governance to evolve, including “Transmission Control Protocol and the Internet Protocol” or TCP/IP, and “Simple Mail Transfer Protocol” or SMTP. An important evolution in permissionless distributed technologies is the establishment and continuous development of standards to govern permissionless systems and allow them to scale. Although the foundation of permissionless systems is free access for anyone, permissionless systems still need to be governed at higher levels of the technology stack to manage unintended, negative consequences of free access. For example, the ‘World Wide Web Consortium’ (W3C), directed by Tim Burners-Lee, was founded in 1994 to develop open standards to ensure the long-term growth of the Web (W3C, 2021). These consensus-based standards offer recommendations to guide the technical specifications of how the system architecture should be developed. 

Another example whereby permissionless systems still require governance mechanisms to function in practice is The Simple Mail Transfer Protocol (SMTP). SMTP is the protocol that facilitates email. A negative externality of permissionless email is the ability for anyone to freely send unsolicited junk mail, or ‘spam’ (Brunton, 2013). Spam is an example of the unintended consequence of open information networks that requires innovation in the governance of undesirable behaviour. This limitation of the base layer permissionless protocol is managed through governance mechanisms. This issue of spam in SMTP is solved by credentialing authorities that enforce processes and norms around automatically filtering incoming emails at higher levels of the technology stack. Modern email servers will reject or at least deprioritize messages that come from addresses on untrusted domains or which lack certificates from a relevant certificate authority by marking them as ‘junk’. Although it involved institutions, some level of intervention, and in some ways partial censorship, this up-stack governance to manage the negative consequences of access to the system helps to ensure the ideal of permissionlessness can persist, as long as governance is polycentric, rather than monocentric. SMTP is arguably a failed example of permissionlessness, as access to the global network is gated by access to the internet and the rules of access control are not clearly specified. This demonstrates how permissionless protocols have adapted over time to develop and incorporate governance mechanisms and processes to manage negative externalities. The sophistication and automation of these processes is constantly evolving. 

Permissionless technological infrastructure was essential for the social evolution of the participatory systems that followed. The countercultural ideologies of the early internet influenced blockchain communities (Brunton, 2019). A resurgence of technical, cultural, and scholarly interest in ‘permissionless’ information infrastructures emerged in the wake of the Bitcoin whitepaper in 2008. Although the whitepaper does not mention “permissionless” directly, it makes numerous references to the ideals of the early internet and further develops these ideas of independence for “trust minimization” and “peer-to-peer” transactions without central intermediaries (Nakatomo, 2008). Bitcoin further mitigated the “Byzantine agreement problem”, for agreement in distributed open networks (Lamport, Shostak, & Pease, 1982; Sherman et al., 2018). The ability to coordinate payments without intermediaries inspired an explosion in distributed consensus mechanism research in the field of computer science and economics (Xiao et al., 2020; Neudecker & Hartenstein, 2019). The explosion in innovation and development of public blockchains has led to the resurgence of the technical attribute and cultural value of “permissionless” networks.

Decentralised Autonomous Organisations” (or “DAOs”) represent a more recent class of “permissionless” organisation for participatory, technology-mediated systems that share a common goal (Larimer, 2013; Buterin, 2017). Within blockchain communities, DAOs are understood as a blockchain-based system that enables people to govern themselves, independent from central control (Hassan & De Filippi, 2021). DAOs refer to technologically mediated institutions, in the broad sense of the term, that are ‘decentralised’, as in “distributed away from a central authoritative location or group” (Merriam-Webster, 2021), and ‘autonomous’, as in “independent or self-governing” (Voshmgir et al., 2021). DAOs which are freely accessible to anyone to participate are an instantiation of ‘permissionless’ human-machine organisation at its logical extreme, and perhaps an evolution of the goals of the permissionless Web that more explicitly incorporate permissionless approaches to governance. There are also other approaches beyond DAOs towards how information infrastructure-enabled coordination of value and social organisation among communities can be structured, such as protocol cooperatives and distributed cooperative organisations (Bauwens & Pazaitis, 2019; Mannan, 2020).

