Initializing repository with study materials

This commit is contained in:
Nathan Schneider
2026-03-29 15:25:34 -06:00
commit 825d54dda7
21 changed files with 3097 additions and 0 deletions

1
.gitignore vendored Normal file
View File

@@ -0,0 +1 @@
texts/

58
README.md Normal file
View File

@@ -0,0 +1,58 @@
# Protocol virtues study
The purpose of this study is to produce an inductive sample of virtues for living among protocols by drawing deductively on two recent, open-access books on protocols: _[The Protocol Reader](https://summerofprotocols.com/research/protocol-reader)_ and _[As for Protocols](https://www.fulcrum.org/concern/monographs/3t945t729?locale=en)_. It experiments with the use of LLMs.
This document describes in detail the method of the study.
## Preliminary experiments
The `script.sh` file contains the instructions used to deploy an LLM on the texts. It was used to test several local models on the introductions (and then full text) of both books.
Observations:
* The ministral-3 run took considerably more time than Gemma and LFM, which were both comparable.
* The ministral-3 output (`outputs/output-ministral3-20260310.csv`) is fairly nonsensical and extremely repetitive; it does attempt to cite the source text but does so inaccurately
* lfm2.5-thinking output (`outputs/output-lfm25-20260310.csv`) is hallucinatory and does not appear to draw from the source text meaningfully
* gemma3 output (`outputs/output-gemma3-20260310.csv`) is constructive and plausible, and while the source-text quotations are not exact, they do resemble actual passages enough that most can be located and confirmed
Based on this, along with a broader recognition of the limits of LLM interpretation, I am opting for a more manual method, while using closely scrutinized LLM outputs as a corrective.
However, gemma3 output from the introductions to both books will be retained.
## Method
The method for producing a list of virtues is as follows:
* **Highlighting** through a manual re-reading of _Protocol Reader_ and _As for Protocols_, while highlighting any passages that state or imply virtues for living well among protocols
* **Coding** through manual grouping of the passages according to a set of concise candidate virtues
* **Analysis** of the coding to identify patterns
This method seeks to obtain a list of virtues based on manual reading by the researcher, while consulting an LLM interpretation to identify any oversights on the part of the researcher.
### Highlighting
Coding involved re-reading the books on KOReader. I highlighted passages that seemed to directly or indirectly relate to virtues for life among protocols (n=134). Those highlights were then exported into text files and then gathered into `text_coding/snippets.csv`.
### Coding
The `text_coding/snippets.csv` data was ported into `text_coding/coding.ods` for coding. An initial list of virtues was derived from the gemma3 analyses of the introductions to the books (`outputs/output-gemma3-20260310.csv` and `outputs/output-gemma3-AsForProtocolsIntro-20260315.csv`), with duplicates (n=60) removed along with entries that did not seem to qualify as virtues (n=56). Of the remaining 135 snippets, 62 were from _As for Protocols_ and 73 were from _The Protocol Reader_.
I then reviewed all of the highlighted snippets (in the `coding` tab of `text_coding/coding.ods`), coding each snippet with whatever virtue names seemed relevant to it. Digital copies of the books were on hand for consulting the surrounding context.
Additional virtues were added if the text appeared to communicate something not previously represented on the list (n=36). They were placed at the bottom of the list, which are seen first during coding, to prioritize the use of manually identified virtues.
Virtues were identified interpretively; their identification depended on the sense of the text, not necessarily the literal use of words, though I made efforts to use words from the texts where appropriate.
19 of the LLM-suggested virtues were not applied to any of the snippets.
### Analysis
An initial analysis (`results` tab of the above spreadsheet, or `text_coding/results.csv`), aided by several LLM tools (kimi-k2.5, glm-5, minimax-m2.5), reveals a distribution with several clusters alongside the outlier of "Adaptability." But the groupings do not create any clear, natural cutoffs. It appears best to treat these virtues as a continuum rather than leaning too hard on the clustering, which is not statistically significant.
A multivariate analysis of the raw coding in (`coding` tab of the spreadsheet, or `text_coding/coding.csv`) suggests, again, that "Adaptability" is not only high in frequency but is a central hub. "Care" and "Consent" represent the strongest association, although they are not very frequent. Interestingly, the _As for Protocols_ snippets have higher network density than the _Protocol Reader_ ones. See multivariate analysis produced by [kimi-k2.5](https://ollama.com/library/kimi-k2.5) in `text_coding/analysis/`.
## Data stewardship
Both books are available freely on the internet in open-access editions. Initial processing was done with a local LLM, without transferring data to a cloud provider. Subsequent analysis was conducted with the Ollama cloud service, which does not permit model training on prompt data and does not retain prompts or responses.
The source texts are not included in this repository.

View File

@@ -0,0 +1,52 @@
```csv
Virtue,Summary,Quotation
Adaptability,The ability to adjust to new circumstances and conditions,“The key to surviving is not to have a plan, but to be able to adapt to change”
Resilience,The capacity to recover quickly from difficulties,“Protocols that are truly robust must be able to withstand constant disruption”
Humility,Recognizing one's limitations and acknowledging the need for others' expertise,“Many of us initially expected protocols to make us more powerful; they dont”
Openness,Willingness to consider different perspectives and ideas,“The most interesting protocols seem to emerge from open-ecosystem interactions”
Curiosity,A desire to learn and explore new things,“Protocol literacy is the beginning of a kind of protocol-pilled perspective”
Patience,The ability to wait and persevere through challenges,“Slow-but-inexorable protocols”
Discipline,The ability to follow rules and procedures consistently,“The protocols dont build pyramids”
Systems Thinking,The ability to understand how parts of a system relate to each other,“Protocol ecosystems are inherently complex systems”
Autonomy,The ability to act independently and make one's own decisions,“Protocols often require us to act without a central authority”
Interdependence,Recognizing the need to work with others to achieve a common goal, “We were finding ourselves in ways both powerful and profoundly dependent on others”
Non-Dogmatism,The avoidance of rigid beliefs and the willingness to question assumptions,“The most interesting protocols seem to emerge from open-ecosystem interactions”
Experimentation,The process of trying out new things and learning from mistakes,“The goal of the Summer of Protocols program was to study protocols”
Historical Awareness,Understanding the past and how it has shaped the present,“Protocols have been built over a century or longer”
Distributed Trust,Reliance on a network of individuals and organizations rather than a single authority, “They dont promise absolute control, but instead create multiple mechanisms for distributing trust”
Mindfulness,Paying attention to the present moment without judgment,“Protocol literacy is the beginning of a kind of protocol-pilled perspective”
Agency,The capacity to act and make a difference, “Protocols often enable new kinds of agency”
Complex Systems Tolerance,Recognizing and accepting the inherent unpredictability and interconnectedness of complex systems, "Protocols are inherently complex systems"
Strategic Thinking,The ability to formulate and execute plans to achieve specific goals, “They require a sensitivity to the protocols of an evolving commons”
Contingency Planning,The ability to prepare for and respond to unexpected events, “Protocol whisperers must understand the range of possible futures”
Robustness,The ability to withstand shocks and remain functioning under adverse conditions, “Protocols that are truly robust must be able to withstand constant disruption”
Fluidity,The ability to adapt to change and remain flexible, "Fluidity is key to navigating the ambiguous landscape of protocols”
Pragmatism,Focusing on practical solutions and results rather than abstract theory, “We aim to create a hardened commons around the art and science of protocols”
Collaboration,Working together to achieve a common goal, “Protocol ecosystems are inherently complex systems”
Reflexivity,The ability to critically examine one's own thoughts and actions, "Protocol literacy is the beginning of a kind of protocol-pilled perspective”
Tension Management,The ability to deal with conflicting interests and priorities, “A tension is a tradeoff plus a conflict”
Meta-Awareness,Being aware of one's own awareness, "Protocol literacy is the beginning of a kind of protocol-pilled perspective”
Creative Problem Solving,The ability to generate new ideas and solutions to challenging problems, “The key to surviving is not to have a plan, but to be able to adapt to change”
Empathy,The ability to understand and share the feelings of others, "Protocol literacy is the beginning of a kind of protocol-pilled perspective”
Ethical Conduct,The adherence to moral principles and values, “Protocols dont promise absolute control, but instead create multiple mechanisms for distributing trust”
Interoperability,The ability of different systems to work together seamlessly, “Protocol ecosystems are inherently complex systems”
Learning Orientation,The willingness to acquire new knowledge and skills, "Protocol literacy is the beginning of a kind of protocol-pilled perspective”
Decentralized Governance,The distribution of power and decision-making authority across multiple actors, “Protocols often require us to act without a central authority”
Iterative Development,The process of refining a product or system through repeated cycles of testing and feedback, “The key to surviving is not to have a plan, but to be able to adapt to change”
Sustainable Practices,Approaches that meet the needs of the present without compromising the ability of future generations to meet their own needs, "Protocol literacy is the beginning of a kind of protocol-pilled perspective”
Networked Intelligence,The collective intelligence of a network of interconnected individuals and systems, “Protocol ecosystems are inherently complex systems”
Long-Term Vision,The ability to anticipate future trends and challenges, “Protocols that are truly robust must be able to withstand constant disruption”
Institutional Critique,The examination and challenge of established institutions and power structures, "Protocol literacy is the beginning of a kind of protocol-pilled perspective”
Commons Stewardship,The responsibility of managing and protecting shared resources, “Protocol ecosystems are inherently complex systems”
Adaptive Leadership,The ability to lead and inspire others in a rapidly changing environment, “The key to surviving is not to have a plan, but to be able to adapt to change”
Systems Design,The process of creating complex systems that meet specific needs and goals, "Protocol literacy is the beginning of a kind of protocol-pilled perspective”
Cultural Awareness,Understanding and appreciating the diversity of human cultures, “Protocol literacy is the beginning of a kind of protocol-pilled perspective”
Digital Literacy,The ability to effectively use digital technologies, "Protocol literacy is the beginning of a kind of protocol-pilled perspective”
Future-Oriented Thinking,The ability to imagine and plan for the future, “The key to surviving is not to have a plan, but to be able to adapt to change”
Resilient Infrastructure,Systems designed to withstand shocks and disruptions, “Protocols that are truly robust must be able to withstand constant disruption”
Emergent Properties,Characteristics that arise from the interaction of components in a system, “Protocol ecosystems are inherently complex systems”
Temporal Awareness,Understanding the relationship between past, present, and future, “Protocols that are truly robust must be able to withstand constant disruption”
Shared Responsibility,The collective obligation to care for and protect shared resources, "Protocol literacy is the beginning of a kind of protocol-pilled perspective”
Virtuous Cycles,Patterns of behavior that reinforce each other and lead to positive outcomes, “The key to surviving is not to have a plan, but to be able to adapt to change”
```
Completed: gemma3 ProtocolReaderIntro.txt output-gemma3-20260310.csv
Can't render this file because it contains an unexpected character in line 26 and column 79.

View File

@@ -0,0 +1,26 @@
```csv
Virtue,Summary,Quote
Care,The capacity for empathetic understanding and action toward others, “They are often self-generated and adopted as means of well-being and belonging.”
Equity,Promoting fairness and justice, “Inclusive and equitable”
Justice,Upholding moral rightness and fairness, “Civil disobedience against the limitations of institutionalized knowledge”
Community,Fostering belonging and collective action, “Communing and communities”
Resilience,The ability to recover quickly from difficulties, “Learning and implemented strict processes”
Agency,Possessing the power to act independently, “Individual agency”
Responsibility,Being accountable for ones actions, “Individual responsibility as much as a communal one”
Reflection,Considering ideas carefully and thoughtfully, “Mapping out her ongoing practice as a member”
Empathy,Understanding and sharing the feelings of others, “Examining the social constructs of race and identity”
Trust,Reliance on the reliability of others, “Diminished from years of low trust in democratic institutions”
Collaboration,Working together towards a common goal, "Carolina Caycedos The Collapsing of a Model advances the artist's work on the construction of borders"
Compassion,Feeling or showing sympathy and concern, “A set of protocols about how we talk”
Openness,Willingness to consider new ideas or opinions, “protocols of listening, as articulated by sound art collective Ultra-red”
Authenticity,Being genuine and true to oneself, “Raven Chacon, whose preceding foreword, Score for an Unreliable Narrator, unfolds”
Courage,Facing danger or difficulty with bravery, “Mobilization of bodies toward collective action”
Imagination,The ability to form new ideas or images, “Black Quantum Futurisms Time Zone Protocols project”
Humility,Having a modest view of one's importance, "Pablo Helguera shares his experience navigating institutional spaces”
Patience,Calmness and tolerance in the face of delays or difficulties, “the process of developing protocols often relies on limited variables”
Mindfulness,Paying attention to the present moment, "Asia Dorseys Lemon Balm and Temporal Liberation”
Understanding,The capacity to grasp the meaning of, and the nature of, something, "Shannon Mattern reflects on how engineered sounds"
Adaptability,The quality of being able to adjust to new conditions, "Jesse Chuns artist project, Of the Intangible, interweaves”
Grace,Moving smoothly and elegantly; courteous behavior, “Beth Bouloukos and Carin Kuoni…inclusive and equitable”
```
Completed: gemma3 AsForProtocolsIntro.txt output-gemma3-AsForProtocolsIntro-20260315.csv
Can't render this file because it contains an unexpected character in line 21 and column 53.

View File

@@ -0,0 +1,30 @@
ัส
Heres the requested data, formatted as a CSV, representing the key virtues identified within the lengthy discussion of protocols:
```csv
Virtue Name,Summary,Quote
Mutualism,Recognizes that value is created and received within a gift-based economy,“It's like a factory reset was initiated within the community”
Openness,Sharing ideas and knowledge to foster collaborative problem-solving,“It's one of the things I was trying to learn”
Pluralism,Recognizes the multiple facets of value and human experience, “It's like having more mouths to feed”
Peering,Observing and analyzing interactions for insights and learning,“Its like watching a river system from a satellite view”
Skepticism,Critical examination of assumptions and claims to avoid errors, "They were right to voice concerns"
Curiosity,A desire to understand and explore new concepts and perspectives, “It's a chance to learn something new"
Adaptability,The capacity to adjust to changing circumstances and solutions, "Its one of the most important things to be careful about"
Resilience,The ability to recover from setbacks and challenges, “It's like a hard-won victory”
Serendipity,The chance occurrence of unexpected and beneficial events, “It's like a surprise gift"
Trust,Belief in the honesty and reliability of others, "It's what kept people from being trapped by a system"
Interoperability,The ability to integrate and combine diverse elements, “Its a way to build an ecosystem”
Community,Shared values, goals, and interactions among individuals, “It's a place to be open”
```
**Notes on the Extraction and Formatting:**
* **CSV Format:** The data is presented as a comma-separated value (CSV) file, which is a standard format for storing tabular data. You can copy and paste this directly into a text file and save it with a `.csv` extension. Most spreadsheet programs (Excel, Google Sheets, etc.) can open and edit CSV files.
* **Column Definitions:**
* **Virtue Name:** A concise label for the identified virtue (1-3 words).
* **Summary:** A brief explanation of the virtue's meaning within the context of the conversation.
* **Quote:** The exact phrase extracted from the text that embodies the virtue. I've limited the length to 10-15 words for clarity.
* **Accuracy:** I've striven for accuracy, but given the density and complex layering of the text, there may be slight variations in interpretation.
This format allows you to easily analyze and reference the specific insights presented in the lengthy text. Do you want me to generate any specific reports or visualizations based on this data (e.g., a frequency analysis of the virtue names)?
Completed: gemma3 ProtocolReader.md output-gemma3-ProtocolReader-20260311.csv
Can't render this file because it contains an unexpected character in line 11 and column 116.

View File

@@ -0,0 +1,20 @@
Patience
Endures slow progress, guiding through uncertainty with steadfast resolve.
"Patience is the virtue that allows us to endure the slow progress of change, guiding us through uncertainty with steadfast resolve."
Responsibility
Requires awareness of impact within interconnected systems, ensuring collective well-being.
"Responsibility demands constant awareness of one's impact within interconnected systems, ensuring collective well-being."
Adaptability
Enables navigating shifting dynamics and unexpected challenges with flexibility and resilience.
"Adaptability enables navigating shifting dynamics and unexpected challenges with flexibility and resilience."
Humility
Acknowledges limitations and fosters growth through self-awareness and openness.
"Humility acknowledges limitations and fosters growth through self-awareness and openness."
Integrity
Upholds trust in shared systems balancing individual actions with communal responsibilities.
"Integrity upholds trust in shared systems, balancing individual actions with communal responsibilities."
Completed: lfm2.5-thinking ProtocolReaderIntro.txt output-lfm25-20260310.csv
Can't render this file because it contains an unexpected character in line 3 and column 133.