Coexisting uses and meanings

The concepts of “permissionless” and “participatory” frequently appear together and are related. Although they frequently appear together, and are sometimes used interchangeably, they are not the same thing. 

Permissionless is characterised by not needing permission to participate. These systems have a permissive boundary, meaning that no organisation mediates or controls access. Participatory systems are characterised by the ability to participate in a system in one or more ways. A common use of the term participatory is participatory governance, “which puts emphasis on democratic engagement, in particular through deliberative practices” (Fischer, 2012). Participation in an organisation operating and maintaining a digital infrastructure can include participation in multiple levels of the system, including (i) use of the infrastructure, (ii) contributing to the infrastructure’s development, or (iii) engaging in governance of the infrastructure. Systems that are permissionless are necessarily participatory, yet those that are participatory are not always permissionless. Exclusivity can be a value proposition in participatory systems that are permissioned. An example of this is a semi-permissioned blockchain consensus mechanism, where only an approved set of validators can participate in governing the network. Different network architectures have various trade-offs and are fit for purpose in different cases. The context and purpose of a system, including who it serves must be clearly articulated to determine if permissionlessness is a useful attribute (Nabben, 2021). Conversely, permissionless systems may wish to consider the ways in which stakeholders participate. 

Issues currently associated with the term

There are five key issues with the term permissionless, including anarchy, censorship-resistance, exit, forking, and generationalisation, which we address in turn.

Anarchy: permissionless systems or communities does not mean the absence of rules of governance or lawlessness, but rather changing the architecture of a network to remove gatekeepers and hierarchy in accessing the network (Lessig, 2009). Activities in an anarchic network are still constrained within a surface of action and operate within the bounds of existing norms, including technical standards defined by the protocol, operational practices, and local laws (Daigle, 2014). Yet, being governed by norms and the rules of a protocol does not mean that selfish value-extraction is not possible if people can identify ways to exploit the system (Olson, 1965).

Censorship-resistance: permissionless at the technical level prevents banning someone from a digital network (or deplatforming) for any reason besides not adhering to the rules specified by the protocol (Ali et al., 2021). However, permissionless does not mean that you cannot be excluded for violating the protocol (e.g., when other nodes in a peer-to-peer network blacklist or drop connection to disconnect you from the network). In a social system, this equates to being kicked out of the community if the rules or norms of the community are violated repeatedly, through mechanisms such as graduated sanctions (Ostrom, 2005).

Exit: permissionless systems, whether cultural or technical, are defined by adherence to certain rules and norms. Those rules and norms themselves may change over time, or participants' preferences for following those rules or norms may change. In the presence of these changes a participant is faced with the options of Exit, Voice and Loyalty (Dowding, 2016). Permissionless systems that have a high cost of exit may be more effective at retaining participants, or this could work adversely, and retain undesirable participants. A particular manifestation of this concept as code is the ‘rage-quit’ mechanism popularized by MolochDAO, which allows participants to take their funds and exit the DAO if they disagree with a governance decision (de la Rouviere, 2021).

Forking: forking is an extreme manifestation of the permissionless ideal in all three layers (use, creation, governance) of a digital infrastructure. In both technical and cultural contexts, it is possible for disagreements to emerge regarding a particular standard, rule or norm which render two or more subgroups of digital network participants at odds. An example of this is a split in the Ethereum blockchain community following the hack of a joint investment project called “The DAO” (DuPont, 2017). Some people believed the blockchain record of transactions should be wound back to recover the funds, while others wanted to respect the “immutable” ethos of public blockchains. This led to a “fork” of the protocol and community into what we know today as Ethereum, and Ethereum Classic. The resulting forking process is a technical mechanism to resolve a community impasse by copying the software code and dividing the community of participants. This can occur without permission of the original entity. It can be interpreted as exit on a scale large enough that a new similar entity is formed, despite, or in-spite, of the existence of the original entity.

Generalisation: the term ‘permissionless’ has become an ideological and cultural catchcry which is applied so generally that it loses its original meaning. It has evolved from its specific application in the technical architecture of open networking to mean ‘all things that are without permission’.