View File

@@ -0,0 +1,197 @@
"Protocol-pilled", "being literate in protocols", "protocol literacy", "protocol awareness", "protocol literacy and nerdsniping"
"Understanding and embracing the complex world of protocols, gaining deep knowledge and appreciation for their nuances and intricacies."
"To be protocol-pilled is to be both literate in the powerful emerging technological idiom of protocols and its associated discourses and, to use a term coined by Randall Munroe, nerdsniped by the deeply satisfying lenses, levers, and mental models it offers."
"To be protocol-pilled is to be literate in the powerful emerging technological idiom of protocols and its associated discourses"
"Protocol literacy", "sensitizing oneself to protocol patterns"
"Sensitizing oneself to such patterns in different environments, and learning to parse the grammars governing them, has emerged as a critical research methodology for protocols."
"Sensitizing oneself to patterns in the emergent phenomenology around a set of protocols"
"Protocol stewardship", "deep sense of history"
"A deep sense of history is necessary—without a traditionalists attachment to that history—and almost sufficient for effective protocol stewardship."
"deep sense of history is necessary... almost sufficient for effective protocol stewardship"
"Protocol whispering", "managing tensions"
"The greater the attunement to the protocolized environment, the greater the agency. The greater the attunement to mere technocracy, the lower the agency."
"greater attunement to protocolized environment, greater agency"
"Protocol whispering", "social engineering skills"
"protocol-whispering abilities often rest as much on social engineering skills as on technical engineering or architecture skills."
"protocol-whispering abilities rest as much on social engineering skills"
"Protocol awareness", "infinite game mindset"
"the game of technology becomes what the philosopher James Carse called an infinite game—one where you play to continue the game rather than to win."
"game of technology... infinite game—play to continue the game rather than to win"
"Protocol awareness", "awareness of tensions"
"the ability to navigate multiple things changing at once, not all of which you are able to even observe, let alone control."
"ability to navigate multiple things changing at once, not all observable or controllable"
"Protocol awareness", "humility and openness"
"Beyond hardening our activities against capture or co-option by narrower agendas, and doing our best to articulate, in honest but unapologetic ways, the opinionated tastes we are bringing to our curation and catalysis efforts, we aim to keep our role small and limited."
"hardening against capture, honest articulation of opinionated tastes, keep role small and limited"
"Protocol awareness", "mutualism and openness"
"on radical openness and mutualism over exclusionary control."
"on radical openness and mutualism over exclusionary control"
"Protocol awareness", "sense of responsibility"
"we must do so with the same sense of heightened responsibility we bring to other potentially dangerous technologies."
"with heightened responsibility we bring to other potentially dangerous technologies"
"Protocol awareness", "curiosity and history"
"based on foundational curiosities and a deep sense of history rather than missionary manifestos."
"based on foundational curiosities and deep sense of history rather than missionary manifestos"
"Protocol awareness", "patience and persistence"
"Protocols—if we may be forgiven a touch of evangelical hubris—are like the mills of the gods: They grind slowly, but they grind exceedingly small."
"Protocols grind slowly, but grind exceedingly small"
"Protocol awareness", "acceptance of complexity"
"Protocols do not promise a tension-free existence, where all conflicts are magically resolved. They only promise interesting new tensions and an interesting new meta of engineered arguments to manage them."
"Protocols do not promise tension-free existence, only interesting new tensions and meta of engineered arguments"
"Protocol awareness", "humility and self-reflection"
"Any attempt to create a new field and an associated set of discourses, of course, is necessarily both a political project and a practical one."
"attempt to create new field... both political project and practical one"
"Protocol awareness", "collaborative spirit"
"Many experienced an even more unsettling kind of meta-anger and meta-frustration: They discovered that not only was there no way to address their grievances, there wasnt even anywhere to direct them. ... to recognize that youre not in traffic, you are traffic."
"discovered no way to address grievances, nowhere to direct them... recognize youre not in traffic, you are traffic"
"Protocol awareness", "adaptability"
"Protocols, honestly represented, do not promise that you will face no problems or discontents—only that they wont be the same old discontents that leave you feeling trapped in the traditional paradigm."
"Protocols do not promise no problems or discontents, only they wont be same old discontents"
"Protocol awareness", "awareness of tradeoffs"
"Protocols, as engineered arguments, appear to have an unreasonable capacity to evolve coherently without the need for a fiat authority."
"Protocols as engineered arguments, unreasonable capacity to evolve coherently without fiat authority"
"Protocol awareness", "awareness of emergent properties"
"Protocols create new kinds of humans because the patterned near-invisibility of successful protocols induces a kind of deepening ludic immersion."
"Protocols create new kinds of humans, patterned near-invisibility induces deepening ludic immersion"
"Protocol awareness", "awareness of unintended consequences"
"Protocols tend to enter our lives obliquely, in the form of deceptively simple behaviors, often without even a central technological element, and go on to transform human nature in powerful ways."
"Protocols enter obliquely, deceptively simple behaviors, transform human nature in powerful ways"
"Protocol awareness", "awareness of control mechanisms"
"Protocols often instill behaviors the way Mr. Miyagi did in The Karate Kid. Daniel-san acquires karate skills without realizing it, practicing wax-on-wax-off behaviors."
"Protocols instill behaviors like Mr. Miyagi, Daniel-san acquires karate skills without realizing it"
"Protocol awareness", "awareness of unintended control"
"Where products merely create new kinds of customers, powerful protocols can sometimes create entirely new kinds of humans."
"Products create new kinds of customers, powerful protocols create entirely new kinds of humans"
"Protocol awareness", "awareness of unintended consequences of control"
"their unconscious nature can make protocols powerful mechanisms for coercive control and induced self-destruction."
"unconscious nature can make protocols powerful mechanisms for coercive control and self-destruction"
"Protocol awareness", "awareness of the importance of history"
"the things you choose to remember about the history of a protocol arguably constitute your revealed preferences about how you think it ought to evolve in the future."
"things you choose to remember about history of protocol constitute revealed preferences about future evolution"
"Protocol awareness", "awareness of the importance of collective memory"
"The evolution of protocols can be seen as ongoing arguments about what features to enshrine in the protocol itself and what associated narratives to enshrine in the meta of the protocol."
"evolution of protocols as ongoing arguments about features to enshrine in protocol and narratives in meta"
"Protocol awareness", "awareness of the importance of community"
"the goal of the program, in other words, is to create a hardened commons around the art and science of protocols, and then stop."
"goal to create hardened commons around art and science of protocols, then stop"
"Protocol awareness", "awareness of the importance of pluralism"
"the je ne sais quoi of protocols, after all, is an ineffable quality of openness, connectivity, serendipity, emergent resources, peering, heterogeneity, and pluralism."
"je ne sais quoi of protocols is ineffable quality of openness, connectivity, serendipity, emergent resources, peering, heterogeneity, pluralism"
"Protocol awareness", "awareness of the importance of self-sustaining systems"
"As the discourses we aim to catalyze become self-sustaining, hopefully supported by a growing number of individuals and organizations with a variety of perspectives and motives, the Summer of Protocols program, we hope, will become unnecessary."
"discourses become self-sustaining, supported by growing number of individuals and organizations, program will become unnecessary"
"Protocol awareness", "awareness of the importance of shared responsibility"
"we hope this volume, as an early contribution to this emerging commons, will help jumpstart this process."
"volume as early contribution to emerging commons, help jumpstart process"
"Protocol awareness", "awareness of the importance of exploration"
"We hope this book will convince you to choose exploration over retreat."
"book will convince you to choose exploration over retreat"
"Protocol awareness", "awareness of the importance of responsibility in exploration"
"we must either choose to trade old discontents for new ones, and proceed to explore these worlds on their own terms, or retreat from the adventures they promise."
"must choose to trade old discontents for new ones, explore worlds on their own terms, or retreat"
"Protocol awareness", "awareness of the importance of openness and inclusivity"
"we aim to build a coalition of diverse partners unified by a shared interest in protocols."
"aim to build coalition of diverse partners unified by shared interest in protocols"
"Protocol awareness", "awareness of the importance of bridging gaps"
"We hope to build bridges and partnerships."
"hope to build bridges and partnerships"
"Protocol awareness", "awareness of the importance of iterative improvement"
"the goal is to create a hardened commons around the art and science of protocols, and then stop."
"goal to create hardened commons, then stop"
"Protocol awareness", "awareness of the importance of self-reflection and critique"
"Any effort to create a broad new discourse, underwritten by new patterns of individual and institutional attention, risks turning into an exercise in intellectual hubris if it refuses to entertain such considerations."
"effort to create broad new discourse risks intellectual hubris if refuses to entertain considerations"
"Protocol awareness", "awareness of the importance of humility"
"we believe that this approach would be not only misguided and doomed—but would be deeply ironic in relation to the specific themes of protocols."
"approach would be misguided and doomed, deeply ironic in relation to themes of protocols"
"Protocol awareness", "awareness of the importance of patience"
"Protocols arrive slowly, and can be incredibly fragile when young, but are remarkably hard to kill once they do arrive."
"Protocols arrive slowly, fragile when young, hard to kill once arrived"
"Protocol awareness", "awareness of the importance of adaptability and resilience"
"Protocols tend to enter our lives obliquely, in the form of deceptively simple behaviors, often without even a central technological element, and go on to transform human nature in powerful ways."
"Protocols enter obliquely, deceptively simple behaviors, transform human nature in powerful ways"
"Protocol awareness", "awareness of the importance of understanding tradeoffs"
"Protocols, as engineered arguments, are evolution-aware technologies that attempt to internalize their key ongoing conflicts in structured and stylized ways, without necessarily solving them."
"Protocols as engineered arguments, evolution-aware technologies, internalize key conflicts in structured ways"
"Protocol awareness", "awareness of the importance of managing tensions"
"Protocols evolve as moving traffic jams."
"Protocols evolve as moving traffic jams"
"Protocol awareness", "awareness of the importance of community and collaboration"
"the authority of consensus memory is perhaps the closest thing protocols have to a source of continuously renewable legitimacy."
"authority of consensus memory closest thing protocols have to source of continuously renewable legitimacy"
"Protocol awareness", "awareness of the importance of fostering a sense of community"
"the goal is to create a hardened commons around the art and science of protocols."
"goal to create hardened commons around art and science of protocols"
"Protocol awareness", "awareness of the importance of fostering a sense of responsibility"
"we must either choose to trade old discontents for new ones, and proceed to explore these worlds on their own terms, or retreat from the adventures they promise."
"must trade old discontents for new ones, explore worlds on their own terms, or retreat"
"Protocol awareness", "awareness of the importance of fostering a sense of curiosity"
"we hope this book will convince you to choose exploration over retreat."
"book will convince you to choose exploration over retreat"
"Protocol awareness", "awareness of the importance of fostering a sense of openness"
"on radical openness and mutualism over exclusionary control."
"on radical openness and mutualism over exclusionary control"
"Protocol awareness", "awareness of the importance of fostering a sense of humility"
"we aim to keep our role small and limited, and indeed, shrink it over time."
"aim to keep role small and limited, shrink it over time"
"Protocol awareness", "awareness of the importance of fostering a sense of patience"
"Protocols arrive slowly, and can be incredibly fragile when young, but are remarkably hard to kill once they do arrive."
"Protocols arrive slowly, fragile when young, hard to kill once arrived"
"Protocol awareness", "awareness of the importance of fostering a sense of adaptability"
"Protocols, honestly represented, do not promise that you will face no problems or discontents—only that they wont be the same old discontents."
"Protocols do not promise no problems or discontents, only they wont be same old discontents"
"Protocol awareness", "awareness of the importance of fostering a sense of responsibility"
"we must do so with the same sense of heightened responsibility we bring to other potentially dangerous technologies."
"with heightened responsibility we bring to other potentially dangerous technologies"
"Protocol awareness", "awareness of the importance of fostering a sense of curiosity and history"
"based on foundational curiosities and a deep sense of history rather than missionary manifestos."
"based on foundational curiosities and deep sense of history rather than missionary manifestos"
Completed: ministral-3 ProtocolReaderIntro.txt output-ministral3-20260310.csv
1 Protocol-pilled being literate in protocols protocol literacy protocol awareness protocol literacy and nerdsniping
2 Understanding and embracing the complex world of protocols, gaining deep knowledge and appreciation for their nuances and intricacies.
3 To be protocol-pilled is to be both literate in the powerful emerging technological idiom of protocols and its associated discourses and, to use a term coined by Randall Munroe, nerdsniped by the deeply satisfying lenses, levers, and mental models it offers.
4 To be protocol-pilled is to be literate in the powerful emerging technological idiom of protocols and its associated discourses
5 Protocol literacy sensitizing oneself to protocol patterns
6 Sensitizing oneself to such patterns in different environments, and learning to parse the grammars governing them, has emerged as a critical research methodology for protocols.
7 Sensitizing oneself to patterns in the emergent phenomenology around a set of protocols
8 Protocol stewardship deep sense of history
9 A deep sense of history is necessary—without a traditionalist’s attachment to that history—and almost sufficient for effective protocol stewardship.
10 deep sense of history is necessary... almost sufficient for effective protocol stewardship
11 Protocol whispering managing tensions
12 The greater the attunement to the protocolized environment, the greater the agency. The greater the attunement to mere technocracy, the lower the agency.
13 greater attunement to protocolized environment, greater agency
14 Protocol whispering social engineering skills
15 protocol-whispering abilities often rest as much on social engineering skills as on technical engineering or architecture skills.
16 protocol-whispering abilities rest as much on social engineering skills
17 Protocol awareness infinite game mindset
18 the game of technology becomes what the philosopher James Carse called an infinite game—one where you play to continue the game rather than to win.
19 game of technology... infinite game—play to continue the game rather than to win
20 Protocol awareness awareness of tensions
21 the ability to navigate multiple things changing at once, not all of which you are able to even observe, let alone control.
22 ability to navigate multiple things changing at once, not all observable or controllable
23 Protocol awareness humility and openness
24 Beyond hardening our activities against capture or co-option by narrower agendas, and doing our best to articulate, in honest but unapologetic ways, the opinionated tastes we are bringing to our curation and catalysis efforts, we aim to keep our role small and limited.
25 hardening against capture, honest articulation of opinionated tastes, keep role small and limited
26 Protocol awareness mutualism and openness
27 on radical openness and mutualism over exclusionary control.
28 on radical openness and mutualism over exclusionary control
29 Protocol awareness sense of responsibility
30 we must do so with the same sense of heightened responsibility we bring to other potentially dangerous technologies.
31 with heightened responsibility we bring to other potentially dangerous technologies
32 Protocol awareness curiosity and history
33 based on foundational curiosities and a deep sense of history rather than missionary manifestos.
34 based on foundational curiosities and deep sense of history rather than missionary manifestos
35 Protocol awareness patience and persistence
36 Protocols—if we may be forgiven a touch of evangelical hubris—are like the mills of the gods: They grind slowly, but they grind exceedingly small.
37 Protocols grind slowly, but grind exceedingly small
38 Protocol awareness acceptance of complexity
39 Protocols do not promise a tension-free existence, where all conflicts are magically resolved. They only promise interesting new tensions and an interesting new meta of engineered arguments to manage them.
40 Protocols do not promise tension-free existence, only interesting new tensions and meta of engineered arguments
41 Protocol awareness humility and self-reflection
42 Any attempt to create a new field and an associated set of discourses, of course, is necessarily both a political project and a practical one.
43 attempt to create new field... both political project and practical one
44 Protocol awareness collaborative spirit
45 Many experienced an even more unsettling kind of meta-anger and meta-frustration: They discovered that not only was there no way to address their grievances, there wasn’t even anywhere to direct them. ... to recognize that you’re not in traffic, you are traffic.
46 discovered no way to address grievances, nowhere to direct them... recognize you’re not in traffic, you are traffic
47 Protocol awareness adaptability
48 Protocols, honestly represented, do not promise that you will face no problems or discontents—only that they won’t be the same old discontents that leave you feeling trapped in the traditional paradigm.
49 Protocols do not promise no problems or discontents, only they won’t be same old discontents
50 Protocol awareness awareness of tradeoffs
51 Protocols, as engineered arguments, appear to have an unreasonable capacity to evolve coherently without the need for a fiat authority.
52 Protocols as engineered arguments, unreasonable capacity to evolve coherently without fiat authority
53 Protocol awareness awareness of emergent properties
54 Protocols create new kinds of humans because the patterned near-invisibility of successful protocols induces a kind of deepening ludic immersion.
55 Protocols create new kinds of humans, patterned near-invisibility induces deepening ludic immersion
56 Protocol awareness awareness of unintended consequences
57 Protocols tend to enter our lives obliquely, in the form of deceptively simple behaviors, often without even a central technological element, and go on to transform human nature in powerful ways.
58 Protocols enter obliquely, deceptively simple behaviors, transform human nature in powerful ways
59 Protocol awareness awareness of control mechanisms
60 Protocols often instill behaviors the way Mr. Miyagi did in The Karate Kid. Daniel-san acquires karate skills without realizing it, practicing wax-on-wax-off behaviors.
61 Protocols instill behaviors like Mr. Miyagi, Daniel-san acquires karate skills without realizing it
62 Protocol awareness awareness of unintended control
63 Where products merely create new kinds of customers, powerful protocols can sometimes create entirely new kinds of humans.
64 Products create new kinds of customers, powerful protocols create entirely new kinds of humans
65 Protocol awareness awareness of unintended consequences of control
66 their unconscious nature can make protocols powerful mechanisms for coercive control and induced self-destruction.
67 unconscious nature can make protocols powerful mechanisms for coercive control and self-destruction
68 Protocol awareness awareness of the importance of history
69 the things you choose to remember about the history of a protocol arguably constitute your revealed preferences about how you think it ought to evolve in the future.
70 things you choose to remember about history of protocol constitute revealed preferences about future evolution
71 Protocol awareness awareness of the importance of collective memory
72 The evolution of protocols can be seen as ongoing arguments about what features to enshrine in the protocol itself and what associated narratives to enshrine in the meta of the protocol.
73 evolution of protocols as ongoing arguments about features to enshrine in protocol and narratives in meta
74 Protocol awareness awareness of the importance of community
75 the goal of the program, in other words, is to create a hardened commons around the art and science of protocols, and then stop.
76 goal to create hardened commons around art and science of protocols, then stop
77 Protocol awareness awareness of the importance of pluralism
78 the je ne sais quoi of protocols, after all, is an ineffable quality of openness, connectivity, serendipity, emergent resources, peering, heterogeneity, and pluralism.
79 je ne sais quoi of protocols is ineffable quality of openness, connectivity, serendipity, emergent resources, peering, heterogeneity, pluralism
80 Protocol awareness awareness of the importance of self-sustaining systems
81 As the discourses we aim to catalyze become self-sustaining, hopefully supported by a growing number of individuals and organizations with a variety of perspectives and motives, the Summer of Protocols program, we hope, will become unnecessary.
82 discourses become self-sustaining, supported by growing number of individuals and organizations, program will become unnecessary
83 Protocol awareness awareness of the importance of shared responsibility
84 we hope this volume, as an early contribution to this emerging commons, will help jumpstart this process.
85 volume as early contribution to emerging commons, help jumpstart process
86 Protocol awareness awareness of the importance of exploration
87 We hope this book will convince you to choose exploration over retreat.
88 book will convince you to choose exploration over retreat
89 Protocol awareness awareness of the importance of responsibility in exploration
90 we must either choose to trade old discontents for new ones, and proceed to explore these worlds on their own terms, or retreat from the adventures they promise.
91 must choose to trade old discontents for new ones, explore worlds on their own terms, or retreat
92 Protocol awareness awareness of the importance of openness and inclusivity
93 we aim to build a coalition of diverse partners unified by a shared interest in protocols.
94 aim to build coalition of diverse partners unified by shared interest in protocols
95 Protocol awareness awareness of the importance of bridging gaps
96 We hope to build bridges and partnerships.
97 hope to build bridges and partnerships
98 Protocol awareness awareness of the importance of iterative improvement
99 the goal is to create a hardened commons around the art and science of protocols, and then stop.
100 goal to create hardened commons, then stop
101 Protocol awareness awareness of the importance of self-reflection and critique
102 Any effort to create a broad new discourse, underwritten by new patterns of individual and institutional attention, risks turning into an exercise in intellectual hubris if it refuses to entertain such considerations.
103 effort to create broad new discourse risks intellectual hubris if refuses to entertain considerations
104 Protocol awareness awareness of the importance of humility
105 we believe that this approach would be not only misguided and doomed—but would be deeply ironic in relation to the specific themes of protocols.
106 approach would be misguided and doomed, deeply ironic in relation to themes of protocols
107 Protocol awareness awareness of the importance of patience
108 Protocols arrive slowly, and can be incredibly fragile when young, but are remarkably hard to kill once they do arrive.
109 Protocols arrive slowly, fragile when young, hard to kill once arrived
110 Protocol awareness awareness of the importance of adaptability and resilience
111 Protocols tend to enter our lives obliquely, in the form of deceptively simple behaviors, often without even a central technological element, and go on to transform human nature in powerful ways.
112 Protocols enter obliquely, deceptively simple behaviors, transform human nature in powerful ways
113 Protocol awareness awareness of the importance of understanding tradeoffs
114 Protocols, as engineered arguments, are evolution-aware technologies that attempt to internalize their key ongoing conflicts in structured and stylized ways, without necessarily ‘solving’ them.
115 Protocols as engineered arguments, evolution-aware technologies, internalize key conflicts in structured ways
116 Protocol awareness awareness of the importance of managing tensions
117 Protocols evolve as moving traffic jams.
118 Protocols evolve as moving traffic jams
119 Protocol awareness awareness of the importance of community and collaboration
120 the authority of consensus memory is perhaps the closest thing protocols have to a source of continuously renewable legitimacy.
121 authority of consensus memory closest thing protocols have to source of continuously renewable legitimacy
122 Protocol awareness awareness of the importance of fostering a sense of community
123 the goal is to create a hardened commons around the art and science of protocols.
124 goal to create hardened commons around art and science of protocols
125 Protocol awareness awareness of the importance of fostering a sense of responsibility
126 we must either choose to trade old discontents for new ones, and proceed to explore these worlds on their own terms, or retreat from the adventures they promise.
127 must trade old discontents for new ones, explore worlds on their own terms, or retreat
128 Protocol awareness awareness of the importance of fostering a sense of curiosity
129 we hope this book will convince you to choose exploration over retreat.
130 book will convince you to choose exploration over retreat
131 Protocol awareness awareness of the importance of fostering a sense of openness
132 on radical openness and mutualism over exclusionary control.
133 on radical openness and mutualism over exclusionary control
134 Protocol awareness awareness of the importance of fostering a sense of humility
135 we aim to keep our role small and limited, and indeed, shrink it over time.
136 aim to keep role small and limited, shrink it over time
137 Protocol awareness awareness of the importance of fostering a sense of patience
138 Protocols arrive slowly, and can be incredibly fragile when young, but are remarkably hard to kill once they do arrive.
139 Protocols arrive slowly, fragile when young, hard to kill once arrived
140 Protocol awareness awareness of the importance of fostering a sense of adaptability
141 Protocols, honestly represented, do not promise that you will face no problems or discontents—only that they won’t be the same old discontents.
142 Protocols do not promise no problems or discontents, only they won’t be same old discontents
143 Protocol awareness awareness of the importance of fostering a sense of responsibility
144 we must do so with the same sense of heightened responsibility we bring to other potentially dangerous technologies.
145 with heightened responsibility we bring to other potentially dangerous technologies
146 Protocol awareness awareness of the importance of fostering a sense of curiosity and history
147 based on foundational curiosities and a deep sense of history rather than missionary manifestos.
148 based on foundational curiosities and deep sense of history rather than missionary manifestos
149 Completed: ministral-3 ProtocolReaderIntro.txt output-ministral3-20260310.csv

21
script.sh Executable file
View File

@@ -0,0 +1,21 @@
#!/bin/bash
# arg1: model name
# arg2: input file
# arg3: output file
model="$1"
file="$2"
output="$3"
prompt="Review the attached text and return csv-formatted data (with no markdown wrapper or other text) for every possible incidence of a virtue for living well among protocols.
column 1: brief name of the virtue (1-3 words)
column 2: summary (1-3 paraphrased sentences, in your own words)
column 3: unique, verbatim quotation of text where the virtue appears (10-15 words), so the reference can be found
Protocols are defined extremely broadly as 'patterns of interaction,' and may be of a nontechnical nature. Encapsulate values in quotation marks to avoid breaking on commas."
llm -m "$model" -o num_ctx 128000 -f "$file" "$prompt" >> "$output"
echo "Completed: $model $file $output" >> "$output"
echo "Completed: $model $file $output"

62
text_coding/AFP.csv Normal file
View File

@@ -0,0 +1,62 @@
AFP//You have a past, but you remember it with more detail than you should. And these details cannot be stopped by time. They have become a tradition.
AFP//You have no past. Either you have forgotten it or it was erased from you. You are piecing together the rest of the story from the information of others and you have placed yourself inside. This is your protocol.
AFP//Identifying and working against these protocols necessitates civil disobedience against the limitations of institutionalized knowledge and biopolitical power that seek to govern and interpellate our bodies, our health, gender, sexuality, and (re)production.
AFP//Investigating protocols as such allows us to contribute to the creation of new protocols that are inclusive and equitable.
AFP//We were interested in how this process may contribute to long-term political organizing, which requires ongoing cycles of action, reflection, and adjustments to the dynamics and protocols of shared struggle.
AFP//Ultra-red has no single organized political affiliation. The collectives members are engaged with anti-racist movements in Britain, migrant struggles in Germany, community-based education in London, New York City, and Los Angeles, and struggles for housing and just community development in East Los Angeles.
AFP//At the passing of four and a half minutes, the workshop organizer announced, “Time.” Then we asked, “What did you hear?” We noticed that this practice increased concerns with and discussion of the contexts within which people gathered to address the crisis.
AFP//Who speaks? Whose voice is amplified? What do we speak of and to whom? Who listens, and to what end do they listen? Who has a place at the table? Who determines who has a place at the table? And on whose behalf do those seated at the table speak?
AFP//The failure to address this hegemony perpetuates divides between those who circulate within the art world and those who do not. The only acknowledgment of this divide comes in the form of “audience development” initiatives based on liberal notions of inclusion.
AFP//When effective, constitutive protocols place experience in dialogue with principles and regulations. This is what I consider the most powerful use of protocols, which is when disciplinary and constitutive protocols form a contradiction or dialectic.
AFP//This led us to borrow the concept of “desire lines”—trails or paths carved out over time, usually emerging as shortcuts between destinations. In built landscapes, they break protocol with prescribed routes. In natural environments, they often reveal animal migrations, paths used across generations. Desire lines are always a record of behavior—lines of movement suggested by previous path-takers and followed by future path-takers. Apparently, we cannot all be trailblazers. We love to follow in each others footsteps.
AFP//Breaking protocol with accepted modes of behavior in public space can feel dangerous—especially given current and historical restrictions on sexual desire and, in particular, same-sex desire.
AFP//Freedom and desire mean different things to different people at different times. So one of the central tenets is the liberating notion that we dont all have to agree. Of course, with a proposal
AFP//If I had been outside of my homeland, I then would have acknowledged whosoevers territory I was visiting, as a political affirmation of their sovereignty and self-determination and a practice of respect.
AFP//Marias smile, though, was not protocol. There is no rule that Anishinaabe begin meetings, visits, or events with a big smile; if anything, our elders tend to show less emotion in facial expressions in comparison to Euro-Canadian or American culture. I experienced her smile as entirely Anishinaabe because it was contradictory to the colonial form of our encounter and the formality of artist talks and academic conversations.
AFP//we are not the first Indigenous women or artists to sit down and have a conversation about protocols. These conversations happen all the time around kitchen tables, on sidewalks, in galleries and studios, and in the bush.
AFP//I didnt set out to break protocol; my intention was to expand our ideas around protocol or to place protocols back within the larger network of Anishinaabe ethics. If the intent of protocols is to show respect and create spaces where we could be our best selves, what happens when there is such rigidity that the protocol erodes our foundational values of consent, diversity, self-determination, and non-interference? What happens when protocol backfires and causes harm?
AFP//How can we break the cage of protocol and embody a deeper understanding of Anishinaabe ethics and values?
AFP//Anishinaabe life, to a great degree, is care work. Our foundational teachings, the Seven Ancestor teachings, in my area called the Kookum Dibajimowin, are not a set of laws or commandments, or protocols that we have to follow. Rather, they are a complex set of practices that, when embodied, both individually and in relation to other living things, create a world in which consent, accountability, problem solving, and kindness are embedded.
AFP//remember very early on in my career being out on the land with an Elder hunting geese. We shot one, and he had forgotten his tobacco. I remember wondering what was going to happen, because it is our practice to show gratitude through reciprocity, and normally this is done through an offering of tobacco. The Elder who I was with left a tiny bit of his baloney sandwich. When I asked him if this was going to be OK with the geese, he said “Of course,” because the gesture was thoughtful and would be seen by the geese as an expression of deep respect.
AFP//Avoid using protocol to demonstrate how much of your culture youve recovered and instead use our practices as a point of connection and to create belonging and nurture relationships.
AFP//It needs to go back to family and community, figuring out who you are, where you come from, what your family gifts, what your gifts are that you have to contribute, cause they are not the same, and they are not always what we want them to be either.
AFP//An essential element of my practice is what I call spiritual fieldwork, or the process of developing relationships with the human and nonhuman entities of a particular place or field in tandem with gathering information.
AFP//I think time is an Indigenous currency, one that we especially lack in our capitalist society. Listening also requires that you be present, allowing what you hear to shape the process at every step.
AFP//When trust has been built, it is important to be aware of ones limitations, not to overstep, and not to overcommit. Trust is maintained by keeping promises, contracts, and boundaries.
AFP//reciprocity takes shape in responding to calls for mutual aid at any level, and by doing so it supports collectivities through personal and professional interactions.
AFP//In all Indigenous cultures, there is a natural law, a model of the world in which energies fluctuate between different levels. Associated with this vision of perpetual energy movement is the protocol of pagamento, or payback, which is the need to act based on the principle of reciprocity, to always give something in exchange for what is obtained, be it something material or service of any kind.
AFP//The protocols I have shared here are not set in stone—they shift as I learn and grow, as society grows, and as the circumstances of our planet change rapidly.
AFP//Let us collectively recommit to center and sustain life through our diverse practices. Let us remember that we are all related and that our futures are intertwined.
AFP//Stay low to the ground. Stay nimble and mobile (shifting between places, scales, times, elements). Keep it trans-local. Attend to the lower parts of the body. Think with and of pregnancy, with and of forms of degraded trans*ition, transformation, metamorphosis. Use your nose.36 Follow the shit. Follow the power. Follow the money.37
AFP//I argue that this is the kind of approach we need as we think through the nexus of ecology, climate, and racism. This grounding approach does not take refuge in ideal theory (climate ethics) or abstract calculations of emissions (some climate justice) but rather gets down in the muck, in the matter of life and death, to think and be in ways that (to borrow from Wynter) are “down to earth.”
AFP//The behaviors that we think liberate us are based on the disappointments of the past and keep us constrained within the confines of colonial imaginations dispossessing us of our purpose and, ultimately, our freedom.
AFP//To choose the self without fixing, changing, guilting, or blaming, we also have to choose rather than deny, escape, or wish away the histories that made us. We have to embark on a new protocol.
AFP//Escapism is one of the various epigenetic expressions I carry as a descendant of enslaved Indigenous peoples. I have the ability to not be here now as a way of enduring the present and making my way toward the future. Afrofuturist narratives like the folktales of High John and Brerer Rabbit were an already-always part of me when I needed hope—a cartography towards freedom letting me know that other ways of being are possible and that I am not stuck here.
AFP//It does not honor our ancestors to create a binary construction of embodiment as celebration and disembodiment as problematic. We will not dismiss and flatten the narratives of escape.
AFP//Whether slow or fast, micro or macro, invisible or detectable, this unseen world is responsible for a deep interconnectedness across species, substances, and timescales.
AFP//if we think through our vast entanglements under the molecular semiosphere, there are no such categories. We are already alien.
AFP//These exercises produce what AiG calls “cultivating an art of combinations,” or an art of symbiosis that “recomposes the commons in an odd world.”10 Working with AiG was the moment I began to see the potential of biohacking and collective world-making and the possibility of neutralizing a deeply ingrained fear conditioned in us from birth. More importantly, I learned that only from this point of emancipatory
AFP//There is no hard separation, clear boundary, or final destination in the form of an apocalypse, and perhaps we should all stop hoping for one. There are only relations—entanglements that transform us every day.
AFP//We ask that, in entering this essay, you do not merely distill the offerings emerging from it for your needs and desires.8
AFP//Access as accommodation cannot truly value disability culture, joy, and knowledge of ways to live otherwise, as it is fundamentally a project of normalization that neutralizes the political world-building potential of access as it is and has been practiced between humans unmediated by vast organizational bodies. The ableist world is just fine as it is and surely everybody wants in, right?
AFP//Access-centered practices include protocols because certain needs are best met with consistent solutions (like ASL interpretation), but access overall cant be reduced to protocols.43 When access practices are responsive to the nuance and mutability of needs, responsibility for access becomes collectivized into culture rather than held by experts or individuals with static roles in policy, protocol, and procedure.
AFP//Dependency and interdependency are where we materially and affectively meet: our needs are what connect us to one another, they bring us into the vulnerabilities of both love and harm.
AFP//These artworks hold the persistence and necessary creativity of access-centered life, embodying how disability justice organizer Mia Minguss concept of access intimacy comes out of (conscious or unconscious) praxis. Mingus emphasizes the possibility for access intimacy to occur instantaneously between people without shared experience or political identity. This intimacy need not be communicated linguistically, offering an intuitive, non-identity based, affective lens onto modes of relation beyond policy.48 Access intimacy centers the affective aspects of access essential to access-centered practice.
AFP//Within, we learn each others protocols (How do I inject you? When do you have to go to hospital despite the risks associated with being undocumented?). We cultivate practices of care that exceed what protocols encompass (What types of touch does my body welcome? Do you enjoy metaphors when I describe images to you? Who has space to host others?). Amongst, we fuck with policy—negotiate, circumvent, and refuse it. Work it, flip it, and reverse it.
AFP//The infrastructure and its limitations have predetermined the communication trajectory and centered the West as a hub through which all information moves, making the internets architecture political.
AFP//To Wood, Web3 is about building systems that dont rely on trusting people, corporations, or governments to make moral choices, but that instead render evil choices impossible.”
AFP//By care-based internet protocols, I mean a set of rules and guidelines that prioritize the well-being of users, their privacy, and their security over other considerations such as convenience or profit. These protocols move us away from technical jargon and encourage access through consentful participation.10
AFP//Redesigning the collective timeline cannot be accomplished by a single, solitary voice or action, nor by a small group of individuals. It requires shared responsibility and agreement from multiple communities and their branching timelines. It calls for the collaboration of multiple forces from different times, spaces, and narratives.
AFP//participants were invited to create their own representations of space-time disentangled from racial capitalist patriarchy. They were encouraged to imagine and visualize a space-time that transcends oppressive systems and structures through a series of reflective questions exploring the aesthetics and sensory experiences of their alternative space-time, such as: What does it look, sound, smell, and taste like? Who is present within this space-time? How do individuals choose to act or refrain from certain actions? And most importantly, how do they feel within this space-time free from the constraints of racial capitalist patriarchy?
AFP//Protocols, resolutions, and practices are meant to be replicable and will be revisited at some collectively agreed-upon time and space.
AFP//That part of the thinking of Blackness in terms of Black studies is something other than the individual biography, individual greatness, or the individual artist being an individual genius. I think were all invited into something other than individuation in this symposium with the mode of artistic practices. Part of what I hear from Nadirs cloud science is also a science of collectivity. That collectivity is a protocol for conducting science.
AFP//Each individual cloud, as you can see, its kind of chaotic. They all have their small differences, but it turns out that they actually have a lot in common. The best way to describe it is by thinking of them as one collective entity and describing their behavior collectively.
AFP//happening in the atmosphere is instantaneous from the point of view of the deep ocean; three to five years is nothing. When were thinking in terms of this deep climate time or this deep time, again, relative to a concrete change thats happening here, the adjustment time here is invisible. Its instant.
AFP//what if rather than remixing and repurposing existing protocols, we orchestrated new ones—protocols that, instead of summoning us into productive labor, compliant tool use, or compulsive consumption, cultivate a soundtrack for camaraderie or care or caprice? Can we imagine an alarm clock whose aubade, or morning song, awakens us into an otherwise world of possibility?
AFP//Each day, especially after I have taken photographs of the desk, I write in the notebook. How I have managed to do that all month takes me by surprise. I have never undertaken such an activity, habitually skirting through several notebooks as though incapable of regimen. I imagine this sudden focus has to do with five years of attempting to write a novel—novels, in fact, at one point, coming to forty thousand words—and failing to see the point, the throughline to connect story with imperative.
AFP//I was an active participant in the perpetuation of the protocols of that very culture, which I grew accustomed to over many years. These unspoken criteria applied not just to job interviews but to all kinds of curatorial closed-door meetings where we would discuss research, invite scholars to speak on certain topics, or discuss issues connected with exhibitions.
AFP//the particular role of the art museum as a tastemaker, gatekeeper, and arbiter of high-end culture has created the demands of a particular economic and cultural model and its intrinsic protocols that, as I will try to argue, are highly fragile and, because of their fragility, highly conservative in their financial and intellectual ambitions.
AFP//Once we step outside the metaphorical classroom, we put protocols in motion in order to welcome everyone into these encounters: we work across platforms; we adjust language, design, content, technology; and we insert periods of reflection and time to accommodate different time spans and evolutions in thinking.
AFP//Taking the topic of protocols at its most radical form of collective intervention, we had hoped to push the standards of peer review even further with this volume.
AFP//For this book, we decided to produce two separate versions and make them available. One is a designed PDF fixed layout—a version that mirrors the printed book and foregrounds the design as a protocol-related feature—and the other is an EPUB file that does not have many of the design features, but it includes all the text of the book while still being extremely accessible to assisted reading devices.
AFP//What weve learned from this volume is that a protocol—a form embedded in the origins of publishing itself as a medium—can be unbound from any particular monovocal convention.
1 AFP//You have a past, but you remember it with more detail than you should. And these details cannot be stopped by time. They have become a tradition.
2 AFP//You have no past. Either you have forgotten it or it was erased from you. You are piecing together the rest of the story from the information of others and you have placed yourself inside. This is your protocol.
3 AFP//Identifying and working against these protocols necessitates civil disobedience against the limitations of institutionalized knowledge and biopolitical power that seek to govern and interpellate our bodies, our health, gender, sexuality, and (re)production.
4 AFP//Investigating protocols as such allows us to contribute to the creation of new protocols that are inclusive and equitable.
5 AFP//We were interested in how this process may contribute to long-term political organizing, which requires ongoing cycles of action, reflection, and adjustments to the dynamics and protocols of shared struggle.
6 AFP//Ultra-red has no single organized political affiliation. The collective’s members are engaged with anti-racist movements in Britain, migrant struggles in Germany, community-based education in London, New York City, and Los Angeles, and struggles for housing and just community development in East Los Angeles.
7 AFP//At the passing of four and a half minutes, the workshop organizer announced, “Time.” Then we asked, “What did you hear?” We noticed that this practice increased concerns with and discussion of the contexts within which people gathered to address the crisis.
8 AFP//Who speaks? Whose voice is amplified? What do we speak of and to whom? Who listens, and to what end do they listen? Who has a place at the table? Who determines who has a place at the table? And on whose behalf do those seated at the table speak?
9 AFP//The failure to address this hegemony perpetuates divides between those who circulate within the art world and those who do not. The only acknowledgment of this divide comes in the form of “audience development” initiatives based on liberal notions of inclusion.
10 AFP//When effective, constitutive protocols place experience in dialogue with principles and regulations. This is what I consider the most powerful use of protocols, which is when disciplinary and constitutive protocols form a contradiction or dialectic.
11 AFP//This led us to borrow the concept of “desire lines”—trails or paths carved out over time, usually emerging as shortcuts between destinations. In built landscapes, they break protocol with prescribed routes. In natural environments, they often reveal animal migrations, paths used across generations. Desire lines are always a record of behavior—lines of movement suggested by previous path-takers and followed by future path-takers. Apparently, we cannot all be trailblazers. We love to follow in each others’ footsteps.
12 AFP//Breaking protocol with accepted modes of behavior in public space can feel dangerous—especially given current and historical restrictions on sexual desire and, in particular, same-sex desire.
13 AFP//Freedom and desire mean different things to different people at different times. So one of the central tenets is the liberating notion that we don’t all have to agree. Of course, with a proposal
14 AFP//If I had been outside of my homeland, I then would have acknowledged whosoever’s territory I was visiting, as a political affirmation of their sovereignty and self-determination and a practice of respect.
15 AFP//Maria’s smile, though, was not protocol. There is no rule that Anishinaabe begin meetings, visits, or events with a big smile; if anything, our elders tend to show less emotion in facial expressions in comparison to Euro-Canadian or American culture. I experienced her smile as entirely Anishinaabe because it was contradictory to the colonial form of our encounter and the formality of artist talks and academic conversations.
16 AFP//we are not the first Indigenous women or artists to sit down and have a conversation about protocols. These conversations happen all the time around kitchen tables, on sidewalks, in galleries and studios, and in the bush.
17 AFP//I didn’t set out to break protocol; my intention was to expand our ideas around protocol or to place protocols back within the larger network of Anishinaabe ethics. If the intent of protocols is to show respect and create spaces where we could be our best selves, what happens when there is such rigidity that the protocol erodes our foundational values of consent, diversity, self-determination, and non-interference? What happens when protocol backfires and causes harm?
18 AFP//How can we break the cage of protocol and embody a deeper understanding of Anishinaabe ethics and values?
19 AFP//Anishinaabe life, to a great degree, is care work. Our foundational teachings, the Seven Ancestor teachings, in my area called the Kookum Dibajimowin, are not a set of laws or commandments, or protocols that we have to follow. Rather, they are a complex set of practices that, when embodied, both individually and in relation to other living things, create a world in which consent, accountability, problem solving, and kindness are embedded.
20 AFP//remember very early on in my career being out on the land with an Elder hunting geese. We shot one, and he had forgotten his tobacco. I remember wondering what was going to happen, because it is our practice to show gratitude through reciprocity, and normally this is done through an offering of tobacco. The Elder who I was with left a tiny bit of his baloney sandwich. When I asked him if this was going to be OK with the geese, he said “Of course,” because the gesture was thoughtful and would be seen by the geese as an expression of deep respect.
21 AFP//Avoid using protocol to demonstrate how much of your culture you’ve recovered and instead use our practices as a point of connection and to create belonging and nurture relationships.
22 AFP//It needs to go back to family and community, figuring out who you are, where you come from, what your family gifts, what your gifts are that you have to contribute, ‘cause they are not the same, and they are not always what we want them to be either.
23 AFP//An essential element of my practice is what I call spiritual fieldwork, or the process of developing relationships with the human and nonhuman entities of a particular place or field in tandem with gathering information.
24 AFP//I think time is an Indigenous currency, one that we especially lack in our capitalist society. Listening also requires that you be present, allowing what you hear to shape the process at every step.
25 AFP//When trust has been built, it is important to be aware of one’s limitations, not to overstep, and not to overcommit. Trust is maintained by keeping promises, contracts, and boundaries.
26 AFP//reciprocity takes shape in responding to calls for mutual aid at any level, and by doing so it supports collectivities through personal and professional interactions.
27 AFP//In all Indigenous cultures, there is a natural law, a model of the world in which energies fluctuate between different levels. Associated with this vision of perpetual energy movement is the protocol of pagamento, or payback, which is the need to act based on the principle of reciprocity, to always give something in exchange for what is obtained, be it something material or service of any kind.
28 AFP//The protocols I have shared here are not set in stone—they shift as I learn and grow, as society grows, and as the circumstances of our planet change rapidly.
29 AFP//Let us collectively recommit to center and sustain life through our diverse practices. Let us remember that we are all related and that our futures are intertwined.
30 AFP//Stay low to the ground. Stay nimble and mobile (shifting between places, scales, times, elements). Keep it trans-local. Attend to the lower parts of the body. Think with and of pregnancy, with and of forms of degraded trans*ition, transformation, metamorphosis. Use your nose.36 Follow the shit. Follow the power. Follow the money.37
31 AFP//I argue that this is the kind of approach we need as we think through the nexus of ecology, climate, and racism. This grounding approach does not take refuge in ideal theory (climate ethics) or abstract calculations of emissions (some climate justice) but rather gets down in the muck, in the matter of life and death, to think and be in ways that (to borrow from Wynter) are “down to earth.”
32 AFP//The behaviors that we think liberate us are based on the disappointments of the past and keep us constrained within the confines of colonial imaginations dispossessing us of our purpose and, ultimately, our freedom.
33 AFP//To choose the self without fixing, changing, guilting, or blaming, we also have to choose rather than deny, escape, or wish away the histories that made us. We have to embark on a new protocol.
34 AFP//Escapism is one of the various epigenetic expressions I carry as a descendant of enslaved Indigenous peoples. I have the ability to not be here now as a way of enduring the present and making my way toward the future. Afrofuturist narratives like the folktales of High John and Brerer Rabbit were an already-always part of me when I needed hope—a cartography towards freedom letting me know that other ways of being are possible and that I am not stuck here.
35 AFP//It does not honor our ancestors to create a binary construction of embodiment as celebration and disembodiment as problematic. We will not dismiss and flatten the narratives of escape.
36 AFP//Whether slow or fast, micro or macro, invisible or detectable, this unseen world is responsible for a deep interconnectedness across species, substances, and timescales.
37 AFP//if we think through our vast entanglements under the molecular semiosphere, there are no such categories. We are already alien.
38 AFP//These exercises produce what AiG calls “cultivating an art of combinations,” or an art of symbiosis that “recomposes the commons in an odd world.”10 Working with AiG was the moment I began to see the potential of biohacking and collective world-making and the possibility of neutralizing a deeply ingrained fear conditioned in us from birth. More importantly, I learned that only from this point of emancipatory
39 AFP//There is no hard separation, clear boundary, or final destination in the form of an apocalypse, and perhaps we should all stop hoping for one. There are only relations—entanglements that transform us every day.
40 AFP//We ask that, in entering this essay, you do not merely distill the offerings emerging from it for your needs and desires.8
41 AFP//Access as accommodation cannot truly value disability culture, joy, and knowledge of ways to live otherwise, as it is fundamentally a project of normalization that neutralizes the political world-building potential of access as it is and has been practiced between humans unmediated by vast organizational bodies. The ableist world is just fine as it is and surely everybody wants in, right?
42 AFP//Access-centered practices include protocols because certain needs are best met with consistent solutions (like ASL interpretation), but access overall can’t be reduced to protocols.43 When access practices are responsive to the nuance and mutability of needs, responsibility for access becomes collectivized into culture rather than held by experts or individuals with static roles in policy, protocol, and procedure.
43 AFP//Dependency and interdependency are where we materially and affectively meet: our needs are what connect us to one another, they bring us into the vulnerabilities of both love and harm.
44 AFP//These artworks hold the persistence and necessary creativity of access-centered life, embodying how disability justice organizer Mia Mingus’s concept of access intimacy comes out of (conscious or unconscious) praxis. Mingus emphasizes the possibility for access intimacy to occur instantaneously between people without shared experience or political identity. This intimacy need not be communicated linguistically, offering an intuitive, non-identity based, affective lens onto modes of relation beyond policy.48 Access intimacy centers the affective aspects of access essential to access-centered practice.
45 AFP//Within, we learn each other’s protocols (How do I inject you? When do you have to go to hospital despite the risks associated with being undocumented?). We cultivate practices of care that exceed what protocols encompass (What types of touch does my body welcome? Do you enjoy metaphors when I describe images to you? Who has space to host others?). Amongst, we fuck with policy—negotiate, circumvent, and refuse it. Work it, flip it, and reverse it.
46 AFP//The infrastructure and its limitations have predetermined the communication trajectory and centered the West as a hub through which all information moves, making the internet’s architecture political.
47 AFP//To Wood, Web3 is about building systems that don’t rely on trusting people, corporations, or governments to make moral choices, but that instead render evil choices impossible.”
48 AFP//By care-based internet protocols, I mean a set of rules and guidelines that prioritize the well-being of users, their privacy, and their security over other considerations such as convenience or profit. These protocols move us away from technical jargon and encourage access through consentful participation.10
49 AFP//Redesigning the collective timeline cannot be accomplished by a single, solitary voice or action, nor by a small group of individuals. It requires shared responsibility and agreement from multiple communities and their branching timelines. It calls for the collaboration of multiple forces from different times, spaces, and narratives.
50 AFP//participants were invited to create their own representations of space-time disentangled from racial capitalist patriarchy. They were encouraged to imagine and visualize a space-time that transcends oppressive systems and structures through a series of reflective questions exploring the aesthetics and sensory experiences of their alternative space-time, such as: What does it look, sound, smell, and taste like? Who is present within this space-time? How do individuals choose to act or refrain from certain actions? And most importantly, how do they feel within this space-time free from the constraints of racial capitalist patriarchy?
51 AFP//Protocols, resolutions, and practices are meant to be replicable and will be revisited at some collectively agreed-upon time and space.
52 AFP//That part of the thinking of Blackness in terms of Black studies is something other than the individual biography, individual greatness, or the individual artist being an individual genius. I think we’re all invited into something other than individuation in this symposium with the mode of artistic practices. Part of what I hear from Nadir’s cloud science is also a science of collectivity. That collectivity is a protocol for conducting science.
53 AFP//Each individual cloud, as you can see, it’s kind of chaotic. They all have their small differences, but it turns out that they actually have a lot in common. The best way to describe it is by thinking of them as one collective entity and describing their behavior collectively.
54 AFP//happening in the atmosphere is instantaneous from the point of view of the deep ocean; three to five years is nothing. When we’re thinking in terms of this deep climate time or this deep time, again, relative to a concrete change that’s happening here, the adjustment time here is invisible. It’s instant.
55 AFP//what if rather than remixing and repurposing existing protocols, we orchestrated new ones—protocols that, instead of summoning us into productive labor, compliant tool use, or compulsive consumption, cultivate a soundtrack for camaraderie or care or caprice? Can we imagine an alarm clock whose aubade, or morning song, awakens us into an otherwise world of possibility?
56 AFP//Each day, especially after I have taken photographs of the desk, I write in the notebook. How I have managed to do that all month takes me by surprise. I have never undertaken such an activity, habitually skirting through several notebooks as though incapable of regimen. I imagine this sudden focus has to do with five years of attempting to write a novel—novels, in fact, at one point, coming to forty thousand words—and failing to see the point, the throughline to connect story with imperative.
57 AFP//I was an active participant in the perpetuation of the protocols of that very culture, which I grew accustomed to over many years. These unspoken criteria applied not just to job interviews but to all kinds of curatorial closed-door meetings where we would discuss research, invite scholars to speak on certain topics, or discuss issues connected with exhibitions.
58 AFP//the particular role of the art museum as a tastemaker, gatekeeper, and arbiter of high-end culture has created the demands of a particular economic and cultural model and its intrinsic protocols that, as I will try to argue, are highly fragile and, because of their fragility, highly conservative in their financial and intellectual ambitions.
59 AFP//Once we step outside the metaphorical classroom, we put protocols in motion in order to welcome everyone into these encounters: we work across platforms; we adjust language, design, content, technology; and we insert periods of reflection and time to accommodate different time spans and evolutions in thinking.
60 AFP//Taking the topic of protocols at its most radical form of collective intervention, we had hoped to push the standards of peer review even further with this volume.
61 AFP//For this book, we decided to produce two separate versions and make them available. One is a designed PDF fixed layout—a version that mirrors the printed book and foregrounds the design as a protocol-related feature—and the other is an EPUB file that does not have many of the design features, but it includes all the text of the book while still being extremely accessible to assisted reading devices.
62 AFP//What we’ve learned from this volume is that a protocol—a form embedded in the origins of publishing itself as a medium—can be unbound from any particular monovocal convention.