Conclusion

We have shown that “permissionlessness” can be conceptualised as a technical attribute, an ideology, and a cultural value. In practice, any functioning institution, including an institution that constitutes a digital infrastructure must have boundaries (Ostrom, 2005). Permissionless infrastructures are institutions where participation arises from an actor choosing to enter those boundaries, rather than an external authority or institution choosing to admit them. In contrast, participation is necessary but not sufficient for a system to be permissionless. An institution encompassing a digital infrastructure includes participation by way of (i) use of the infrastructure, (ii) contributing to the infrastructure’s development, or (iii) engaging in governance of the infrastructure. In order for an infrastructure to be deemed fully permissionless in the strongest sense of the word, it must be possible to participate in its use, development, and governance without requiring permission from an authority, by adhering to publicly stated procedures.

References

Ali, S., Saeed, M. H., Aldreabi, E., Blackburn, J., De Cristofaro, E., Zannettou, S., & Stringhini, G. (2021). Understanding the effect of deplatforming on social networks. 13th ACM Web Science Conference, 187–195.

Bauwens, M. (2009). Class and capital in peer production. Capital & Class, 33(1), 121–141. https://doi.org/10.1177/030981680909700107

Bauwens, M., & Pazaitis, A. (2019). P2P Accounting for Planetary Survival: Towards a P2P Infrastructure for a Socially-Just Circular Society. P2P Foundation, Guerrilla Foundation and Schoepflin Foundation. https://commonstransition.org/wp-content/uploads/2019/09/AccountingForPlanetarySurvival_defx-2.pdf.

Bouvier, J. (1856). Permission. In A Law Dictionary, Adapted to the Constitution and Laws of the United States. By John Bouvier. https://legal-dictionary.thefreedictionary.com/permission

Brooker, K. (2018, July 1). I was devastated: Tim Berners-Lee, the man who created the world wide web, has some regrets. Vanity Fair. https://www.vanityfair.com/news/2018/07/the-man-who-created-the-world-wide-web-has-some-regrets#:~:text=August%202018%20Issue-,%E2%80%9CI%20Was%20Devastated%E2%80%9D%3A%20Tim%20Berners%2DLee%2C%20the,a%20plan%20to%20fix%20it.

Brunton, F. (2019). Digital Cash: The Unknown History of the Anarchists, Utopians, and Technologists Who Created Cryptocurrency. Princeton University Press.

Brunton, F. (2013). Spam: A Shadow History of the Internet. The MIT Press.

Buterin, V. (2017). The Meaning of Decentralization’ [Medium]. @VitalikButerin. https://medium.com/@VitalikButerin/i-invented-the-term-in-2013-and-daniel-larimer-came-up-with-dacs-s-organization-corporation-a-ef86db1524d5.

Daigle, L. (2014). Permissionless innovation – openness, not anarchy. Internet Society. https://www.internetsociety.org/blog/2014/04/permissionless-innovation-openness-not-anarchy/.

de la Rouviere, S. (2021). The Moloch DAO: collapsing the firm. Medium. https://medium.com/@simondlr/the-moloch-dao-collapsing-the-firm-2a800b3aa2e7.

Dictionary, M.-W. (2021). Decentralization. Merriam-Webster. https://www.merriam-webster.com/dictionary/decentralization.

Dowding, K. (2016). Albert O. Hirschman, Exit, Voice and Loyalty: Responses to Decline in Firms, Organizations, and States. In M. Lodge, E. C. Page, & S. J. Balla (Eds.), The Oxford Handbook of Classics in Public Policy and Administration (Vol. 1). Oxford University Press. https://doi.org/10.1093/oxfordhb/9780199646135.013.30

DuPont, Q. (2017). Experiments in algorithmic governance. In M. Campbell-Verduyn (Ed.), Bitcoin and beyond: Cryptocurrencies, blockchains and global governance. Routledge, Taylor & Francis Group.