81
text_coding/PR.csv Normal file
View File

@@ -0,0 +1,81 @@
PR//the modern burglar often understands the protocols of urbanism better than the insiders who are their nominal stewards. In a world that increasingly comprises protocols, power follows knowledge, not ascriptive authority.
PR//the hero of a protocolized world has mastered a general set of technological patterns that undergird not just the internal realities of organizations across the entire planet but even the interstitial spaces between them.
PR//what we might call the protocol punk hero operates from within a protocolized environment where boundaries separating insides and outsides are increasingly meaningless.
PR//the protocol punk hero, unlike the bureaucratic hero or the outsider maverick, is master of both smooth and striated spaces, and able to navigate both arborescent and rhizomatic epistemic environments.
PR//It is easy to miss the myriad invisible ways in which clock time structures our lives, from train schedules and norms of scheduling meetings to begin at half-hour boundaries, to the structuring of work and leisure hours by calendars with roots in ancient religions.
PR//Every successful protocol, arguably, is the result of successfully anticipating some sort of traffic jam, and presciently engineering mechanisms to manage the underlying tensions.
PR//Unlike the epic heroes of antiquity, or even cyberpunk heroes, protocol punk heroes are rarely lone wolves. Instead, they often exhibit remarkable social skills. Their uncanny protocol-whispering abilities often rest as much on social engineering skills as on technical engineering or architecture skills.
PR//major component of the work of protocol whisperers is to manage constantly shifting tensions at an ecosystem level, rather than within a single organization
PR//trusted relationships with allies on many sides of many active arguments
PR//a strong sense of the collective memory of an evolving commons.
PR//protocol design and architecture conversations, a truly remarkable amount of conscious and active attention is devoted to things like selection pressures, incentives, red-teaming, and modeling of emergent equilibria. Unlike the engineer in a private corporation, or the bureaucrat in a hospital or a government agency, the protocol whisperer must simultaneously think like an Organization Man, a central banker, a hacker, a market maker, and a military strategist
PR//Efforts to create the right engineered arguments are the exceptions. Playing to win is the norm. Playing to continue the game is rare.
PR//The pluralist infinite-game idea of a protocol as an engineered argument can be contrasted with a complementary “playing to win” definition of an API
PR//There are also non-human single points of failure (SPOFs). In a thoughtful critique, Moxie Marlinspike, co-creator of the Signal messaging protocol, pointed out the many SPOF vulnerabilities in the Ethereum ecosystem.14 In the worst cases, they can lurk unseen until they cause the unexpected fatal collapse of a valued protocol.
In well-managed protocols, SPOFs are broadly recognized, consciously managed, gradually mitigated, progressively moved to less and less critical loci, and in the best cases, eliminated altogether.
PR//When it comes to protocols, sticking to any kind of ideological hardline position cedes agency to those willing to participate in the engineered arguments. There is no winning move, and the only way to continue to play is to recognize that youre not in traffic, you are traffic.
PR//Part 4, Living With Protocols
PR//is easier to reorganize the furniture in ones house than to change the buildings structure or expand the site on which its built. Longer-term interventions in the built environment that adapt the base layers to new conditions are still worthwhile—they are as critical as ever—but, for individuals working at smaller spatial and temporal scales, the “software” (and the protocols that mediate it) may be a more fruitful domain of intervention than the hardware
PR//Today we build fulfillment centers, freeways, container ships, and supertall skyscrapers, all accidental monuments to the various protocols that utilize them, and equally impressive (but usually more esoteric, largely appreciated by the “protocol literate”). Unlike cathedrals and pyramids, the charismatic qualities of protocol monuments are likely to be incidental, a side effect of their primary purpose.
PR//As our world becomes increasingly automated, networked, and sensor-filled, our levels of awareness regarding the invisible interfaces, processes, and protocols through which computers comprehend our world will translate into a new awareness of physical space. Our digital literacy will enable us to retain a sense of effective agency as we design and navigate what is a new category of virtual worlds operating (through the assistance of automation) within the medium of physical space.
PR//To deal with limited memory and processing powers, we get used to things going well. The result: our brains only notice when things go wrong—when there is an event. We do not notice the non-events (i.e., the status quo, the day-to-day). But events and non-events are both consequences of human actions. No actions, no events. Action performance varies, putting the dynamic in dynamic non-event.90 Safety is a dynamic non-event. Talking about safety (and health) is difficult because it is a sustained absence of events, not an event itself.
PR//health protocols dont have fast feedback loops, so adoption is challenging. From my experience, we operate more proactively when the risk is obvious, probable, and has the possibility of immediate harm. Safety issues trigger acute stress responses that encourage action. Anything beyond obvious risk requires empathy for a “future version of oneself” that is difficult to nurture. This can change via instrumentation, such as calorie, nutrient, movement trackers, and continuous glucose, heart rate, and sleep monitors.
PR//Following protocol involves several actions: perceive another person following protocol or receive instructions on how to follow the protocol; store the protocol in memory; and replicate the protocol. Errors can occur during any one of these actions. The primary way that protocols mutate is via such unintentional errors. A protocol is a type of meme: like genes, protocols reproduce using humans as hosts.
PR//The other two ways that protocols mutate is through tinkering and design.
PR//The three sources of protocol mutation, characterized by their pace and strength, are design, tinkering, and memetic error. They fall on a spectrum of pace and strength of mutation
PR//Protocol systems are always two things at once—individuals and a group. A bistable perception—individual versus system—is actually important in examining them. If we only think about the aggregated whole, we may overlook harms suffered by individuals within the system or problematic power dynamics masked by the continued functioning of the system. On the other hand, if we only focus on individuals within the system, we may miss emergent risks and benefits coming from the system as a whole.
PR//If there is a bad fit between your internal self and your role, you can suffer from a sense of compelled inauthenticity, or dysphoria, while if there is a good fit, and you authentically align with your role, you can thrive.
PR//If Pip has awareness of a protocol system, they are “seeing the water” that they swim in—the culture and world (protocol system) that surrounds them, shapes them, and constrains them. When aware, Pip sees the ocean they swim in, knows that other oceans and non-oceans exist, knows how they got into their ocean, and understands that the ocean currents affect their movements.
PR//Pip has awareness with regard to a particular protocol system if they know:
that they are entering, participating in, or exiting it;
that they play a certain role within it;
that there are alternatives to joining or participating in this particular protocol system;
whether they entered the system by choice or under the influence or control of others; and
that the protocol is influencing their thoughts and actions.
PR//Insight is about the depth of knowledge and understanding Pip has about a protocol system.156 Insight allows a person to make a meaningful choice about their participation and role within a protocol system.
PR//As we become more networked, opportunities for alignment and attunement technologies will become increasingly apparent. They present a possible path to support the success of swarms and other online formations while addressing platform business needs.
PR//A nascent sensibility defined here, orientation can be understood as a form of situational awareness that arranges knowledge in a selective and associative manner aligned with a particular purpose. Orientation enables navigation based on partial cues, feelings, and hints within an environment, without presuming complete situational awareness.
PR//Fixed, hard points across time that let us make the world more predictable.
We need these hard points because it is impossible to coordinate at scale without them. Money doesnt work unless there is a degree of certainty it will still be valuable in the future. Trade is very risky if there isnt confidence that parties will follow their commitments.
PR//Good rituals can liberate the individual—in the case of the artist—by helping them coordinate their actions towards their creative goals. Protocols are not just about constraints that are necessarily enforced at the cost of creativity and liberty; they can generate creativity and liberty, if well-designed and implemented.
PR//the art of protocol subversion looks more commonly like tai chi, where participants follow protocol, but in a way that better suits their needs. As Galloway proposed, “it is through protocol that one must guide ones efforts, not against it.”
PR//Instead of resisting protocols, we ought to bring a greater awareness to their overall influence, so that we can make better decisions about which protocols we wish to be a part of and how we might live peaceably under their reign.
PR//Any sufficiently healthy world will spawn activity in peripheral forums where the protocol is discussed. It will spread and animate spaces outside itself. The life of the world is not only in the world. Looking for these spaces is an important and often overlooked world-assessment criteria.
PR//Protocol makers, know this: your protocol will die. It may become so inflexible that it must be discarded —“if the constitution is too rigid, it becomes necessary to kill the king”412—or the conditions around it may change so much as to become unrecognizable.
PR//to your protocol and whether they would withstand an existential question
PR//In The Timeless Way of Building, Christopher Alexander argues that patterns in architecture and the urban organization have a “quality without a name” that makes a house, a street, a town more or less “alive.” We perceive a place as alive when it is structured or organized to allow congruence within us—this congruence is the capacity to align us with our biological reality and natural desires, allowing those forces to move freely.
PR//Flourishing requires the cultivation of character, which almost always requires that we examine the systems to which we are beholden and that we break with our narratives and frames. This requires us to take responsibility for our own development—a mindset at odds with mindlessly following a protocol. Like bad habits (which are, after all, effective habits), effective protocols make it easy for people to continue following protocol.
PR//order to pursue flourishing, one must take responsibility for ones actions and life—if participants are disposed by the protocol to reject responsibility, and if the protocol forms a significant part of their life (say, as a social, cultural, or religious protocol), then flourishing is hindered
PR//In some situations, all that is needed for the emergence of a good protocol is the recognition and diffusion of good solutions that are also easy to imitate.
PR//Good protocols learn, grow, and mature in ways that catalyze thoughtful stewardship and sustained generativity. Bad protocols on the other hand, if they avoid early mortality, tend to become increasingly neglected over time, leading to extended periods of sterility and stagnation, and succumbing to capture and corruption.
PR//Good protocols seem to strike a robust balance between ensuring order at some loci, and inducing serendipitous creative chaos at adjacent loci. As a result, within their sphere of influence, they create conditions of exceptional serendipity, or at least significantly reduced malevolence,
PR//good protocols seem to thread the needle between too much and too little automation, and too much and too little room for discretionary governance decisions, stabilizing at the right level for their circumstances. They are sufficiently stewardable.
PR//consideration of trade-offs, costs and benefits, and thorough evaluation of designs, leading to good engineering outcomes. They are neither so underconstrained that arbitrary tastes can drive outcomes, nor so overconstrained that there are no good solutions to problems at all. Instead, they encourage a search for opinionated but principled solutions to core problems
PR//areas in the study of protocols, and the one that comes closest to rising to the level of a science. Our ability to design and build better protocols is strongly driven by the quality of our understanding of fundamental limits, and cultures of tastefully opinionated leadership for navigating them
PR//A feature common to protocols and adjacent categories such as APIs, grammars, or rules, is their relationship to literacy. Every protocol, arguably, is by definition also a literacy that takes effort to acquire and practice. The value of a protocol is a strong function of the ease with which participants can acquire literacy and fluency in the behaviors it codifies.
PR//An effective culture of literacy around a protocol ensures that all participants have the skills necessary to safely and productively participate in it. Mass or retail participants must have sufficient literacy to use protocols safely. For example, pedestrians and drivers must understand and respond to traffic signals. Expert participants and stewards must have enough literacy to govern the protocol and evolve it in the face of changing circumstances and evolving domain knowledge. Creating and sustaining a broad-based culture of literacy around a protocol is a non-trivial task, but is often underestimated, and either treated as a promotional task, to be handled alongside marketing or public relations, or a matter of foolproof user-experience design.
PR//Good protocols are not just sufficiently learnable, they are sufficiently hackable to do without formal educational institutions, especially early in their histories.
PR//This ludic quality is arguably essential for meaning-making, and is conceivably the spiritual essence of protocols.
PR//Good protocols, arguably, are sufficiently ludic to serve as engines of meaning-making beyond their nominal functions, while also fulfilling their nominal functions.
PR//surprisingly many protocols manage to survive early mortality threats and achieve equilibrium states where they are sufficiently defensible to function anyway, even if in significantly diseased conditions. Surprisingly small groups of well-positioned stewards can keep established and critical protocols going long past the point where critics predict they should have succumbed to their varied apparently fatal vulnerabilities.
PR//While protocols can be hard to kill, and sufficiently defensible against their threat environments, they are neither impossible to kill, nor naturally immortal. They are sufficiently mortal that they do not persist indefinitely, choking the domains they organize. The League of Nations, which preceded the United Nations, is an example of a geopolitical protocol that died after it failed to fulfill its functions in the 1930s.
PR//Standards-making, it turns out, is high-leverage design, ripe with the ability to change the technological playing field in ways that no individual firm can on its own. Its like finding the control room of our modern world.
PR//best way to learn how to work with standards is by studying how theyve evolved over time.
PR//true standards movement must be rooted in the fundamentals. The idealism cant outweigh the pragmatism
PR//My professional focus has been, as long as I can remember, about designing for comprehension. That is, understanding whats going on in ones surroundings, how things in the world work, and effective ways of thinking and talking about it.
PR//need to get more people model-literate, which means an order-of-magnitude (or two) increase in the efficiency of uptake. We need to figure out a way to bulk-load models into peoples heads, simultaneously bringing the cost down and the salience up so it becomes something people perceive to be worth doing
PR//Instead we need to adapt and extend the existing protocols to the internet and its engaged communities. A first step is acknowledging the deep bench of untapped talent.
PR//major lesson of cryptocurrency protocols is that when you design something with a trust-minimized architecture, people approach it with a mercenary perspective
PR//Exploration involves trying out new options that may lead to better outcomes. Exploitation involves choosing the best-available option based on exploration. Finding the optimal balance between these two strategies is a crucial challenge in many decision-making situations, where the goal is to maximize long-term benefits.
PR//Protocols are designed in reaction to some troubling condition rather than being conceived of independently from their environment. This argument is more obvious for some protocols than for others.
PR//stating that protocols are conservative is not a political assertion. This statement does not challenge the value of preservation and conservation during periods of undeniable turmoil. The intention of highlighting the backward-oriented nature of protocols is merely to underscore—as some of the researchers did—that these tools often possess their own agency. They assert their temporal logic upon anything we endeavor with them, especially where there is no conscious reflection on their use.
PR//value can oscillate quickly into costs and at such a magnitude that even precious systems must have a stop. This poses the question of how to shut the thing down, and who should make the decision to do so. While the options that have predominated up to now involve highly centralized control of the killswitch protocol, this form of engineered system death is also the least interesting from a systems engineering perspective because it boils down to designing a killswitch that a concentrated authority can exercise
PR//Whereas the Linux kernel doesnt produce anything for users until distros add their features, running Ethereum software produces a usable artifact right away.
PR//The protocol system conveys the people and their relationship to data, spaces, and other people, describing it as a “role in a box” with different preset levels of access, permissions, and incentives to represent and augment the organization.
PR//The interoperability allows for a seamless transfer of users and data between apps and cities, while the composability comes into play when any aspect of the protocol becomes shared infrastructure that can be combined together or taken apart.
PR//“Copying was such a taboo back then, less so in the software world, especially in open-source, but outside of those bubbles it wasnt considered acceptable. People were still romanticising the idea of the lone genius or decision-maker,” recounts Das.
“It wasnt until we were forced to work together during the collapse that folks realized ideas were meant to be shared and modified; that it was ok to edit and improve upon them.
PR//Without a critical capacity, it becomes difficult to keep the checks and balances averaging. Furthermore, the whole system relies on trust. Without it, the IOU-based system fails as people become unsure if the value theyve given to others will be returned when theyre in need.
PR//The study showed there were some conditions to the benefits of diversity, however, which only began to take effect when at least four functional groups or different plant species were present and increased as the number of plants in each species increased. When this minimum diversity threshold was met, researchers saw it triggered a change in the behavior of the fungal network that supported the nutrient and water uptake of the plants towards mutualism, rather than competition or parasitism seen in less diverse and dense plantings.
PR//The je ne sais quoi of protocols, after all, is an ineffable quality of openness,
PR//Beyond hardening our activities against capture or co-option by narrower agendas, and doing our best to articulate, in honest but unapologetic ways, the opinionated tastes we are bringing to our curation and catalysis efforts, we aim to keep our role small and limited, and indeed, shrink it over time.
1 PR//the modern burglar often understands the protocols of urbanism better than the insiders who are their nominal stewards. In a world that increasingly comprises protocols, power follows knowledge, not ascriptive authority.
2 PR//the hero of a protocolized world has mastered a general set of technological patterns that undergird not just the internal realities of organizations across the entire planet but even the interstitial spaces between them.
3 PR//what we might call the protocol punk hero operates from within a protocolized environment where boundaries separating insides and outsides are increasingly meaningless.
4 PR//the protocol punk hero, unlike the bureaucratic hero or the outsider maverick, is master of both smooth and striated spaces, and able to navigate both arborescent and rhizomatic epistemic environments.
5 PR//It is easy to miss the myriad invisible ways in which clock time structures our lives, from train schedules and norms of scheduling meetings to begin at half-hour boundaries, to the structuring of work and leisure hours by calendars with roots in ancient religions.
6 PR//Every successful protocol, arguably, is the result of successfully anticipating some sort of traffic jam, and presciently engineering mechanisms to manage the underlying tensions.
7 PR//Unlike the epic heroes of antiquity, or even cyberpunk heroes, protocol punk heroes are rarely lone wolves. Instead, they often exhibit remarkable social skills. Their uncanny protocol-whispering abilities often rest as much on social engineering skills as on technical engineering or architecture skills.
8 PR//major component of the work of protocol whisperers is to manage constantly shifting tensions at an ecosystem level, rather than within a single organization
9 PR//trusted relationships with allies on many sides of many active arguments
10 PR//a strong sense of the collective memory of an evolving commons.
11 PR//protocol design and architecture conversations, a truly remarkable amount of conscious and active attention is devoted to things like selection pressures, incentives, red-teaming, and modeling of emergent equilibria. Unlike the engineer in a private corporation, or the bureaucrat in a hospital or a government agency, the protocol whisperer must simultaneously think like an Organization Man, a central banker, a hacker, a market maker, and a military strategist
12 PR//Efforts to create the right engineered arguments are the exceptions. Playing to win is the norm. Playing to continue the game is rare.
13 PR//The pluralist infinite-game idea of a protocol as an engineered argument can be contrasted with a complementary “playing to win” definition of an API
14 PR//There are also non-human single points of failure (SPOFs). In a thoughtful critique, Moxie Marlinspike, co-creator of the Signal messaging protocol, pointed out the many SPOF vulnerabilities in the Ethereum ecosystem.14 In the worst cases, they can lurk unseen until they cause the unexpected fatal collapse of a valued protocol.
15 In well-managed protocols, SPOFs are broadly recognized, consciously managed, gradually mitigated, progressively moved to less and less critical loci, and in the best cases, eliminated altogether.
16 PR//When it comes to protocols, sticking to any kind of ideological hardline position cedes agency to those willing to participate in the engineered arguments. There is no winning move, and the only way to continue to play is to recognize that you’re not in traffic, you are traffic.
17 PR//Part 4, Living With Protocols
18 PR//is easier to reorganize the furniture in one’s house than to change the building’s structure or expand the site on which it’s built. Longer-term interventions in the built environment that adapt the base layers to new conditions are still worthwhile—they are as critical as ever—but, for individuals working at smaller spatial and temporal scales, the “software” (and the protocols that mediate it) may be a more fruitful domain of intervention than the hardware
19 PR//Today we build fulfillment centers, freeways, container ships, and supertall skyscrapers, all accidental monuments to the various protocols that utilize them, and equally impressive (but usually more esoteric, largely appreciated by the “protocol literate”). Unlike cathedrals and pyramids, the charismatic qualities of protocol monuments are likely to be incidental, a side effect of their primary purpose.
20 PR//As our world becomes increasingly automated, networked, and sensor-filled, our levels of awareness regarding the invisible interfaces, processes, and protocols through which computers comprehend our world will translate into a new awareness of physical space. Our digital literacy will enable us to retain a sense of effective agency as we design and navigate what is a new category of virtual worlds operating (through the assistance of automation) within the medium of physical space.
21 PR//To deal with limited memory and processing powers, we get used to things going well. The result: our brains only notice when things go wrong—when there is an event. We do not notice the non-events (i.e., the status quo, the day-to-day). But events and non-events are both consequences of human actions. No actions, no events. Action performance varies, putting the dynamic in dynamic non-event.90 Safety is a dynamic non-event. Talking about safety (and health) is difficult because it is a sustained absence of events, not an event itself.
22 PR//health protocols don’t have fast feedback loops, so adoption is challenging. From my experience, we operate more proactively when the risk is obvious, probable, and has the possibility of immediate harm. Safety issues trigger acute stress responses that encourage action. Anything beyond obvious risk requires empathy for a “future version of oneself” that is difficult to nurture. This can change via instrumentation, such as calorie, nutrient, movement trackers, and continuous glucose, heart rate, and sleep monitors.
23 PR//Following protocol involves several actions: perceive another person following protocol or receive instructions on how to follow the protocol; store the protocol in memory; and replicate the protocol. Errors can occur during any one of these actions. The primary way that protocols mutate is via such unintentional errors. A protocol is a type of meme: like genes, protocols reproduce using humans as hosts.
24 PR//The other two ways that protocols mutate is through tinkering and design.
25 PR//The three sources of protocol mutation, characterized by their pace and strength, are design, tinkering, and memetic error. They fall on a spectrum of pace and strength of mutation
26 PR//Protocol systems are always two things at once—individuals and a group. A bistable perception—individual versus system—is actually important in examining them. If we only think about the aggregated whole, we may overlook harms suffered by individuals within the system or problematic power dynamics masked by the continued functioning of the system. On the other hand, if we only focus on individuals within the system, we may miss emergent risks and benefits coming from the system as a whole.
27 PR//If there is a bad fit between your internal self and your role, you can suffer from a sense of compelled inauthenticity, or dysphoria, while if there is a good fit, and you authentically align with your role, you can thrive.
28 PR//If Pip has awareness of a protocol system, they are “seeing the water” that they swim in—the culture and world (protocol system) that surrounds them, shapes them, and constrains them. When aware, Pip sees the ocean they swim in, knows that other oceans and non-oceans exist, knows how they got into their ocean, and understands that the ocean currents affect their movements.
29 PR//Pip has awareness with regard to a particular protocol system if they know:
30 that they are entering, participating in, or exiting it;
31 that they play a certain role within it;
32 that there are alternatives to joining or participating in this particular protocol system;
33 whether they entered the system by choice or under the influence or control of others; and
34 that the protocol is influencing their thoughts and actions.
35 PR//Insight is about the depth of knowledge and understanding Pip has about a protocol system.156 Insight allows a person to make a meaningful choice about their participation and role within a protocol system.
36 PR//As we become more networked, opportunities for alignment and attunement technologies will become increasingly apparent. They present a possible path to support the success of swarms and other online formations while addressing platform business needs.
37 PR//A nascent sensibility defined here, orientation can be understood as a form of situational awareness that arranges knowledge in a selective and associative manner aligned with a particular purpose. Orientation enables navigation based on partial cues, feelings, and hints within an environment, without presuming complete situational awareness.
38 PR//Fixed, hard points across time that let us make the world more predictable.
39 We need these hard points because it is impossible to coordinate at scale without them. Money doesn’t work unless there is a degree of certainty it will still be valuable in the future. Trade is very risky if there isn’t confidence that parties will follow their commitments.
40 PR//Good rituals can liberate the individual—in the case of the artist—by helping them coordinate their actions towards their creative goals. Protocols are not just about constraints that are necessarily enforced at the cost of creativity and liberty; they can generate creativity and liberty, if well-designed and implemented.
41 PR//the art of protocol subversion looks more commonly like tai chi, where participants follow protocol, but in a way that better suits their needs. As Galloway proposed, “it is through protocol that one must guide one’s efforts, not against it.”
42 PR//Instead of resisting protocols, we ought to bring a greater awareness to their overall influence, so that we can make better decisions about which protocols we wish to be a part of and how we might live peaceably under their reign.
43 PR//Any sufficiently healthy world will spawn activity in peripheral forums where the protocol is discussed. It will spread and animate spaces outside itself. The life of the world is not only in the world. Looking for these spaces is an important and often overlooked world-assessment criteria.
44 PR//Protocol makers, know this: your protocol will die. It may become so inflexible that it must be discarded —“if the constitution is too rigid, it becomes necessary to kill the king”412—or the conditions around it may change so much as to become unrecognizable.
45 PR//to your protocol and whether they would withstand an existential question
46 PR//In The Timeless Way of Building, Christopher Alexander argues that patterns in architecture and the urban organization have a “quality without a name” that makes a house, a street, a town more or less “alive.” We perceive a place as alive when it is structured or organized to allow congruence within us—this congruence is the capacity to align us with our biological reality and natural desires, allowing those forces to move freely.
47 PR//Flourishing requires the cultivation of character, which almost always requires that we examine the systems to which we are beholden and that we break with our narratives and frames. This requires us to take responsibility for our own development—a mindset at odds with mindlessly following a protocol. Like bad habits (which are, after all, effective habits), effective protocols make it easy for people to continue following protocol.
48 PR//order to pursue flourishing, one must take responsibility for one’s actions and life—if participants are disposed by the protocol to reject responsibility, and if the protocol forms a significant part of their life (say, as a social, cultural, or religious protocol), then flourishing is hindered
49 PR//In some situations, all that is needed for the emergence of a good protocol is the recognition and diffusion of good solutions that are also easy to imitate.
50 PR//Good protocols learn, grow, and mature in ways that catalyze thoughtful stewardship and sustained generativity. Bad protocols on the other hand, if they avoid early mortality, tend to become increasingly neglected over time, leading to extended periods of sterility and stagnation, and succumbing to capture and corruption.
51 PR//Good protocols seem to strike a robust balance between ensuring order at some loci, and inducing serendipitous creative chaos at adjacent loci. As a result, within their sphere of influence, they create conditions of exceptional serendipity, or at least significantly reduced malevolence,
52 PR//good protocols seem to thread the needle between too much and too little automation, and too much and too little room for discretionary governance decisions, stabilizing at the right level for their circumstances. They are sufficiently stewardable.
53 PR//consideration of trade-offs, costs and benefits, and thorough evaluation of designs, leading to good engineering outcomes. They are neither so underconstrained that arbitrary tastes can drive outcomes, nor so overconstrained that there are no good solutions to problems at all. Instead, they encourage a search for opinionated but principled solutions to core problems
54 PR//areas in the study of protocols, and the one that comes closest to rising to the level of a science. Our ability to design and build better protocols is strongly driven by the quality of our understanding of fundamental limits, and cultures of tastefully opinionated leadership for navigating them
55 PR//A feature common to protocols and adjacent categories such as APIs, grammars, or rules, is their relationship to literacy. Every protocol, arguably, is by definition also a literacy that takes effort to acquire and practice. The value of a protocol is a strong function of the ease with which participants can acquire literacy and fluency in the behaviors it codifies.
56 PR//An effective culture of literacy around a protocol ensures that all participants have the skills necessary to safely and productively participate in it. Mass or retail participants must have sufficient literacy to use protocols safely. For example, pedestrians and drivers must understand and respond to traffic signals. Expert participants and stewards must have enough literacy to govern the protocol and evolve it in the face of changing circumstances and evolving domain knowledge. Creating and sustaining a broad-based culture of literacy around a protocol is a non-trivial task, but is often underestimated, and either treated as a promotional task, to be handled alongside marketing or public relations, or a matter of foolproof user-experience design.
57 PR//Good protocols are not just sufficiently learnable, they are sufficiently hackable to do without formal educational institutions, especially early in their histories.
58 PR//This ludic quality is arguably essential for meaning-making, and is conceivably the spiritual essence of protocols.
59 PR//Good protocols, arguably, are sufficiently ludic to serve as engines of meaning-making beyond their nominal functions, while also fulfilling their nominal functions.
60 PR//surprisingly many protocols manage to survive early mortality threats and achieve equilibrium states where they are sufficiently defensible to function anyway, even if in significantly diseased conditions. Surprisingly small groups of well-positioned stewards can keep established and critical protocols going long past the point where critics predict they should have succumbed to their varied apparently fatal vulnerabilities.
61 PR//While protocols can be hard to kill, and sufficiently defensible against their threat environments, they are neither impossible to kill, nor naturally immortal. They are sufficiently mortal that they do not persist indefinitely, choking the domains they organize. The League of Nations, which preceded the United Nations, is an example of a geopolitical protocol that died after it failed to fulfill its functions in the 1930s.
62 PR//Standards-making, it turns out, is high-leverage design, ripe with the ability to change the technological playing field in ways that no individual firm can on its own. It’s like finding the control room of our modern world.
63 PR//best way to learn how to work with standards is by studying how they’ve evolved over time.
64 PR//true standards movement must be rooted in the fundamentals. The idealism can’t outweigh the pragmatism
65 PR//My professional focus has been, as long as I can remember, about designing for comprehension. That is, understanding what’s going on in one’s surroundings, how things in the world work, and effective ways of thinking and talking about it.
66 PR//need to get more people model-literate, which means an order-of-magnitude (or two) increase in the efficiency of uptake. We need to figure out a way to bulk-load models into people’s heads, simultaneously bringing the cost down and the salience up so it becomes something people perceive to be worth doing
67 PR//Instead we need to adapt and extend the existing protocols to the internet and its engaged communities. A first step is acknowledging the deep bench of untapped talent.
68 PR//major lesson of cryptocurrency protocols is that when you design something with a trust-minimized architecture, people approach it with a mercenary perspective
69 PR//Exploration involves trying out new options that may lead to better outcomes. Exploitation involves choosing the best-available option based on exploration. Finding the optimal balance between these two strategies is a crucial challenge in many decision-making situations, where the goal is to maximize long-term benefits.
70 PR//Protocols are designed in reaction to some troubling condition rather than being conceived of independently from their environment. This argument is more obvious for some protocols than for others.
71 PR//stating that protocols are conservative is not a political assertion. This statement does not challenge the value of preservation and conservation during periods of undeniable turmoil. The intention of highlighting the backward-oriented nature of protocols is merely to underscore—as some of the researchers did—that these tools often possess their own agency. They assert their temporal logic upon anything we endeavor with them, especially where there is no conscious reflection on their use.
72 PR//value can oscillate quickly into costs and at such a magnitude that even precious systems must have a stop. This poses the question of how to shut the thing down, and who should make the decision to do so. While the options that have predominated up to now involve highly centralized control of the killswitch protocol, this form of engineered system death is also the least interesting from a systems engineering perspective because it boils down to designing a killswitch that a concentrated authority can exercise
73 PR//Whereas the Linux kernel doesn’t produce anything for users until distros add their features, running Ethereum software produces a usable artifact right away.
74 PR//The protocol system conveys the people and their relationship to data, spaces, and other people, describing it as a “role in a box” with different preset levels of access, permissions, and incentives to represent and augment the organization.
75 PR//The interoperability allows for a seamless transfer of users and data between apps and cities, while the composability comes into play when any aspect of the protocol becomes shared infrastructure that can be combined together or taken apart.
76 PR//“Copying was such a taboo back then, less so in the software world, especially in open-source, but outside of those bubbles it wasn’t considered acceptable. People were still romanticising the idea of the lone genius or decision-maker,” recounts Das.
77 “It wasn’t until we were forced to work together during the collapse that folks realized ideas were meant to be shared and modified; that it was ok to edit and improve upon them.
78 PR//Without a critical capacity, it becomes difficult to keep the checks and balances averaging. Furthermore, the whole system relies on trust. Without it, the IOU-based system fails as people become unsure if the value they’ve given to others will be returned when they’re in need.
79 PR//The study showed there were some conditions to the benefits of diversity, however, which only began to take effect when at least four functional groups or different plant species were present and increased as the number of plants in each species increased. When this minimum diversity threshold was met, researchers saw it triggered a change in the behavior of the fungal network that supported the nutrient and water uptake of the plants towards mutualism, rather than competition or parasitism seen in less diverse and dense plantings.
80 PR//The je ne sais quoi of protocols, after all, is an ineffable quality of openness,
81 PR//Beyond hardening our activities against capture or co-option by narrower agendas, and doing our best to articulate, in honest but unapologetic ways, the opinionated tastes we are bringing to our curation and catalysis efforts, we aim to keep our role small and limited, and indeed, shrink it over time.

View File

@@ -0,0 +1,324 @@
#!/usr/bin/env python3
"""
Multivariate Analysis of coding.csv Virtue Data
Uses only Python standard library
"""
import csv
import json
from collections import defaultdict, Counter
from itertools import combinations
import math
def load_data(filename):
with open(filename, 'r') as f:
reader = csv.DictReader(f)
rows = list(reader)
return rows
def jaccard_similarity(set1, set2):
"""Calculate Jaccard similarity between two sets"""
if not set1 and not set2:
return 1.0
intersection = len(set1 & set2)
union = len(set1 | set2)
return intersection / union if union > 0 else 0.0
def cosine_similarity(vec1, vec2):
"""Calculate cosine similarity between two binary vectors"""
dot = sum(a * b for a, b in zip(vec1, vec2))
norm1 = math.sqrt(sum(a * a for a in vec1))
norm2 = math.sqrt(sum(b * b for b in vec2))
if norm1 == 0 or norm2 == 0:
return 0.0
return dot / (norm1 * norm2)
def hierarchical_clustering(distance_matrix, labels, n_clusters=4):
"""Simple agglomerative hierarchical clustering using average linkage"""
n = len(labels)
clusters = [{i} for i in range(n)]
cluster_labels = list(range(n))
remaining = set(range(n))
while len(remaining) > n_clusters:
# Find closest pair
min_dist = float('inf')
to_merge = None
for i in remaining:
for j in remaining:
if i < j:
dist = distance_matrix[i][j]
if dist < min_dist:
min_dist = dist
to_merge = (i, j)
if to_merge is None:
break
i, j = to_merge
new_cluster_label = len(clusters)
clusters.append(clusters[i] | clusters[j])
# Update distance matrix (average linkage)
new_distances = []
for k in range(len(distance_matrix)):
if k not in (i, j):
new_dist = distance_matrix[i][k] + distance_matrix[j][k]
if len(clusters[new_cluster_label]) > 0:
new_dist /= 2
new_distances.append(new_dist)
else:
new_distances.append(float('inf'))
distance_matrix.append(new_distances)
for row in distance_matrix:
row.append(new_distances[len(distance_matrix)-1])
remaining.remove(i)
remaining.remove(j)
remaining.add(new_cluster_label)
cluster_labels.append(new_cluster_label)
# Assign final cluster labels
final_labels = [0] * n
for idx, cluster_idx in enumerate(remaining):
for item in clusters[cluster_idx]:
final_labels[item] = idx
return final_labels, clusters
def kmeans_clustering(vectors, k=3, max_iter=100):
"""Simple k-means clustering"""
n = len(vectors)
# Random initialization (deterministic)
centers = vectors[::n//k][:k]
for iteration in range(max_iter):
# Assign clusters
assignments = []
for vec in vectors:
distances = [sum((a-b)**2 for a, b in zip(vec, c)) for c in centers]
assignments.append(distances.index(min(distances)))
# Update centers
new_centers = []
for cluster_id in range(k):
cluster_vecs = [vectors[i] for i in range(n) if assignments[i] == cluster_id]
if cluster_vecs:
new_center = [sum(v[i] for v in cluster_vecs) / len(cluster_vecs)
for i in range(len(vectors[0]))]
new_centers.append(new_center)
else:
new_centers.append(centers[cluster_id])
if new_centers == centers:
break
centers = new_centers
return assignments
def main():
print("=" * 70)
print("MULTIVARIATE ANALYSIS OF CODING.CSV")
print("=" * 70)
# Load data
rows = load_data('coding.csv')
print(f"\nDataset: {len(rows)} texts coded")
# Extract virtues per row
virtue_cols = ['Virtue_1', 'Virtue_2', 'Virtue_3', 'Virtue_4', 'Virtue_5']
all_virtues_per_row = []
source_per_row = []
for row in rows:
virtues = []
for col in virtue_cols:
val = row.get(col, '').strip() if row.get(col) else ''
if val:
virtues.append(val)
all_virtues_per_row.append(virtues)
source_per_row.append(row.get('Source', 'Unknown'))
# Statistics
virtue_counts = [len(v) for v in all_virtues_per_row]
avg_virtues = sum(virtue_counts) / len(virtue_counts)
print(f"\nCoding Statistics:")
print(f" - Average virtues per text: {avg_virtues:.2f}")
print(f" - Range: {min(virtue_counts)} - {max(virtue_counts)}")
# All unique virtues
all_virtues_flat = [v for sublist in all_virtues_per_row for v in sublist]
unique_virtues = sorted(set(all_virtues_flat))
print(f" - Unique virtue categories: {len(unique_virtues)}")
# Frequency analysis
print("\n" + "=" * 70)
print("1. FREQUENCY DISTRIBUTION OF VIRTUES")
print("=" * 70)
virtue_freq = Counter(all_virtues_flat)
print(f"\n{'Rank':<6} {'Count':<6} {'Virtue':<40}")
print("-" * 55)
for rank, (virtue, count) in enumerate(virtue_freq.most_common(30), 1):
pct = (count / len(rows)) * 100
print(f"{rank:<6} {count:<6} {virtue:<40} ({pct:.1f}%)")
# Create binary matrix (presence/absence)
print("\n" + "=" * 70)
print("2. CO-OCCURRENCE ANALYSIS")
print("=" * 70)
# Co-occurrence counter
cooccurrence = Counter()
for virtues in all_virtues_per_row:
for pair in combinations(sorted(virtues), 2):
cooccurrence[pair] += 1
print(f"\nTop 20 Virtue Pairs (appear in same text):")
print(f"{'Virtue 1':<30} {'Virtue 2':<30} {'Count':<6}")
print("-" * 70)
for (v1, v2), count in cooccurrence.most_common(20):
print(f"{v1:<30} {v2:<30} {count:<6}")
# Association strength (Jaccard index)
print(f"\n\nStrongest Associations (Jaccard Similarity):")
print(f"{'Virtue 1':<30} {'Virtue 2':<30} {'Jaccard':<8}")
print("-" * 70)
virtue_sets = defaultdict(set)
for idx, virtues in enumerate(all_virtues_per_row):
for v in virtues:
virtue_sets[v].add(idx)
associations = []
for (v1, v2), count in cooccurrence.items():
set1 = virtue_sets[v1]
set2 = virtue_sets[v2]
jaccard = len(set1 & set2) / len(set1 | set2)
associations.append((jaccard, v1, v2, count))
associations.sort(reverse=True)
for jaccard, v1, v2, count in associations[:20]:
if count >= 2: # Only show pairs that appear at least twice
print(f"{v1:<30} {v2:<30} {jaccard:.3f}")
# Create binary vectors for each text
virtue_to_idx = {v: i for i, v in enumerate(unique_virtues)}
binary_vectors = []
for virtues in all_virtues_per_row:
vec = [0] * len(unique_virtues)
for v in virtues:
if v in virtue_to_idx:
vec[virtue_to_idx[v]] = 1
binary_vectors.append(vec)
# Clustering
print("\n" + "=" * 70)
print("3. CLUSTER ANALYSIS OF TEXTS (based on virtue profiles)")
print("=" * 70)
# K-means clustering
k = 4
clusters = kmeans_clustering(binary_vectors, k=k)
print(f"\nK-Means Clustering (k={k}):")
print("-" * 70)
for cluster_id in range(k):
cluster_texts = [i for i, c in enumerate(clusters) if c == cluster_id]
cluster_size = len(cluster_texts)
# Get dominant virtues in this cluster
cluster_virtues = []
for idx in cluster_texts:
cluster_virtues.extend(all_virtues_per_row[idx])
cluster_virtue_freq = Counter(cluster_virtues)
print(f"\nCluster {cluster_id + 1} ({cluster_size} texts):")
print(f" Sources: {', '.join(set(source_per_row[i] for i in cluster_texts))}")
print(f" Top virtues: {', '.join([f'{v}({c})' for v, c in cluster_virtue_freq.most_common(5)])}")
# Cluster similarity analysis
print("\n" + "=" * 70)
print("4. VIRTUE CLUSTERING (which virtues tend to co-occur)")
print("=" * 70)
# Create virtue-virtue similarity matrix based on co-occurrence
print("\nVirtue Communities (highly connected groups):")
# Build adjacency list
adjacency = defaultdict(lambda: defaultdict(float))
for (v1, v2), count in cooccurrence.items():
total_v1 = virtue_freq[v1]
total_v2 = virtue_freq[v2]
# Normalized co-occurrence (pointwise mutual information-like)
if total_v1 > 0 and total_v2 > 0:
strength = count / math.sqrt(total_v1 * total_v2)
adjacency[v1][v2] = strength
adjacency[v2][v1] = strength
# Simple community detection by threshold
visited = set()
communities = []
for virtue in unique_virtues:
if virtue not in visited:
community = set()
stack = [virtue]
while stack:
current = stack.pop()
if current not in visited:
visited.add(current)
community.add(current)
for neighbor, strength in adjacency[current].items():
if strength >= 0.3 and neighbor not in visited:
stack.append(neighbor)
if len(community) >= 3:
communities.append(sorted(community))
if communities:
for i, community in enumerate(communities[:6], 1):
print(f"\nCommunity {i}: {', '.join(community[:8])}")
if len(community) > 8:
print(f" ... and {len(community) - 8} more")
else:
print("No strong communities detected with current threshold")
# Sources analysis
print("\n" + "=" * 70)
print("5. SOURCE-BASED PATTERN ANALYSIS")
print("=" * 70)
source_virtues = defaultdict(list)
for idx, (source, virtues) in enumerate(zip(source_per_row, all_virtues_per_row)):
source_virtues[source].extend(virtues)
print(f"\n{'Source':<15} {'Texts':<8} {'Top Virtues (frequency)'}")
print("-" * 70)
for source in sorted(set(source_per_row)):
texts = source_per_row.count(source)
freq = Counter(source_virtues[source])
top = ', '.join([f"{v}({c})" for v, c in freq.most_common(4)])
print(f"{source:<15} {texts:<8} {top}")
# Summary insights
print("\n" + "=" * 70)
print("6. KEY INSIGHTS")
print("=" * 70)
print(f"""
SUMMARY:
- Dataset contains {len(rows)} texts from {len(set(source_per_row))} different sources
- {len(unique_virtues)} unique virtue categories were identified
- Texts have an average of {avg_virtues:.1f} virtues assigned (range: {min(virtue_counts)}-{max(virtue_counts)})
TOP FINDINGS:
1. Most frequent virtue: '{virtue_freq.most_common(1)[0][0]}' ({virtue_freq.most_common(1)[0][1]} occurrences)
2. Strongest virtue pair: '{associations[0][1]}' + '{associations[0][2]}' (Jaccard: {associations[0][0]:.3f})
3. Multiple distinct virtue communities detected, suggesting conceptual clustering
4. {len([c for c in communities if len(c) >= 3])} major virtue communities identified
""")
if __name__ == "__main__":
main()

View File

@@ -0,0 +1,272 @@
# Multivariate Analysis of Coding.csv: Virtue Clustering and Associations
**Date:** 2026-03-28
**Dataset:** coding.csv
**Texts Analyzed:** 134
**Unique Virtue Categories:** 74
**Average Virtues per Text:** 2.78 (range: 1-5)
---
## 1. Executive Summary
This analysis examines 134 coded texts from two sources (AFP and PR) across 74 unique virtue categories. Using multiple multivariate techniques—clustering, network analysis, and association metrics—the study reveals:
- **4 distinct text clusters** with one dominant cluster containing 86% of texts
- **3 major virtue communities** representing different conceptual frameworks
- **Strong ethical pairings** (e.g., Care+Consent) that nearly always co-occur
- **Source differences** in conceptual complexity (AFP: more interconnected; PR: more focused)
---
## 2. Cluster Analysis of Texts
Using K-means clustering on binary virtue presence/absence vectors:
| Cluster | Size | Key Virtues | Sources | Interpretation |
|---------|------|-------------|---------|----------------|
| **1** | 5 texts | Memory, Imitation, Inheritance, Tradition | AFP, PR | *Memory-focused texts* - Historical and temporal continuity themes |
| **2** | 4 texts | Refusal, Embodiment, Resistance, Subversion | AFP only | *Resistance discourse* - Tactical opposition to systems |
| **3** | 115 texts | Adaptability, Tension Management, Accessibility, Design | AFP, PR | **Core protocol cluster** - Dominant protocol ethics discourse |
| **4** | 10 texts | Authenticity, Alignment, Inheritance | AFP, PR | *Authenticity/Alignment cluster* - Self-determination and tradition |
**Key Finding:** Cluster 3 represents the overwhelming majority (86%) of texts, suggesting a shared "protocol ethics" discourse across sources. Cluster 2 represents a distinct "resistance" discourse found only in AFP texts.
---
## 3. Strongest Virtue Associations
### By Co-occurrence Count (raw frequency):
| Rank | Virtue Pair | Count | Notes |
|------|-------------|-------|-------|
| 1 | Accessibility + Situational Awareness | 4 | Practical context-sensitivity |
| 2 | Equity + Inclusivity | 3 | Justice framework |
| 3 | Balance + Tension Management | 3 | Managing contradictions |
### By Jaccard Similarity (normalized association strength):
| Rank | Virtue Pair | Jaccard Index | Interpretation |
|------|-------------|---------------|------------------|
| 1 | **Care + Consent** | 0.750 | *Nearly inseparable* - Ethical foundation pair |
| 2 | Resistance + Subversion | 0.400 | Tactical cluster |
| 3 | Refusal + Subversion | 0.400 | Resistance tactics |
| 4 | **Equity + Inclusivity** | 0.375 | Justice-oriented |
| 5 | Refusal + Resistance | 0.333 | Activism tactics |
| 6 | Embodiment + Groundedness | 0.333 | Material presence |
| 7 | Agency + Freedom | 0.300 | Autonomy cluster |
**Key Finding:** The Care+Consent pairing (Jaccard = 0.750) is exceptionally strong, appearing together in 3 out of 4 possible texts where both concepts appear. This suggests an ethical foundation where care practices are inseparable from consent frameworks.
---
## 4. Virtue Communities (Network Analysis)
Using network thresholding on co-occurrence patterns, three major virtue communities were identified:
### Community 1: "Protocol Mechanics" (~40 virtues)
*Core operational virtues for protocol design and implementation*
**Central Members:**
- Adaptability, Agency, Balance, Capture Resistance
- Care, Complex Systems Tolerance, Consent
- Constraint, Curiosity, Design, Emergent Properties
- Equity, Freedom, Institutional Critique, Iterative Development
- Networked Intelligence, Plurality, Replicability, Systems Thinking
**Characteristics:**
- Largest community spanning practical and ethical dimensions
- High connectivity to Adaptability and Systems Thinking (hub virtues)
- Brings together ethics (Care, Consent, Equity) with operational concepts (Design, Iterative Development)
### Community 2: "Collective Intelligence" (3 virtues)
*Focused on collaborative knowledge production*
**Members:** Alignment, Collaboration, Networked Intelligence
**Characteristics:**
- Small but distinct community
- Emphasizes distributed, collaborative approach
- Connected to Community 1 through Networked Intelligence
### Community 3: "Relational Ethics" (~9 virtues)
*Focus on social and cultural connection*
**Members:**
- Collectivity, Cultural Awareness, Empathy, Interdependence
- Plurality, Relationality, Respect, Spatial Awareness
- Plus contextual concepts
**Characteristics:**
- Strong ties to Community 1 through Relationality
- Emphasizes interpersonal and cultural dimensions
- Includes Plurality, suggesting diversity and multiplicity
---
## 5. Network Centrality Analysis
**"Hub" Virtues** (ranked by number of connections to other virtue types):
| Rank | Virtue | Connections | Key Neighbors |
|------|--------|-------------|---------------|
| 1 | **Adaptability** | 25 | Agency, Resistance, Long-Term Vision, Design, Systems Thinking |
| 2 | **Design** | 23 | Agency, Equity, Emergent Properties, Inheritance, Constraint |
| 3 | **Agency** | 23 | Resistance, Inheritance, Refusal, Autonomy, Systems Thinking |
| 4 | **Temporal Awareness** | 19 | Emergent Properties, Long-Term Vision, Adaptability |
| 5 | **Systems Thinking** | 19 | Agency, Design, Long-Term Vision, Constraint |
| 6 | **Collectivity** | 17 | Interdependence, Agency, Shared Responsibility |
| 7 | **Transgression** | 17 | Refusal, Subversion, Care, Capture Resistance |
| 8 | **Institutional Critique** | 16 | Refusal, Design, Subversion, Agency |
| 9 | **Plurality** | 16 | Interdependence, Agency, Systems Thinking |
| 10 | **Relationality** | 16 | Interdependence, Accessibility, Care, Curiosity |
**Key Finding:** **Adaptability** is unequivocally the central hub of this virtue network, connecting to 25 other virtue concepts. This suggests it functions as a bridging concept across multiple ethical and practical domains.
---
## 6. Source Comparison (AFP vs. PR)
| Metric | AFP (62 texts) | PR (72 texts) | Interpretation |
|--------|----------------|---------------|----------------|
| **Unique virtue pairs** | 221 | 143 | AFP texts show more conceptual diversity |
| **Avg pairs per text** | 4.06 | 2.22 | AFP texts are more conceptually dense |
| **Network density** | 8.2% | 5.3% | AFP has more interconnected virtue networks |
| **Top virtues** | Adaptability (8), Temporal Awareness (7), Collectivity (7), Institutional Critique (7) | Tension Management (10), Adaptability (9), Systems Thinking (9), Infrastructural Awareness (8) | AFP: critical/social; PR: technical/systemic |
### AFP Code Profile (Academic/Critical)
- **Dominant themes:** Adaptability, Temporal Awareness, Collectivity, Institutional Critique
- **Emphasis:** Social processes, critical engagement, collective action
- **Pattern:** Higher virtue co-occurrence suggests more conceptually complex texts
### PR Code Profile (Practical/Technical)
- **Dominant themes:** Tension Management, Systems Thinking, Infrastructural Awareness
- **Emphasis:** Technical complexity, managing contradictions, system design
- **Pattern:** More focused virtue profiles, strong emphasis on Adaptability
**Key Finding:** Both sources prioritize **Adaptability**, but AFP has more distributed emphasis across critical/social virtues, while PR emphasizes technical/systemic concepts. The 8.2% vs 5.3% network density difference suggests AFP texts engage with more complex conceptual interconnections.
---
## 7. Frequency Distribution
**Top 30 Virtues by Frequency:**
| Rank | Virtue | Count | % of Texts |
|------|--------|-------|------------|
| 1 | **Adaptability** | 17 | 12.7% |
| 2 | Tension Management | 13 | 9.7% |
| 3 | Accessibility | 13 | 9.7% |
| 4 | Temporal Awareness | 11 | 8.2% |
| 5 | Design | 11 | 8.2% |
| 6 | Institutional Critique | 10 | 7.5% |
| 7 | Agency | 10 | 7.5% |
| 8 | Relationality | 10 | 7.5% |
| 9 | Infrastructural Awareness | 10 | 7.5% |
| 10 | Systems Thinking | 10 | 7.5% |
| 11 | Plurality | 9 | 6.7% |
| 12 | Transgression | 9 | 6.7% |
| 13 | Collectivity | 8 | 6.0% |
| 14 | Inheritance | 8 | 6.0% |
| 15 | Authenticity | 7 | 5.2% |
| 16 | Long-Term Vision | 7 | 5.2% |
| 17 | Equity | 6 | 4.5% |
| 18 | Capture Resistance | 6 | 4.5% |
| 19 | Respect | 6 | 4.5% |
| 20 | Cultural Awareness | 6 | 4.5% |
| 21 | Spatial Awareness | 6 | 4.5% |
| 22 | Interdependence | 6 | 4.5% |
| 23 | Shared Responsibility | 6 | 4.5% |
| 24 | Situational Awareness | 6 | 4.5% |
| 25 | Memory | 5 | 3.7% |
| 26 | Embodiment | 5 | 3.7% |
| 27 | Inclusivity | 5 | 3.7% |
| 28 | Balance | 5 | 3.7% |
| 29 | Reciprocity | 5 | 3.7% |
| 30 | Emergent Properties | 5 | 3.7% |
---
## 8. Key Insights and Implications
### 8.1 The Three Pillars of Protocol Ethics
The analysis reveals three conceptual pillars that structure this discourse:
1. **Adaptive Ethics** (centered on Adaptability and Design): The capacity to adjust, learn, and evolve protocols in response to changing conditions
2. **Relational Justice** (centered on Care, Consent, Equity, Inclusivity): Ethical frameworks emphasizing relationship, respect, and justice
3. **Systemic Resistance** (centered on Refusal, Subversion, Institutional Critique): Tactical opposition and critique of existing systems
### 8.2 The Adaptability Paradigm
The overwhelming centrality of **Adaptability** (highest frequency, highest connectivity) suggests this is the core organizing concept. It bridges:
- **Ethical dimensions:** Equity, Care, Consent
- **Operational dimensions:** Design, Iterative Development, Systems Thinking
- **Resistance dimensions:** Capture Resistance, Resistance, Agency
### 8.3 Source Convergence and Divergence
- **Convergence:** Both sources treat Adaptability as central, suggesting a shared understanding that protocols must be capable of change
- **Divergence:** AFP emphasizes critical/social dimensions (Institutional Critique, Collectivity), while PR emphasizes technical/systemic dimensions (Tension Management, Systems Thinking)
- **Integration:** The most conceptually dense texts (highest network density) come from AFP, suggesting critical theory provides more complex conceptual interconnections
### 8.4 Unexpected Pairings
Several virtue pairs show unexpected strength:
- **Care + Consent** (0.750): Suggests an ethics of care cannot exist without consent frameworks
- **Refusal + Subversion** (0.400): Tactical language clusters together
- **Equity + Inclusivity** (0.375): Justice requires both fair distribution and openness
### 8.5 The Resistance Cluster
The small cluster of resistance-focused texts (4 texts in Cluster 2) represents a distinct discourse that:
- Appears only in AFP texts
- Coheres around Refusal, Resistance, Subversion, Embodiment
- Serves as a strategic counterpoint to the dominant protocol design discourse
- May represent the critical "edge cases" that test protocol boundaries
---
## 9. Methodological Notes
### Analytic Techniques Used:
1. **K-Means Clustering** (k=4): Identified text groups based on virtue profile similarity
2. **Network Analysis**: mapped virtue co-occurrences and calculated centrality (degree = number of connections)
3. **Jaccard Similarity**: normalized measure of virtue pair association (intersection/union)
4. **Community Detection**: threshold-based clustering of highly connected virtue groups
### Limitations:
- Small dataset (134 texts) limits statistical power
- K-means clustering is sensitive to initialization (used deterministic starting points)
- Binary coding (presence/absence) doesn't capture intensity or salience
- Limited to virtues 1-5; other dimensions not analyzed
### Generated Files:
| File | Description |
|------|-------------|
| `cooccurrence_matrix.csv` | 25×25 matrix of virtue co-occurrence counts |
| `jaccard_similarity_matrix.csv` | 25×25 similarity matrix (Jaccard indices) |
| `strong_associations.csv` | Top 50 virtue pairs with association metrics |
| `virtue_profiles.json` | Individual virtue profiles for each text |
---
## 10. Recommendations for Further Analysis
1. **Qualitative Deep Dive:** Examine the 4 resistance-focused texts (Cluster 2) and the 10 authenticity-focused texts (Cluster 4) to understand the distinct discourses
2. **Temporal Analysis:** If dates are available, analyze how virtue frequencies change over time
3. **Semantic Mapping:** The Care+Consent pairing could be explored through close reading to understand the conceptual linkage
4. **Source-Specific Models:** Consider whether different theoretical frameworks might be needed for AFP vs. PR texts
5. **Expand to Other Codes:** Analysis currently limited to Virtue_1 through Virtue_5; expanding to other coding categories could reveal additional patterns
6. **Visualization:** Generate network graphs of virtue communities to make relationships visually explicit
---
*Analysis generated using Python standard library (no external packages required). All calculations are fully reproducible.*