Electronic Frontier Foundation. (2021). About EFF. Electronic Frontier Foundation. https://www.eff.org/about

Fischer, F. (2012). Participatory Governance: From Theory To Practice. Oxford University Press. https://doi.org/10.1093/oxfordhb/9780199560530.013.0032

Hassan, S., & De Filippi, P. (2021). Decentralized autonomous organization. Internet Policy Review, 10(2). https://doi.org/10.14763/2021.2.1556

Kostakis, V., & Bauwens, M. (2014). Network Society and Future Scenarios for a Collaborative Economy. Palgrave Macmillan.

Lamport, L., Shostak, R., & Pease, M. (1982). The Byzantine Generals Problem. ACM Transactions on Programming Languages and Systems, 4(3), 382–401. https://doi.org/10.1145/357172.357176

Larimer, D. (2013). The hidden costs of Bitcoin. LTB Network. https://letstalkbitcoin.com/is-bitcoin-overpaying-for-false-security#.UjtiUt9xy0w.

Lessig, L. (2009). Against transparency: The perils of openness in government. The New Republic. https://newrepublic.com/article/70097/against-transparency.

Mannan, M. (2020). Everything old is new again: Evaluating the legal and governance structures of shared-services platform cooperatives. Institute for Cooperative Digital Economy and the Platform Cooperativism Consortium. https://archive.org/details/morshed-mannan-single-web/mode/1up.

May, T. C. (1991). Communication with cypherpunks@toad.com, “Paranoia and Cypherpunks.” https://cypherpunks.venona.com/raw/cyp-1992.txt.

Nabben, K. (2021). Blockchain security as “people security”: Applying sociotechnical security to blockchain technology. Frontiers in Computer Science, 2, 599406. https://doi.org/10.3389/fcomp.2020.599406

Nakamato, S. (2008). Bitcoin: A peer-to-peer electronic cash system. Bitcoin.Org. https://bitcoin.org/en/bitcoin-paper.

Naughton, J. (2014). 25 things you might not know about the web on its 25th birthday. The Guardian. https://www.theguardian.com/technology/2014/mar/09/25-years-web-tim-berners-lee.

Neudecker, T., & Hartenstein, H. (2019). Network layer aspects of permissionless blockchains. IEEE Communications Surveys & Tutorials, 21(1), 838–857. https://doi.org/10.1109/COMST.2018.2852480

Olson, M. C. (1965). The Logic of Collective Action: Public Goods and the Theory of Groups. Harvard University Press.

Ostrom, E. (2005). Governing the Commons: The Evolution of Institutions for Collective Action. Cambridge University Press.

Permission. (2000). In American Heritage Dictionary of the English Language (Fourth). Houthton Mifflin Harcourt.

Raymond, E. S. (2000). The Cathedral and the Bazaar. http://www.catb.org/~esr/writings/cathedral-bazaar/cathedral-bazaar/.

Sherman, A. T., Janvani, F., Zhang, H., & Golaszewski, E. (2018). On the origins and variations of Blockchain technologies. IEEE Security & Privacy, 17(1), 72–77. https://doi.org/10.1109/MSEC.2019.2893730

Stallman, R. (2002). Free Software, Free Society: Selected Essays of Richard M. Stallman (J. Gay, Ed.). GNU Press.

Voshmgir, S., Zargham, M., & Emmett, J. (2021). Conceptual Models for DAO2DAO Relations’. Medium. https://medium.com/primedao/conceptual-models-for-dao2dao-relations-ac2b2d3cc84d.

W3C. (2021). W3C Standards. https://www.w3.org/standards/.

Web Foundation. (2017). Web inventor Sir Tim Berners-Lee responds to US net neutrality threat. Web Foundation. https://webfoundation.org/2017/04/sir-tim-berners-lee-responds-to-us-net-neutrality-threat/.

Xiao, Y., Zhang, N., Lou, W., & Hou, Y. T. (2020). A survey of distributed consensus protocols for blockchain networks. IEEE Communications Surveys & Tutorials, 22(2), 1432–1465. https://doi.org/10.1109/COMST.2020.2969706

Add new comment