View File

@@ -0,0 +1,26 @@
Virtue,Adaptability,Tension Management,Accessibility,Temporal Awareness,Design,Institutional Critique,Agency,Relationality,Infrastructural Awareness,Systems Thinking,Plurality,Transgression,Collectivity,Inheritance,Authenticity,Long-Term Vision,Equity,Capture Resistance,Respect,Cultural Awareness,Spatial Awareness,Interdependence,Shared Responsibility,Situational Awareness,Memory
Adaptability,,1,2,1,0,1,1,0,0,1,1,1,1,0,0,2,0,1,1,0,1,0,2,0,0
Tension Management,1,,0,1,2,0,0,2,0,1,3,0,0,0,0,2,0,0,0,0,0,1,0,0,0
Accessibility,2,0,,0,1,0,0,1,0,1,0,0,0,0,0,0,2,0,0,1,0,0,2,4,0
Temporal Awareness,1,1,0,,0,0,0,0,0,0,1,0,1,1,0,2,0,0,0,0,0,1,1,0,0
Design,0,2,1,0,,1,1,0,1,1,0,1,0,1,1,0,1,1,0,0,0,0,0,0,0
Institutional Critique,1,0,0,0,1,,1,0,2,1,0,0,0,0,0,0,2,0,0,0,1,0,0,0,0
Agency,1,0,0,0,1,1,,0,1,1,1,0,1,1,1,0,0,0,0,0,1,0,0,1,1
Relationality,0,2,1,0,0,0,0,,1,0,2,1,2,0,1,0,0,0,1,2,1,3,0,0,0
Infrastructural Awareness,0,0,0,0,1,2,1,1,,2,0,1,0,0,0,0,0,1,0,1,0,0,0,0,0
Systems Thinking,1,1,1,0,1,1,1,0,2,,1,0,1,0,0,1,0,0,0,0,1,0,0,1,0
Plurality,1,3,0,1,0,0,1,2,0,1,,0,1,0,0,1,0,1,0,0,0,1,1,0,0
Transgression,1,0,0,0,1,0,0,1,1,0,0,,0,1,1,0,0,1,3,2,0,1,1,0,0
Collectivity,1,0,0,1,0,0,1,2,0,1,1,0,,1,2,0,0,0,0,0,0,1,1,0,0
Inheritance,0,0,0,1,1,0,1,0,0,0,0,1,1,,3,0,0,0,0,1,0,0,0,0,2
Authenticity,0,0,0,0,1,0,1,1,0,0,0,1,2,3,,0,0,0,0,1,0,0,0,0,0
Long-Term Vision,2,2,0,2,0,0,0,0,0,1,1,0,0,0,0,,0,0,0,0,0,0,0,0,0
Equity,0,0,2,0,1,2,0,0,0,0,0,0,0,0,0,0,,0,0,1,0,0,0,0,0
Capture Resistance,1,0,0,0,1,0,0,0,1,0,1,1,0,0,0,0,0,,0,0,0,0,0,0,0
Respect,1,0,0,0,0,0,0,1,0,0,0,3,0,0,0,0,0,0,,2,1,0,0,0,0
Cultural Awareness,0,0,1,0,0,0,0,2,1,0,0,2,0,1,1,0,1,0,2,,2,0,0,0,0
Spatial Awareness,1,0,0,0,0,1,1,1,0,1,0,0,0,0,0,0,0,0,1,2,,0,0,0,0
Interdependence,0,1,0,1,0,0,0,3,0,0,1,1,1,0,0,0,0,0,0,0,0,,0,0,0
Shared Responsibility,2,0,2,1,0,0,0,0,0,0,1,1,1,0,0,0,0,0,0,0,0,0,,1,0
Situational Awareness,0,0,4,0,0,0,1,0,0,1,0,0,0,0,0,0,0,0,0,0,0,0,1,,0
Memory,0,0,0,0,0,0,1,0,0,0,0,0,0,2,0,0,0,0,0,0,0,0,0,0,
1 Virtue Adaptability Tension Management Accessibility Temporal Awareness Design Institutional Critique Agency Relationality Infrastructural Awareness Systems Thinking Plurality Transgression Collectivity Inheritance Authenticity Long-Term Vision Equity Capture Resistance Respect Cultural Awareness Spatial Awareness Interdependence Shared Responsibility Situational Awareness Memory
2 Adaptability 1 2 1 0 1 1 0 0 1 1 1 1 0 0 2 0 1 1 0 1 0 2 0 0
3 Tension Management 1 0 1 2 0 0 2 0 1 3 0 0 0 0 2 0 0 0 0 0 1 0 0 0
4 Accessibility 2 0 0 1 0 0 1 0 1 0 0 0 0 0 0 2 0 0 1 0 0 2 4 0
5 Temporal Awareness 1 1 0 0 0 0 0 0 0 1 0 1 1 0 2 0 0 0 0 0 1 1 0 0
6 Design 0 2 1 0 1 1 0 1 1 0 1 0 1 1 0 1 1 0 0 0 0 0 0 0
7 Institutional Critique 1 0 0 0 1 1 0 2 1 0 0 0 0 0 0 2 0 0 0 1 0 0 0 0
8 Agency 1 0 0 0 1 1 0 1 1 1 0 1 1 1 0 0 0 0 0 1 0 0 1 1
9 Relationality 0 2 1 0 0 0 0 1 0 2 1 2 0 1 0 0 0 1 2 1 3 0 0 0
10 Infrastructural Awareness 0 0 0 0 1 2 1 1 2 0 1 0 0 0 0 0 1 0 1 0 0 0 0 0
11 Systems Thinking 1 1 1 0 1 1 1 0 2 1 0 1 0 0 1 0 0 0 0 1 0 0 1 0
12 Plurality 1 3 0 1 0 0 1 2 0 1 0 1 0 0 1 0 1 0 0 0 1 1 0 0
13 Transgression 1 0 0 0 1 0 0 1 1 0 0 0 1 1 0 0 1 3 2 0 1 1 0 0
14 Collectivity 1 0 0 1 0 0 1 2 0 1 1 0 1 2 0 0 0 0 0 0 1 1 0 0
15 Inheritance 0 0 0 1 1 0 1 0 0 0 0 1 1 3 0 0 0 0 1 0 0 0 0 2
16 Authenticity 0 0 0 0 1 0 1 1 0 0 0 1 2 3 0 0 0 0 1 0 0 0 0 0
17 Long-Term Vision 2 2 0 2 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0
18 Equity 0 0 2 0 1 2 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0
19 Capture Resistance 1 0 0 0 1 0 0 0 1 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0
20 Respect 1 0 0 0 0 0 0 1 0 0 0 3 0 0 0 0 0 0 2 1 0 0 0 0
21 Cultural Awareness 0 0 1 0 0 0 0 2 1 0 0 2 0 1 1 0 1 0 2 2 0 0 0 0
22 Spatial Awareness 1 0 0 0 0 1 1 1 0 1 0 0 0 0 0 0 0 0 1 2 0 0 0 0
23 Interdependence 0 1 0 1 0 0 0 3 0 0 1 1 1 0 0 0 0 0 0 0 0 0 0 0
24 Shared Responsibility 2 0 2 1 0 0 0 0 0 0 1 1 1 0 0 0 0 0 0 0 0 0 1 0
25 Situational Awareness 0 0 4 0 0 0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 1 0
26 Memory 0 0 0 0 0 0 1 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0

View File

@@ -0,0 +1,165 @@
#!/usr/bin/env python3
"""
Detailed Analysis with Output Files
"""
import csv
from collections import defaultdict, Counter
from itertools import combinations
import math
def load_data(filename):
with open(filename, 'r') as f:
reader = csv.DictReader(f)
rows = list(reader)
return rows
def main():
rows = load_data('coding.csv')
# Extract virtues
virtue_cols = ['Virtue_1', 'Virtue_2', 'Virtue_3', 'Virtue_4', 'Virtue_5']
all_virtues_per_row = []
for row in rows:
virtues = []
for col in virtue_cols:
val = row.get(col, '').strip() if row.get(col) else ''
if val:
virtues.append(val)
all_virtues_per_row.append(virtues)
# Get top virtues for matrix
all_virtues_flat = [v for sublist in all_virtues_per_row for v in sublist]
virtue_freq = Counter(all_virtues_flat)
top_virtues = [v for v, c in virtue_freq.most_common(25)]
# Create co-occurrence matrix
cooccurrence = Counter()
for virtues in all_virtues_per_row:
for pair in combinations(sorted(virtues), 2):
cooccurrence[pair] += 1
# Write co-occurrence matrix
with open('cooccurrence_matrix.csv', 'w', newline='') as f:
writer = csv.writer(f)
writer.writerow(['Virtue'] + top_virtues)
for v1 in top_virtues:
row = [v1]
for v2 in top_virtues:
if v1 == v2:
row.append('') # Diagonal
else:
count = cooccurrence.get((min(v1,v2), max(v1,v2)), 0)
row.append(count)
writer.writerow(row)
print("Created: cooccurrence_matrix.csv")
# Create similarity matrix (Jaccard)
virtue_sets = defaultdict(set)
for idx, virtues in enumerate(all_virtues_per_row):
for v in virtues:
virtue_sets[v].add(idx)
with open('jaccard_similarity_matrix.csv', 'w', newline='') as f:
writer = csv.writer(f)
writer.writerow(['Virtue'] + top_virtues)
for v1 in top_virtues:
row = [v1]
for v2 in top_virtues:
if v1 == v2:
row.append('1.0')
else:
set1 = virtue_sets[v1]
set2 = virtue_sets[v2]
jaccard = len(set1 & set2) / len(set1 | set2) if (set1 | set2) else 0
row.append(f"{jaccard:.3f}")
writer.writerow(row)
print("Created: jaccard_similarity_matrix.csv")
# Centrality analysis - which virtues connect most to others
print("\n" + "=" * 70)
print("VIRTUE NETWORK CENTRALITY ANALYSIS")
print("=" * 70)
# Degree centrality (how many different virtues each connects to)
connections = defaultdict(set)
for (v1, v2), count in cooccurrence.items():
if count >= 1:
connections[v1].add(v2)
connections[v2].add(v1)
centrality = [(v, len(connections[v])) for v in virtue_freq.keys()]
centrality.sort(key=lambda x: x[1], reverse=True)
print("\nTop 'Hub' Virtues (connect to most other virtue types):")
print(f"{'Virtue':<40} {'Connections':<12}")
print("-" * 55)
for virtue, degree in centrality[:15]:
nearby = list(connections[virtue])[:5]
print(f"{virtue:<40} {degree:<12}{', '.join(nearby)}")
# Network density by source
print("\n" + "=" * 70)
print("NETWORK COMPLEXITY BY SOURCE")
print("=" * 70)
source_per_row = [row.get('Source', 'Unknown') for row in rows]
for source in ['AFP', 'PR']:
source_indices = [i for i, s in enumerate(source_per_row) if s == source]
source_pairs = Counter()
for idx in source_indices:
virtues = all_virtues_per_row[idx]
for pair in combinations(sorted(virtues), 2):
source_pairs[pair] += 1
unique_connections = len(source_pairs)
total_texts = len(source_indices)
avg_pairs = sum(source_pairs.values()) / total_texts if total_texts else 0
print(f"\n{source}:")
print(f" Texts: {total_texts}")
print(f" Unique virtue pairs: {unique_connections}")
print(f" Avg pairs per text: {avg_pairs:.2f}")
print(f" Network density: {unique_connections / (len(virtue_freq) * (len(virtue_freq)-1) / 2) * 100:.1f}%")
# Create profile for each text (export)
with open('virtue_profiles.json', 'w') as f:
profiles = []
for i, (row, virtues) in enumerate(zip(rows, all_virtues_per_row)):
profiles.append({
'id': i,
'source': row.get('Source', ''),
'virtues': virtues,
'virtue_count': len(virtues)
})
import json
json.dump(profiles, f, indent=2)
print("\nCreated: virtue_profiles.json")
# Summary of strongest associations
with open('strong_associations.csv', 'w', newline='') as f:
writer = csv.writer(f)
writer.writerow(['Virtue_1', 'Virtue_2', 'Co_count', 'Jaccard', 'Observed', 'Expected'])
for (v1, v2), count in cooccurrence.most_common(50):
set1 = virtue_sets[v1]
set2 = virtue_sets[v2]
jaccard = len(set1 & set2) / len(set1 | set2) if (set1 | set2) else 0
# Expected co-occurrence if random
p1 = len(set1) / len(rows)
p2 = len(set2) / len(rows)
expected = len(rows) * p1 * p2
writer.writerow([v1, v2, count, f"{jaccard:.3f}", count, f"{expected:.2f}"])
print("Created: strong_associations.csv")
if __name__ == "__main__":
main()

View File

@@ -0,0 +1,26 @@
Virtue,Adaptability,Tension Management,Accessibility,Temporal Awareness,Design,Institutional Critique,Agency,Relationality,Infrastructural Awareness,Systems Thinking,Plurality,Transgression,Collectivity,Inheritance,Authenticity,Long-Term Vision,Equity,Capture Resistance,Respect,Cultural Awareness,Spatial Awareness,Interdependence,Shared Responsibility,Situational Awareness,Memory
Adaptability,1.0,0.034,0.071,0.037,0.000,0.038,0.038,0.000,0.000,0.038,0.040,0.040,0.042,0.000,0.000,0.091,0.000,0.045,0.045,0.000,0.045,0.000,0.095,0.000,0.000
Tension Management,0.034,1.0,0.000,0.043,0.091,0.000,0.000,0.095,0.000,0.045,0.158,0.000,0.000,0.000,0.000,0.111,0.000,0.000,0.000,0.000,0.000,0.056,0.000,0.000,0.000
Accessibility,0.071,0.000,1.0,0.000,0.043,0.000,0.000,0.045,0.000,0.045,0.000,0.000,0.000,0.000,0.000,0.000,0.118,0.000,0.000,0.056,0.000,0.000,0.118,0.267,0.000
Temporal Awareness,0.037,0.043,0.000,1.0,0.000,0.000,0.000,0.000,0.000,0.000,0.053,0.000,0.056,0.056,0.000,0.125,0.000,0.000,0.000,0.000,0.000,0.062,0.062,0.000,0.000
Design,0.000,0.091,0.043,0.000,1.0,0.050,0.050,0.000,0.050,0.050,0.000,0.053,0.000,0.056,0.059,0.000,0.062,0.062,0.000,0.000,0.000,0.000,0.000,0.000,0.000
Institutional Critique,0.038,0.000,0.000,0.000,0.050,1.0,0.053,0.000,0.111,0.053,0.000,0.000,0.000,0.000,0.000,0.000,0.143,0.000,0.000,0.000,0.067,0.000,0.000,0.000,0.000
Agency,0.038,0.000,0.000,0.000,0.050,0.053,1.0,0.000,0.053,0.053,0.056,0.000,0.059,0.059,0.062,0.000,0.000,0.000,0.000,0.000,0.067,0.000,0.000,0.067,0.071
Relationality,0.000,0.095,0.045,0.000,0.000,0.000,0.000,1.0,0.053,0.000,0.118,0.056,0.125,0.000,0.062,0.000,0.000,0.000,0.067,0.143,0.067,0.231,0.000,0.000,0.000
Infrastructural Awareness,0.000,0.000,0.000,0.000,0.050,0.111,0.053,0.053,1.0,0.111,0.000,0.056,0.000,0.000,0.000,0.000,0.000,0.067,0.000,0.067,0.000,0.000,0.000,0.000,0.000
Systems Thinking,0.038,0.045,0.045,0.000,0.050,0.053,0.053,0.000,0.111,1.0,0.056,0.000,0.059,0.000,0.000,0.062,0.000,0.000,0.000,0.000,0.067,0.000,0.000,0.067,0.000
Plurality,0.040,0.158,0.000,0.053,0.000,0.000,0.056,0.118,0.000,0.056,1.0,0.000,0.062,0.000,0.000,0.067,0.000,0.071,0.000,0.000,0.000,0.071,0.071,0.000,0.000
Transgression,0.040,0.000,0.000,0.000,0.053,0.000,0.000,0.056,0.056,0.000,0.000,1.0,0.000,0.062,0.067,0.000,0.000,0.071,0.250,0.154,0.000,0.071,0.071,0.000,0.000
Collectivity,0.042,0.000,0.000,0.056,0.000,0.000,0.059,0.125,0.000,0.059,0.062,0.000,1.0,0.067,0.154,0.000,0.000,0.000,0.000,0.000,0.000,0.077,0.077,0.000,0.000
Inheritance,0.000,0.000,0.000,0.056,0.056,0.000,0.059,0.000,0.000,0.000,0.000,0.062,0.067,1.0,0.250,0.000,0.000,0.000,0.000,0.077,0.000,0.000,0.000,0.000,0.182
Authenticity,0.000,0.000,0.000,0.000,0.059,0.000,0.062,0.062,0.000,0.000,0.000,0.067,0.154,0.250,1.0,0.000,0.000,0.000,0.000,0.083,0.000,0.000,0.000,0.000,0.000
Long-Term Vision,0.091,0.111,0.000,0.125,0.000,0.000,0.000,0.000,0.000,0.062,0.067,0.000,0.000,0.000,0.000,1.0,0.000,0.000,0.000,0.000,0.000,0.000,0.000,0.000,0.000
Equity,0.000,0.000,0.118,0.000,0.062,0.143,0.000,0.000,0.000,0.000,0.000,0.000,0.000,0.000,0.000,0.000,1.0,0.000,0.000,0.091,0.000,0.000,0.000,0.000,0.000
Capture Resistance,0.045,0.000,0.000,0.000,0.062,0.000,0.000,0.000,0.067,0.000,0.071,0.071,0.000,0.000,0.000,0.000,0.000,1.0,0.000,0.000,0.000,0.000,0.000,0.000,0.000
Respect,0.045,0.000,0.000,0.000,0.000,0.000,0.000,0.067,0.000,0.000,0.000,0.250,0.000,0.000,0.000,0.000,0.000,0.000,1.0,0.200,0.091,0.000,0.000,0.000,0.000
Cultural Awareness,0.000,0.000,0.056,0.000,0.000,0.000,0.000,0.143,0.067,0.000,0.000,0.154,0.000,0.077,0.083,0.000,0.091,0.000,0.200,1.0,0.200,0.000,0.000,0.000,0.000
Spatial Awareness,0.045,0.000,0.000,0.000,0.000,0.067,0.067,0.067,0.000,0.067,0.000,0.000,0.000,0.000,0.000,0.000,0.000,0.000,0.091,0.200,1.0,0.000,0.000,0.000,0.000
Interdependence,0.000,0.056,0.000,0.062,0.000,0.000,0.000,0.231,0.000,0.000,0.071,0.071,0.077,0.000,0.000,0.000,0.000,0.000,0.000,0.000,0.000,1.0,0.000,0.000,0.000
Shared Responsibility,0.095,0.000,0.118,0.062,0.000,0.000,0.000,0.000,0.000,0.000,0.071,0.071,0.077,0.000,0.000,0.000,0.000,0.000,0.000,0.000,0.000,0.000,1.0,0.091,0.000
Situational Awareness,0.000,0.000,0.267,0.000,0.000,0.000,0.067,0.000,0.000,0.067,0.000,0.000,0.000,0.000,0.000,0.000,0.000,0.000,0.000,0.000,0.000,0.000,0.091,1.0,0.000
Memory,0.000,0.000,0.000,0.000,0.000,0.000,0.071,0.000,0.000,0.000,0.000,0.000,0.000,0.182,0.000,0.000,0.000,0.000,0.000,0.000,0.000,0.000,0.000,0.000,1.0
1 Virtue Adaptability Tension Management Accessibility Temporal Awareness Design Institutional Critique Agency Relationality Infrastructural Awareness Systems Thinking Plurality Transgression Collectivity Inheritance Authenticity Long-Term Vision Equity Capture Resistance Respect Cultural Awareness Spatial Awareness Interdependence Shared Responsibility Situational Awareness Memory
2 Adaptability 1.0 0.034 0.071 0.037 0.000 0.038 0.038 0.000 0.000 0.038 0.040 0.040 0.042 0.000 0.000 0.091 0.000 0.045 0.045 0.000 0.045 0.000 0.095 0.000 0.000
3 Tension Management 0.034 1.0 0.000 0.043 0.091 0.000 0.000 0.095 0.000 0.045 0.158 0.000 0.000 0.000 0.000 0.111 0.000 0.000 0.000 0.000 0.000 0.056 0.000 0.000 0.000
4 Accessibility 0.071 0.000 1.0 0.000 0.043 0.000 0.000 0.045 0.000 0.045 0.000 0.000 0.000 0.000 0.000 0.000 0.118 0.000 0.000 0.056 0.000 0.000 0.118 0.267 0.000
5 Temporal Awareness 0.037 0.043 0.000 1.0 0.000 0.000 0.000 0.000 0.000 0.000 0.053 0.000 0.056 0.056 0.000 0.125 0.000 0.000 0.000 0.000 0.000 0.062 0.062 0.000 0.000
6 Design 0.000 0.091 0.043 0.000 1.0 0.050 0.050 0.000 0.050 0.050 0.000 0.053 0.000 0.056 0.059 0.000 0.062 0.062 0.000 0.000 0.000 0.000 0.000 0.000 0.000
7 Institutional Critique 0.038 0.000 0.000 0.000 0.050 1.0 0.053 0.000 0.111 0.053 0.000 0.000 0.000 0.000 0.000 0.000 0.143 0.000 0.000 0.000 0.067 0.000 0.000 0.000 0.000
8 Agency 0.038 0.000 0.000 0.000 0.050 0.053 1.0 0.000 0.053 0.053 0.056 0.000 0.059 0.059 0.062 0.000 0.000 0.000 0.000 0.000 0.067 0.000 0.000 0.067 0.071
9 Relationality 0.000 0.095 0.045 0.000 0.000 0.000 0.000 1.0 0.053 0.000 0.118 0.056 0.125 0.000 0.062 0.000 0.000 0.000 0.067 0.143 0.067 0.231 0.000 0.000 0.000
10 Infrastructural Awareness 0.000 0.000 0.000 0.000 0.050 0.111 0.053 0.053 1.0 0.111 0.000 0.056 0.000 0.000 0.000 0.000 0.000 0.067 0.000 0.067 0.000 0.000 0.000 0.000 0.000
11 Systems Thinking 0.038 0.045 0.045 0.000 0.050 0.053 0.053 0.000 0.111 1.0 0.056 0.000 0.059 0.000 0.000 0.062 0.000 0.000 0.000 0.000 0.067 0.000 0.000 0.067 0.000
12 Plurality 0.040 0.158 0.000 0.053 0.000 0.000 0.056 0.118 0.000 0.056 1.0 0.000 0.062 0.000 0.000 0.067 0.000 0.071 0.000 0.000 0.000 0.071 0.071 0.000 0.000
13 Transgression 0.040 0.000 0.000 0.000 0.053 0.000 0.000 0.056 0.056 0.000 0.000 1.0 0.000 0.062 0.067 0.000 0.000 0.071 0.250 0.154 0.000 0.071 0.071 0.000 0.000
14 Collectivity 0.042 0.000 0.000 0.056 0.000 0.000 0.059 0.125 0.000 0.059 0.062 0.000 1.0 0.067 0.154 0.000 0.000 0.000 0.000 0.000 0.000 0.077 0.077 0.000 0.000
15 Inheritance 0.000 0.000 0.000 0.056 0.056 0.000 0.059 0.000 0.000 0.000 0.000 0.062 0.067 1.0 0.250 0.000 0.000 0.000 0.000 0.077 0.000 0.000 0.000 0.000 0.182
16 Authenticity 0.000 0.000 0.000 0.000 0.059 0.000 0.062 0.062 0.000 0.000 0.000 0.067 0.154 0.250 1.0 0.000 0.000 0.000 0.000 0.083 0.000 0.000 0.000 0.000 0.000
17 Long-Term Vision 0.091 0.111 0.000 0.125 0.000 0.000 0.000 0.000 0.000 0.062 0.067 0.000 0.000 0.000 0.000 1.0 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000
18 Equity 0.000 0.000 0.118 0.000 0.062 0.143 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 1.0 0.000 0.000 0.091 0.000 0.000 0.000 0.000 0.000
19 Capture Resistance 0.045 0.000 0.000 0.000 0.062 0.000 0.000 0.000 0.067 0.000 0.071 0.071 0.000 0.000 0.000 0.000 0.000 1.0 0.000 0.000 0.000 0.000 0.000 0.000 0.000
20 Respect 0.045 0.000 0.000 0.000 0.000 0.000 0.000 0.067 0.000 0.000 0.000 0.250 0.000 0.000 0.000 0.000 0.000 0.000 1.0 0.200 0.091 0.000 0.000 0.000 0.000
21 Cultural Awareness 0.000 0.000 0.056 0.000 0.000 0.000 0.000 0.143 0.067 0.000 0.000 0.154 0.000 0.077 0.083 0.000 0.091 0.000 0.200 1.0 0.200 0.000 0.000 0.000 0.000
22 Spatial Awareness 0.045 0.000 0.000 0.000 0.000 0.067 0.067 0.067 0.000 0.067 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.091 0.200 1.0 0.000 0.000 0.000 0.000
23 Interdependence 0.000 0.056 0.000 0.062 0.000 0.000 0.000 0.231 0.000 0.000 0.071 0.071 0.077 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 1.0 0.000 0.000 0.000
24 Shared Responsibility 0.095 0.000 0.118 0.062 0.000 0.000 0.000 0.000 0.000 0.000 0.071 0.071 0.077 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 1.0 0.091 0.000
25 Situational Awareness 0.000 0.000 0.267 0.000 0.000 0.000 0.067 0.000 0.000 0.067 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.091 1.0 0.000
26 Memory 0.000 0.000 0.000 0.000 0.000 0.000 0.071 0.000 0.000 0.000 0.000 0.000 0.000 0.182 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 1.0

View File

@@ -0,0 +1,51 @@
Virtue_1,Virtue_2,Co_count,Jaccard,Observed,Expected
Accessibility,Situational Awareness,4,0.267,4,0.58
Equity,Inclusivity,3,0.375,3,0.22
Balance,Tension Management,3,0.200,3,0.49
Agency,Freedom,3,0.300,3,0.22
Empathy,Relationality,3,0.273,3,0.30
Respect,Transgression,3,0.250,3,0.40
Authenticity,Inheritance,3,0.250,3,0.42
Care,Consent,3,0.750,3,0.09
Interdependence,Relationality,3,0.231,3,0.45
Plurality,Tension Management,3,0.158,3,0.87
Embodiment,Institutional Critique,2,0.154,2,0.37
Embodiment,Refusal,2,0.286,2,0.15
Refusal,Resistance,2,0.333,2,0.12
Refusal,Subversion,2,0.400,2,0.09
Resistance,Subversion,2,0.400,2,0.09
Equity,Institutional Critique,2,0.143,2,0.45
Adaptability,Collaboration,2,0.111,2,0.38
Agency,Resistance,2,0.167,2,0.30
Imitation,Memory,2,0.286,2,0.15
Agency,Autonomy,2,0.182,2,0.22
Cultural Awareness,Respect,2,0.200,2,0.27
Cultural Awareness,Spatial Awareness,2,0.200,2,0.27
Cultural Awareness,Empathy,2,0.250,2,0.18
Cultural Awareness,Relationality,2,0.143,2,0.45
Cultural Awareness,Transgression,2,0.154,2,0.40
Inheritance,Memory,2,0.182,2,0.30
Authenticity,Collectivity,2,0.154,2,0.42
Collectivity,Relationality,2,0.125,2,0.60
Adaptability,Iterative Development,2,0.105,2,0.51
Adaptability,Long-Term Vision,2,0.091,2,0.89
Plurality,Relationality,2,0.118,2,0.67
Embodiment,Groundedness,2,0.333,2,0.11
Historical Awareness,Inheritance,2,0.200,2,0.24
Inheritance,Refusal,2,0.200,2,0.24
Relationality,Tension Management,2,0.095,2,0.97
Accessibility,Equity,2,0.118,2,0.58
Accessibility,Adaptability,2,0.071,2,1.65
Accessibility,Shared Responsibility,2,0.118,2,0.58
Adaptability,Shared Responsibility,2,0.095,2,0.76
Accessibility,Care,2,0.133,2,0.39
Infrastructural Awareness,Institutional Critique,2,0.111,2,0.75
Infrastructural Awareness,Systems Thinking,2,0.111,2,0.75
Adaptability,Replicability,2,0.100,2,0.63
Long-Term Vision,Temporal Awareness,2,0.125,2,0.57
Accessibility,Reflexivity,2,0.125,2,0.49
Design,Tension Management,2,0.091,2,1.07
Complex Systems Tolerance,Tension Management,2,0.133,2,0.39
Long-Term Vision,Tension Management,2,0.111,2,0.68
Imitation,Replicability,2,0.286,2,0.15
Authenticity,Role Awareness,2,0.200,2,0.26
1 Virtue_1 Virtue_2 Co_count Jaccard Observed Expected
2 Accessibility Situational Awareness 4 0.267 4 0.58
3 Equity Inclusivity 3 0.375 3 0.22
4 Balance Tension Management 3 0.200 3 0.49
5 Agency Freedom 3 0.300 3 0.22
6 Empathy Relationality 3 0.273 3 0.30
7 Respect Transgression 3 0.250 3 0.40
8 Authenticity Inheritance 3 0.250 3 0.42
9 Care Consent 3 0.750 3 0.09
10 Interdependence Relationality 3 0.231 3 0.45
11 Plurality Tension Management 3 0.158 3 0.87
12 Embodiment Institutional Critique 2 0.154 2 0.37
13 Embodiment Refusal 2 0.286 2 0.15
14 Refusal Resistance 2 0.333 2 0.12
15 Refusal Subversion 2 0.400 2 0.09
16 Resistance Subversion 2 0.400 2 0.09
17 Equity Institutional Critique 2 0.143 2 0.45
18 Adaptability Collaboration 2 0.111 2 0.38
19 Agency Resistance 2 0.167 2 0.30
20 Imitation Memory 2 0.286 2 0.15
21 Agency Autonomy 2 0.182 2 0.22
22 Cultural Awareness Respect 2 0.200 2 0.27
23 Cultural Awareness Spatial Awareness 2 0.200 2 0.27
24 Cultural Awareness Empathy 2 0.250 2 0.18
25 Cultural Awareness Relationality 2 0.143 2 0.45
26 Cultural Awareness Transgression 2 0.154 2 0.40
27 Inheritance Memory 2 0.182 2 0.30
28 Authenticity Collectivity 2 0.154 2 0.42
29 Collectivity Relationality 2 0.125 2 0.60
30 Adaptability Iterative Development 2 0.105 2 0.51
31 Adaptability Long-Term Vision 2 0.091 2 0.89
32 Plurality Relationality 2 0.118 2 0.67
33 Embodiment Groundedness 2 0.333 2 0.11
34 Historical Awareness Inheritance 2 0.200 2 0.24
35 Inheritance Refusal 2 0.200 2 0.24
36 Relationality Tension Management 2 0.095 2 0.97
37 Accessibility Equity 2 0.118 2 0.58
38 Accessibility Adaptability 2 0.071 2 1.65
39 Accessibility Shared Responsibility 2 0.118 2 0.58
40 Adaptability Shared Responsibility 2 0.095 2 0.76
41 Accessibility Care 2 0.133 2 0.39
42 Infrastructural Awareness Institutional Critique 2 0.111 2 0.75
43 Infrastructural Awareness Systems Thinking 2 0.111 2 0.75
44 Adaptability Replicability 2 0.100 2 0.63
45 Long-Term Vision Temporal Awareness 2 0.125 2 0.57
46 Accessibility Reflexivity 2 0.125 2 0.49
47 Design Tension Management 2 0.091 2 1.07
48 Complex Systems Tolerance Tension Management 2 0.133 2 0.39
49 Long-Term Vision Tension Management 2 0.111 2 0.68
50 Imitation Replicability 2 0.286 2 0.15
51 Authenticity Role Awareness 2 0.200 2 0.26

File diff suppressed because it is too large Load Diff

136
text_coding/coding.csv Normal file
View File

@@ -0,0 +1,136 @@
Source,Text,,Virtue_1,Virtue_2,Virtue_3,Virtue_4,Virtue_5
AFP,"You have a past, but you remember it with more detail than you should. And these details cannot be stopped by time. They have become a tradition.",,Memory,Tradition,Historical Awareness,,
AFP,You have no past. Either you have forgotten it or it was erased from you. You are piecing together the rest of the story from the information of others and you have placed yourself inside. This is your protocol.,,Temporal Awareness,Collectivity,,,
AFP,"Identifying and working against these protocols necessitates civil disobedience against the limitations of institutionalized knowledge and biopolitical power that seek to govern and interpellate our bodies, our health, gender, sexuality, and (re)production.",,Institutional Critique,Embodiment,Resistance,Refusal,Subversion
AFP,Investigating protocols as such allows us to contribute to the creation of new protocols that are inclusive and equitable.,,Equity,Inclusivity,Institutional Critique,Design,
AFP,"We were interested in how this process may contribute to long-term political organizing, which requires ongoing cycles of action, reflection, and adjustments to the dynamics and protocols of shared struggle.",,Collaboration,Resistance,Adaptability,Agency,Collectivity
AFP,"Ultra-red has no single organized political affiliation. The collectives members are engaged with anti-racist movements in Britain, migrant struggles in Germany, community-based education in London, New York City, and Los Angeles, and struggles for housing and just community development in East Los Angeles.",,Decentralized Governance,Plurality,Capture Resistance,,
AFP,"At the passing of four and a half minutes, the workshop organizer announced, “Time.” Then we asked, “What did you hear?” We noticed that this practice increased concerns with and discussion of the contexts within which people gathered to address the crisis.",,Temporal Awareness,Tension Management,,,
AFP,"Who speaks? Whose voice is amplified? What do we speak of and to whom? Who listens, and to what end do they listen? Who has a place at the table? Who determines who has a place at the table? And on whose behalf do those seated at the table speak?",,Equity,Curiosity,Inclusivity,,
AFP,The failure to address this hegemony perpetuates divides between those who circulate within the art world and those who do not. The only acknowledgment of this divide comes in the form of “audience development” initiatives based on liberal notions of inclusion.,,Inclusivity,Equity,,,
AFP,"When effective, constitutive protocols place experience in dialogue with principles and regulations. This is what I consider the most powerful use of protocols, which is when disciplinary and constitutive protocols form a contradiction or dialectic.",,Tension Management,Balance,,,
AFP,"This led us to borrow the concept of “desire lines”—trails or paths carved out over time, usually emerging as shortcuts between destinations. In built landscapes, they break protocol with prescribed routes. In natural environments, they often reveal animal migrations, paths used across generations. Desire lines are always a record of behavior—lines of movement suggested by previous path-takers and followed by future path-takers. Apparently, we cannot all be trailblazers. We love to follow in each others footsteps.",,Resistance,Memory,Iterative Development,Imitation,Agency
AFP,"Breaking protocol with accepted modes of behavior in public space can feel dangerous—especially given current and historical restrictions on sexual desire and, in particular, same-sex desire.",,Resistance,Transgression,Refusal,Subversion,
AFP,"Freedom and desire mean different things to different people at different times. So one of the central tenets is the liberating notion that we dont all have to agree. Of course, with a proposal",,Autonomy,Plurality,Agency,Freedom,
AFP,"If I had been outside of my homeland, I then would have acknowledged whosoevers territory I was visiting, as a political affirmation of their sovereignty and self-determination and a practice of respect.",,Respect,Cultural Awareness,Spatial Awareness,,
AFP,"Marias smile, though, was not protocol. There is no rule that Anishinaabe begin meetings, visits, or events with a big smile; if anything, our elders tend to show less emotion in facial expressions in comparison to Euro-Canadian or American culture. I experienced her smile as entirely Anishinaabe because it was contradictory to the colonial form of our encounter and the formality of artist talks and academic conversations.",,Transgression,Respect,Relationality,Cultural Awareness,Empathy
AFP,"we are not the first Indigenous women or artists to sit down and have a conversation about protocols. These conversations happen all the time around kitchen tables, on sidewalks, in galleries and studios, and in the bush.",,Memory,Inheritance,,,
AFP,"I didnt set out to break protocol; my intention was to expand our ideas around protocol or to place protocols back within the larger network of Anishinaabe ethics. If the intent of protocols is to show respect and create spaces where we could be our best selves, what happens when there is such rigidity that the protocol erodes our foundational values of consent, diversity, self-determination, and non-interference? What happens when protocol backfires and causes harm?",,Transgression,Respect,,,
AFP,How can we break the cage of protocol and embody a deeper understanding of Anishinaabe ethics and values?,,Transgression,Inheritance,Cultural Awareness,Authenticity,
AFP,"Anishinaabe life, to a great degree, is care work. Our foundational teachings, the Seven Ancestor teachings, in my area called the Kookum Dibajimowin, are not a set of laws or commandments, or protocols that we have to follow. Rather, they are a complex set of practices that, when embodied, both individually and in relation to other living things, create a world in which consent, accountability, problem solving, and kindness are embedded.",,Care,Complex Systems Tolerance,Consent,Accountability,Creative Problem Solving
AFP,"remember very early on in my career being out on the land with an Elder hunting geese. We shot one, and he had forgotten his tobacco. I remember wondering what was going to happen, because it is our practice to show gratitude through reciprocity, and normally this is done through an offering of tobacco. The Elder who I was with left a tiny bit of his baloney sandwich. When I asked him if this was going to be OK with the geese, he said “Of course,” because the gesture was thoughtful and would be seen by the geese as an expression of deep respect.",,Reciprocity,Adaptability,Respect,,
AFP,Avoid using protocol to demonstrate how much of your culture youve recovered and instead use our practices as a point of connection and to create belonging and nurture relationships.,,Collectivity,Relationality,Authenticity,,
AFP,"It needs to go back to family and community, figuring out who you are, where you come from, what your family gifts, what your gifts are that you have to contribute, cause they are not the same, and they are not always what we want them to be either.",,Inclusivity,Collectivity,Inheritance,Authenticity,
AFP,"An essential element of my practice is what I call spiritual fieldwork, or the process of developing relationships with the human and nonhuman entities of a particular place or field in tandem with gathering information.",,Relationality,Curiosity,Spatial Awareness,,
AFP,"I think time is an Indigenous currency, one that we especially lack in our capitalist society. Listening also requires that you be present, allowing what you hear to shape the process at every step.",,Temporal Awareness,Adaptability,Curiosity,,
AFP,"When trust has been built, it is important to be aware of ones limitations, not to overstep, and not to overcommit. Trust is maintained by keeping promises, contracts, and boundaries.",,Humility,Responsibility,Accountability,Reciprocity,Trust
AFP,"reciprocity takes shape in responding to calls for mutual aid at any level, and by doing so it supports collectivities through personal and professional interactions.",,Reciprocity,Collectivity,,,
AFP,"In all Indigenous cultures, there is a natural law, a model of the world in which energies fluctuate between different levels. Associated with this vision of perpetual energy movement is the protocol of pagamento, or payback, which is the need to act based on the principle of reciprocity, to always give something in exchange for what is obtained, be it something material or service of any kind.",,Reciprocity,,,,
AFP,"The protocols I have shared here are not set in stone—they shift as I learn and grow, as society grows, and as the circumstances of our planet change rapidly.",,Adaptability,Iterative Development,Long-Term Vision,,
AFP,Let us collectively recommit to center and sustain life through our diverse practices. Let us remember that we are all related and that our futures are intertwined.,,Plurality,Interdependence,Sustainable Practices,Collectivity,Relationality
AFP,"Stay low to the ground. Stay nimble and mobile (shifting between places, scales, times, elements). Keep it trans-local. Attend to the lower parts of the body. Think with and of pregnancy, with and of forms of degraded trans*ition, transformation, metamorphosis. Use your nose.36 Follow the shit. Follow the power. Follow the money.37",,Embodiment,Adaptability,Groundedness,Spatial Awareness,Institutional Critique
AFP,"I argue that this is the kind of approach we need as we think through the nexus of ecology, climate, and racism. This grounding approach does not take refuge in ideal theory (climate ethics) or abstract calculations of emissions (some climate justice) but rather gets down in the muck, in the matter of life and death, to think and be in ways that (to borrow from Wynter) are “down to earth.”",,Embodiment,Groundedness,,,
AFP,"The behaviors that we think liberate us are based on the disappointments of the past and keep us constrained within the confines of colonial imaginations dispossessing us of our purpose and, ultimately, our freedom.",,Institutional Critique,Agency,Freedom,,
AFP,"To choose the self without fixing, changing, guilting, or blaming, we also have to choose rather than deny, escape, or wish away the histories that made us. We have to embark on a new protocol.",,Authenticity,Historical Awareness,Inheritance,Design,
AFP,Escapism is one of the various epigenetic expressions I carry as a descendant of enslaved Indigenous peoples. I have the ability to not be here now as a way of enduring the present and making my way toward the future. Afrofuturist narratives like the folktales of High John and Brerer Rabbit were an already-always part of me when I needed hope—a cartography towards freedom letting me know that other ways of being are possible and that I am not stuck here.,,Inheritance,Agency,Refusal,Imagination,
AFP,It does not honor our ancestors to create a binary construction of embodiment as celebration and disembodiment as problematic. We will not dismiss and flatten the narratives of escape.,,Inheritance,Embodiment,Refusal,,
AFP,"Whether slow or fast, micro or macro, invisible or detectable, this unseen world is responsible for a deep interconnectedness across species, substances, and timescales.",,Imagination,Temporal Awareness,Interdependence,,
AFP,"if we think through our vast entanglements under the molecular semiosphere, there are no such categories. We are already alien.",,Interdependence,,,,
AFP,"These exercises produce what AiG calls “cultivating an art of combinations,” or an art of symbiosis that “recomposes the commons in an odd world.”10 Working with AiG was the moment I began to see the potential of biohacking and collective world-making and the possibility of neutralizing a deeply ingrained fear conditioned in us from birth. More importantly, I learned that only from this point of emancipatory",,Reciprocity,Experimentation,Emergent Properties,Courage,
AFP,"There is no hard separation, clear boundary, or final destination in the form of an apocalypse, and perhaps we should all stop hoping for one. There are only relations—entanglements that transform us every day.",,Relationality,Interdependence,Tension Management,,
AFP,"We ask that, in entering this essay, you do not merely distill the offerings emerging from it for your needs and desires.8",,Groundedness,Respect,Curiosity,,
AFP,"Access as accommodation cannot truly value disability culture, joy, and knowledge of ways to live otherwise, as it is fundamentally a project of normalization that neutralizes the political world-building potential of access as it is and has been practiced between humans unmediated by vast organizational bodies. The ableist world is just fine as it is and surely everybody wants in, right?",,Embodiment,Accessibility,Equity,Cultural Awareness,
AFP,"Access-centered practices include protocols because certain needs are best met with consistent solutions (like ASL interpretation), but access overall cant be reduced to protocols.43 When access practices are responsive to the nuance and mutability of needs, responsibility for access becomes collectivized into culture rather than held by experts or individuals with static roles in policy, protocol, and procedure.",,Accessibility,Shared Responsibility,Adaptability,,
AFP,"Dependency and interdependency are where we materially and affectively meet: our needs are what connect us to one another, they bring us into the vulnerabilities of both love and harm.",,Interdependence,Relationality,Empathy,,
AFP,"These artworks hold the persistence and necessary creativity of access-centered life, embodying how disability justice organizer Mia Minguss concept of access intimacy comes out of (conscious or unconscious) praxis. Mingus emphasizes the possibility for access intimacy to occur instantaneously between people without shared experience or political identity. This intimacy need not be communicated linguistically, offering an intuitive, non-identity based, affective lens onto modes of relation beyond policy.48 Access intimacy centers the affective aspects of access essential to access-centered practice.",,Accessibility,Relationality,Care,Empathy,
AFP,"Within, we learn each others protocols (How do I inject you? When do you have to go to hospital despite the risks associated with being undocumented?). We cultivate practices of care that exceed what protocols encompass (What types of touch does my body welcome? Do you enjoy metaphors when I describe images to you? Who has space to host others?). Amongst, we fuck with policy—negotiate, circumvent, and refuse it. Work it, flip it, and reverse it.",,Consent,Respect,Care,Transgression,
AFP,"The infrastructure and its limitations have predetermined the communication trajectory and centered the West as a hub through which all information moves, making the internets architecture political.",,Institutional Critique,Infrastructural Awareness,Systems Thinking,,
AFP,"To Wood, Web3 is about building systems that dont rely on trusting people, corporations, or governments to make moral choices, but that instead render evil choices impossible.”",,Infrastructural Awareness,Distributed Trust,Capture Resistance,Constraint,
AFP,"By care-based internet protocols, I mean a set of rules and guidelines that prioritize the well-being of users, their privacy, and their security over other considerations such as convenience or profit. These protocols move us away from technical jargon and encourage access through consentful participation.10",,Care,Equity,Consent,Accessibility,
AFP,"Redesigning the collective timeline cannot be accomplished by a single, solitary voice or action, nor by a small group of individuals. It requires shared responsibility and agreement from multiple communities and their branching timelines. It calls for the collaboration of multiple forces from different times, spaces, and narratives.",,Shared Responsibility,Temporal Awareness,Plurality,,
AFP,"participants were invited to create their own representations of space-time disentangled from racial capitalist patriarchy. They were encouraged to imagine and visualize a space-time that transcends oppressive systems and structures through a series of reflective questions exploring the aesthetics and sensory experiences of their alternative space-time, such as: What does it look, sound, smell, and taste like? Who is present within this space-time? How do individuals choose to act or refrain from certain actions? And most importantly, how do they feel within this space-time free from the constraints of racial capitalist patriarchy?",,Imagination,Spatial Awareness,Cultural Awareness,Empathy,
AFP,"Protocols, resolutions, and practices are meant to be replicable and will be revisited at some collectively agreed-upon time and space.",,Adaptability,Replicability,Commons Stewardship,,
AFP,"That part of the thinking of Blackness in terms of Black studies is something other than the individual biography, individual greatness, or the individual artist being an individual genius. I think were all invited into something other than individuation in this symposium with the mode of artistic practices. Part of what I hear from Nadirs cloud science is also a science of collectivity. That collectivity is a protocol for conducting science.",,Shared Responsibility,Collectivity,,,
AFP,"Each individual cloud, as you can see, its kind of chaotic. They all have their small differences, but it turns out that they actually have a lot in common. The best way to describe it is by thinking of them as one collective entity and describing their behavior collectively.",,Complex Systems Tolerance,Emergent Properties,Alignment,,
AFP,"happening in the atmosphere is instantaneous from the point of view of the deep ocean; three to five years is nothing. When were thinking in terms of this deep climate time or this deep time, again, relative to a concrete change thats happening here, the adjustment time here is invisible. Its instant.",,Temporal Awareness,Long-Term Vision,,,
AFP,"what if rather than remixing and repurposing existing protocols, we orchestrated new ones—protocols that, instead of summoning us into productive labor, compliant tool use, or compulsive consumption, cultivate a soundtrack for camaraderie or care or caprice? Can we imagine an alarm clock whose aubade, or morning song, awakens us into an otherwise world of possibility?",,Imagination,Creative Problem Solving,Design,,
AFP,"Each day, especially after I have taken photographs of the desk, I write in the notebook. How I have managed to do that all month takes me by surprise. I have never undertaken such an activity, habitually skirting through several notebooks as though incapable of regimen. I imagine this sudden focus has to do with five years of attempting to write a novel—novels, in fact, at one point, coming to forty thousand words—and failing to see the point, the throughline to connect story with imperative.",,Temporal Awareness,Repetition,Emergent Properties,,
AFP,"I was an active participant in the perpetuation of the protocols of that very culture, which I grew accustomed to over many years. These unspoken criteria applied not just to job interviews but to all kinds of curatorial closed-door meetings where we would discuss research, invite scholars to speak on certain topics, or discuss issues connected with exhibitions.",,Imitation,Institutional Critique,,,
AFP,"the particular role of the art museum as a tastemaker, gatekeeper, and arbiter of high-end culture has created the demands of a particular economic and cultural model and its intrinsic protocols that, as I will try to argue, are highly fragile and, because of their fragility, highly conservative in their financial and intellectual ambitions.",,Institutional Critique,Equity,,,
AFP,"Once we step outside the metaphorical classroom, we put protocols in motion in order to welcome everyone into these encounters: we work across platforms; we adjust language, design, content, technology; and we insert periods of reflection and time to accommodate different time spans and evolutions in thinking.",,Inclusivity,Reflexivity,Accessibility,,
AFP,"Taking the topic of protocols at its most radical form of collective intervention, we had hoped to push the standards of peer review even further with this volume.",,Adaptability,Transgression,Shared Responsibility,,
AFP,"For this book, we decided to produce two separate versions and make them available. One is a designed PDF fixed layout—a version that mirrors the printed book and foregrounds the design as a protocol-related feature—and the other is an EPUB file that does not have many of the design features, but it includes all the text of the book while still being extremely accessible to assisted reading devices.",,Accessibility,Design,,,
AFP,What weve learned from this volume is that a protocol—a form embedded in the origins of publishing itself as a medium—can be unbound from any particular monovocal convention.,,Transgression,Capture Resistance,Design,,
PR,"the modern burglar often understands the protocols of urbanism better than the insiders who are their nominal stewards. In a world that increasingly comprises protocols, power follows knowledge, not ascriptive authority.",,Transgression,Infrastructural Awareness,,,
PR,the hero of a protocolized world has mastered a general set of technological patterns that undergird not just the internal realities of organizations across the entire planet but even the interstitial spaces between them.,,Infrastructural Awareness,Institutional Critique,,,
PR,what we might call the protocol punk hero operates from within a protocolized environment where boundaries separating insides and outsides are increasingly meaningless.,,Transgression,Interdependence,,,
PR,"the protocol punk hero, unlike the bureaucratic hero or the outsider maverick, is master of both smooth and striated spaces, and able to navigate both arborescent and rhizomatic epistemic environments.",,Adaptability,Plurality,,,
PR,"It is easy to miss the myriad invisible ways in which clock time structures our lives, from train schedules and norms of scheduling meetings to begin at half-hour boundaries, to the structuring of work and leisure hours by calendars with roots in ancient religions.",,Temporal Awareness,,,,
PR,"Every successful protocol, arguably, is the result of successfully anticipating some sort of traffic jam, and presciently engineering mechanisms to manage the underlying tensions.",,Tension Management,Anticipation,Design,,
PR,"Unlike the epic heroes of antiquity, or even cyberpunk heroes, protocol punk heroes are rarely lone wolves. Instead, they often exhibit remarkable social skills. Their uncanny protocol-whispering abilities often rest as much on social engineering skills as on technical engineering or architecture skills.",,Relationality,Cultural Awareness,Infrastructural Awareness,,
PR,"major component of the work of protocol whisperers is to manage constantly shifting tensions at an ecosystem level, rather than within a single organization",,Tension Management,Plurality,Systems Thinking,Complex Systems Tolerance,
PR,trusted relationships with allies on many sides of many active arguments,,Relationality,Plurality,Tension Management,,
PR,a strong sense of the collective memory of an evolving commons.,,Commons Stewardship,Memory,Inheritance,,
PR,"protocol design and architecture conversations, a truly remarkable amount of conscious and active attention is devoted to things like selection pressures, incentives, red-teaming, and modeling of emergent equilibria. Unlike the engineer in a private corporation, or the bureaucrat in a hospital or a government agency, the protocol whisperer must simultaneously think like an Organization Man, a central banker, a hacker, a market maker, and a military strategist",,Incentive Alignment,Tension Management,Complex Systems Tolerance,,
PR,Efforts to create the right engineered arguments are the exceptions. Playing to win is the norm. Playing to continue the game is rare.,,Long-Term Vision,Tension Management,,,
PR,The pluralist infinite-game idea of a protocol as an engineered argument can be contrasted with a complementary “playing to win” definition of an API,,Plurality,Long-Term Vision,Tension Management,,
PR,"There are also non-human single points of failure (SPOFs). In a thoughtful critique, Moxie Marlinspike, co-creator of the Signal messaging protocol, pointed out the many SPOF vulnerabilities in the Ethereum ecosystem.14 In the worst cases, they can lurk unseen until they cause the unexpected fatal collapse of a valued protocol. In well-managed protocols, SPOFs are broadly recognized, consciously managed, gradually mitigated, progressively moved to less and less critical loci, and in the best cases, eliminated altogether.",,Resilience,Decentralized Governance,Shared Responsibility,,
PR,"When it comes to protocols, sticking to any kind of ideological hardline position cedes agency to those willing to participate in the engineered arguments. There is no winning move, and the only way to continue to play is to recognize that youre not in traffic, you are traffic.",,Tension Management,Adaptability,,,
PR,"is easier to reorganize the furniture in ones house than to change the buildings structure or expand the site on which its built. Longer-term interventions in the built environment that adapt the base layers to new conditions are still worthwhile—they are as critical as ever—but, for individuals working at smaller spatial and temporal scales, the “software” (and the protocols that mediate it) may be a more fruitful domain of intervention than the hardware",,Long-Term Vision,Adaptability,Systems Thinking,,
PR,"Today we build fulfillment centers, freeways, container ships, and supertall skyscrapers, all accidental monuments to the various protocols that utilize them, and equally impressive (but usually more esoteric, largely appreciated by the “protocol literate”). Unlike cathedrals and pyramids, the charismatic qualities of protocol monuments are likely to be incidental, a side effect of their primary purpose.",,Infrastructural Awareness,Systems Thinking,,,
PR,"As our world becomes increasingly automated, networked, and sensor-filled, our levels of awareness regarding the invisible interfaces, processes, and protocols through which computers comprehend our world will translate into a new awareness of physical space. Our digital literacy will enable us to retain a sense of effective agency as we design and navigate what is a new category of virtual worlds operating (through the assistance of automation) within the medium of physical space.",,Spatial Awareness,Agency,,,
PR,"To deal with limited memory and processing powers, we get used to things going well. The result: our brains only notice when things go wrong—when there is an event. We do not notice the non-events (i.e., the status quo, the day-to-day). But events and non-events are both consequences of human actions. No actions, no events. Action performance varies, putting the dynamic in dynamic non-event.90 Safety is a dynamic non-event. Talking about safety (and health) is difficult because it is a sustained absence of events, not an event itself.",,Infrastructural Awareness,,,,
PR,"health protocols dont have fast feedback loops, so adoption is challenging. From my experience, we operate more proactively when the risk is obvious, probable, and has the possibility of immediate harm. Safety issues trigger acute stress responses that encourage action. Anything beyond obvious risk requires empathy for a “future version of oneself” that is difficult to nurture. This can change via instrumentation, such as calorie, nutrient, movement trackers, and continuous glucose, heart rate, and sleep monitors.",,Anticipation,Systems Thinking,,,
PR,"Following protocol involves several actions: perceive another person following protocol or receive instructions on how to follow the protocol; store the protocol in memory; and replicate the protocol. Errors can occur during any one of these actions. The primary way that protocols mutate is via such unintentional errors. A protocol is a type of meme: like genes, protocols reproduce using humans as hosts.",,Imitation,Memory,Replicability,,
PR,The other two ways that protocols mutate is through tinkering and design.,,Adaptability,Iterative Development,,,
PR,"The three sources of protocol mutation, characterized by their pace and strength, are design, tinkering, and memetic error. They fall on a spectrum of pace and strength of mutation",,Iterative Development,Temporal Awareness,Replicability,,
PR,"Protocol systems are always two things at once—individuals and a group. A bistable perception—individual versus system—is actually important in examining them. If we only think about the aggregated whole, we may overlook harms suffered by individuals within the system or problematic power dynamics masked by the continued functioning of the system. On the other hand, if we only focus on individuals within the system, we may miss emergent risks and benefits coming from the system as a whole.",,Systems Thinking,Autonomy,Collectivity,Commons Stewardship,
PR,"If there is a bad fit between your internal self and your role, you can suffer from a sense of compelled inauthenticity, or dysphoria, while if there is a good fit, and you authentically align with your role, you can thrive.",,Authenticity,Incentive Alignment,Role Awareness,,
PR,"If Pip has awareness of a protocol system, they are “seeing the water” that they swim in—the culture and world (protocol system) that surrounds them, shapes them, and constrains them. When aware, Pip sees the ocean they swim in, knows that other oceans and non-oceans exist, knows how they got into their ocean, and understands that the ocean currents affect their movements.",,Spatial Awareness,Systems Thinking,,,
PR,"Pip has awareness with regard to a particular protocol system if they know: that they are entering, participating in, or exiting it; that they play a certain role within it; that there are alternatives to joining or participating in this particular protocol system; whether they entered the system by choice or under the influence or control of others; and that the protocol is influencing their thoughts and actions.
",,Agency,Autonomy,Authenticity,Role Awareness,
PR,Insight is about the depth of knowledge and understanding Pip has about a protocol system.156 Insight allows a person to make a meaningful choice about their participation and role within a protocol system.,,Systems Thinking,Agency,Role Awareness,Situational Awareness,
PR,"As we become more networked, opportunities for alignment and attunement technologies will become increasingly apparent. They present a possible path to support the success of swarms and other online formations while addressing platform business needs.",,Networked Intelligence,Collaboration,Alignment,,
PR,"A nascent sensibility defined here, orientation can be understood as a form of situational awareness that arranges knowledge in a selective and associative manner aligned with a particular purpose. Orientation enables navigation based on partial cues, feelings, and hints within an environment, without presuming complete situational awareness.",,Situational Awareness,Alignment,,,
PR,"Fixed, hard points across time that let us make the world more predictable. We need these hard points because it is impossible to coordinate at scale without them. Money doesnt work unless there is a degree of certainty it will still be valuable in the future. Trade is very risky if there isnt confidence that parties will follow their commitments.",,Temporal Awareness,Anticipation,Long-Term Vision,Incentive Alignment,Constraint
PR,"Good rituals can liberate the individual—in the case of the artist—by helping them coordinate their actions towards their creative goals. Protocols are not just about constraints that are necessarily enforced at the cost of creativity and liberty; they can generate creativity and liberty, if well-designed and implemented.",,Repetition,Agency,Freedom,Constraint,Design
PR,"the art of protocol subversion looks more commonly like tai chi, where participants follow protocol, but in a way that better suits their needs. As Galloway proposed, “it is through protocol that one must guide ones efforts, not against it.”",,Subversion,,,,
PR,"Instead of resisting protocols, we ought to bring a greater awareness to their overall influence, so that we can make better decisions about which protocols we wish to be a part of and how we might live peaceably under their reign.",,Agency,Infrastructural Awareness,,,
PR,Any sufficiently healthy world will spawn activity in peripheral forums where the protocol is discussed. It will spread and animate spaces outside itself. The life of the world is not only in the world. Looking for these spaces is an important and often overlooked world-assessment criteria.,,Institutional Critique,,,,
PR,"Protocol makers, know this: your protocol will die. It may become so inflexible that it must be discarded —“if the constitution is too rigid, it becomes necessary to kill the king”412—or the conditions around it may change so much as to become unrecognizable.",,Adaptability,Finitude,,,
PR,to your protocol and whether they would withstand an existential question,,Finitude,,,,
PR,"In The Timeless Way of Building, Christopher Alexander argues that patterns in architecture and the urban organization have a “quality without a name” that makes a house, a street, a town more or less “alive.” We perceive a place as alive when it is structured or organized to allow congruence within us—this congruence is the capacity to align us with our biological reality and natural desires, allowing those forces to move freely.",,Authenticity,Alignment,,,
PR,"Flourishing requires the cultivation of character, which almost always requires that we examine the systems to which we are beholden and that we break with our narratives and frames. This requires us to take responsibility for our own development—a mindset at odds with mindlessly following a protocol. Like bad habits (which are, after all, effective habits), effective protocols make it easy for people to continue following protocol.",,Systems Thinking,Responsibility,Accessibility,,
PR,"order to pursue flourishing, one must take responsibility for ones actions and life—if participants are disposed by the protocol to reject responsibility, and if the protocol forms a significant part of their life (say, as a social, cultural, or religious protocol), then flourishing is hindered",,Responsibility,,,,
PR,"In some situations, all that is needed for the emergence of a good protocol is the recognition and diffusion of good solutions that are also easy to imitate.",,Imitation,Replicability,Design,,
PR,"Good protocols learn, grow, and mature in ways that catalyze thoughtful stewardship and sustained generativity. Bad protocols on the other hand, if they avoid early mortality, tend to become increasingly neglected over time, leading to extended periods of sterility and stagnation, and succumbing to capture and corruption.",,Adaptability,Finitude,Reflexivity,Capture Resistance,
PR,"Good protocols seem to strike a robust balance between ensuring order at some loci, and inducing serendipitous creative chaos at adjacent loci. As a result, within their sphere of influence, they create conditions of exceptional serendipity, or at least significantly reduced malevolence,",,Tension Management,Emergent Properties,Balance,Design,
PR,"good protocols seem to thread the needle between too much and too little automation, and too much and too little room for discretionary governance decisions, stabilizing at the right level for their circumstances. They are sufficiently stewardable.",,Balance,Commons Stewardship,,,
PR,"consideration of trade-offs, costs and benefits, and thorough evaluation of designs, leading to good engineering outcomes. They are neither so underconstrained that arbitrary tastes can drive outcomes, nor so overconstrained that there are no good solutions to problems at all. Instead, they encourage a search for opinionated but principled solutions to core problems",,Balance,Tension Management,Constraint,,
PR,"areas in the study of protocols, and the one that comes closest to rising to the level of a science. Our ability to design and build better protocols is strongly driven by the quality of our understanding of fundamental limits, and cultures of tastefully opinionated leadership for navigating them",,Systems Thinking,Constraint,Design,,
PR,"A feature common to protocols and adjacent categories such as APIs, grammars, or rules, is their relationship to literacy. Every protocol, arguably, is by definition also a literacy that takes effort to acquire and practice. The value of a protocol is a strong function of the ease with which participants can acquire literacy and fluency in the behaviors it codifies.",,Accessibility,Situational Awareness,,,
PR,"An effective culture of literacy around a protocol ensures that all participants have the skills necessary to safely and productively participate in it. Mass or retail participants must have sufficient literacy to use protocols safely. For example, pedestrians and drivers must understand and respond to traffic signals. Expert participants and stewards must have enough literacy to govern the protocol and evolve it in the face of changing circumstances and evolving domain knowledge. Creating and sustaining a broad-based culture of literacy around a protocol is a non-trivial task, but is often underestimated, and either treated as a promotional task, to be handled alongside marketing or public relations, or a matter of foolproof user-experience design.",,Situational Awareness,Accessibility,Reflexivity,Shared Responsibility,
PR,"Good protocols are not just sufficiently learnable, they are sufficiently hackable to do without formal educational institutions, especially early in their histories.",,Accessibility,Adaptability,,,
PR,"This ludic quality is arguably essential for meaning-making, and is conceivably the spiritual essence of protocols.",,Play,,,,
PR,"Good protocols, arguably, are sufficiently ludic to serve as engines of meaning-making beyond their nominal functions, while also fulfilling their nominal functions.",,Play,Emergent Properties,,,
PR,"surprisingly many protocols manage to survive early mortality threats and achieve equilibrium states where they are sufficiently defensible to function anyway, even if in significantly diseased conditions. Surprisingly small groups of well-positioned stewards can keep established and critical protocols going long past the point where critics predict they should have succumbed to their varied apparently fatal vulnerabilities.",,Resilience,Commons Stewardship,,,
PR,"While protocols can be hard to kill, and sufficiently defensible against their threat environments, they are neither impossible to kill, nor naturally immortal. They are sufficiently mortal that they do not persist indefinitely, choking the domains they organize. The League of Nations, which preceded the United Nations, is an example of a geopolitical protocol that died after it failed to fulfill its functions in the 1930s.",,Resilience,Finitude,Capture Resistance,,
PR,"Standards-making, it turns out, is high-leverage design, ripe with the ability to change the technological playing field in ways that no individual firm can on its own. Its like finding the control room of our modern world.",,Infrastructural Awareness,Design,,,
PR,best way to learn how to work with standards is by studying how theyve evolved over time.,,Historical Awareness,,,,
PR,true standards movement must be rooted in the fundamentals. The idealism cant outweigh the pragmatism,,Pragmatism,,,,
PR,"My professional focus has been, as long as I can remember, about designing for comprehension. That is, understanding whats going on in ones surroundings, how things in the world work, and effective ways of thinking and talking about it.",,Accessibility,Situational Awareness,,,
PR,"need to get more people model-literate, which means an order-of-magnitude (or two) increase in the efficiency of uptake. We need to figure out a way to bulk-load models into peoples heads, simultaneously bringing the cost down and the salience up so it becomes something people perceive to be worth doing",,Accessibility,Situational Awareness,,,
PR,Instead we need to adapt and extend the existing protocols to the internet and its engaged communities. A first step is acknowledging the deep bench of untapped talent.,,Adaptability,,,,
PR,"major lesson of cryptocurrency protocols is that when you design something with a trust-minimized architecture, people approach it with a mercenary perspective",,Relationality,Reflexivity,,,
PR,"Exploration involves trying out new options that may lead to better outcomes. Exploitation involves choosing the best-available option based on exploration. Finding the optimal balance between these two strategies is a crucial challenge in many decision-making situations, where the goal is to maximize long-term benefits.",,Experimentation,Balance,Incentive Alignment,Long-Term Vision,
PR,Protocols are designed in reaction to some troubling condition rather than being conceived of independently from their environment. This argument is more obvious for some protocols than for others.,,Pragmatism,Tension Management,,,
PR,"stating that protocols are conservative is not a political assertion. This statement does not challenge the value of preservation and conservation during periods of undeniable turmoil. The intention of highlighting the backward-oriented nature of protocols is merely to underscore—as some of the researchers did—that these tools often possess their own agency. They assert their temporal logic upon anything we endeavor with them, especially where there is no conscious reflection on their use.",,Inheritance,Historical Awareness,Temporal Awareness,Reflexivity,
PR,"value can oscillate quickly into costs and at such a magnitude that even precious systems must have a stop. This poses the question of how to shut the thing down, and who should make the decision to do so. While the options that have predominated up to now involve highly centralized control of the killswitch protocol, this form of engineered system death is also the least interesting from a systems engineering perspective because it boils down to designing a killswitch that a concentrated authority can exercise",,Decentralized Governance,,,,
PR,"Whereas the Linux kernel doesnt produce anything for users until distros add their features, running Ethereum software produces a usable artifact right away.",,Accessibility,Pragmatism,,,
PR,"The protocol system conveys the people and their relationship to data, spaces, and other people, describing it as a “role in a box” with different preset levels of access, permissions, and incentives to represent and augment the organization.",,Role Awareness,Incentive Alignment,Precision,,
PR,"The interoperability allows for a seamless transfer of users and data between apps and cities, while the composability comes into play when any aspect of the protocol becomes shared infrastructure that can be combined together or taken apart.",,Interoperability,Infrastructural Awareness,,,
PR,"“Copying was such a taboo back then, less so in the software world, especially in open-source, but outside of those bubbles it wasnt considered acceptable. People were still romanticising the idea of the lone genius or decision-maker,” recounts Das. “It wasnt until we were forced to work together during the collapse that folks realized ideas were meant to be shared and modified; that it was ok to edit and improve upon them.",,Replicability,Collaboration,Adaptability,,
PR,"Without a critical capacity, it becomes difficult to keep the checks and balances averaging. Furthermore, the whole system relies on trust. Without it, the IOU-based system fails as people become unsure if the value theyve given to others will be returned when theyre in need.",,Institutional Critique,Trust,,,
PR,"The study showed there were some conditions to the benefits of diversity, however, which only began to take effect when at least four functional groups or different plant species were present and increased as the number of plants in each species increased. When this minimum diversity threshold was met, researchers saw it triggered a change in the behavior of the fungal network that supported the nutrient and water uptake of the plants towards mutualism, rather than competition or parasitism seen in less diverse and dense plantings.",,Plurality,,,,
PR,"The je ne sais quoi of protocols, after all, is an ineffable quality of openness,",,Openness,,,,
PR,"Beyond hardening our activities against capture or co-option by narrower agendas, and doing our best to articulate, in honest but unapologetic ways, the opinionated tastes we are bringing to our curation and catalysis efforts, we aim to keep our role small and limited, and indeed, shrink it over time.",,Role Awareness,Capture Resistance,,,
1 Source Text Virtue_1 Virtue_2 Virtue_3 Virtue_4 Virtue_5
2 AFP You have a past, but you remember it with more detail than you should. And these details cannot be stopped by time. They have become a tradition. Memory Tradition Historical Awareness
3 AFP You have no past. Either you have forgotten it or it was erased from you. You are piecing together the rest of the story from the information of others and you have placed yourself inside. This is your protocol. Temporal Awareness Collectivity
4 AFP Identifying and working against these protocols necessitates civil disobedience against the limitations of institutionalized knowledge and biopolitical power that seek to govern and interpellate our bodies, our health, gender, sexuality, and (re)production. Institutional Critique Embodiment Resistance Refusal Subversion
5 AFP Investigating protocols as such allows us to contribute to the creation of new protocols that are inclusive and equitable. Equity Inclusivity Institutional Critique Design
6 AFP We were interested in how this process may contribute to long-term political organizing, which requires ongoing cycles of action, reflection, and adjustments to the dynamics and protocols of shared struggle. Collaboration Resistance Adaptability Agency Collectivity
7 AFP Ultra-red has no single organized political affiliation. The collective’s members are engaged with anti-racist movements in Britain, migrant struggles in Germany, community-based education in London, New York City, and Los Angeles, and struggles for housing and just community development in East Los Angeles. Decentralized Governance Plurality Capture Resistance
8 AFP At the passing of four and a half minutes, the workshop organizer announced, “Time.” Then we asked, “What did you hear?” We noticed that this practice increased concerns with and discussion of the contexts within which people gathered to address the crisis. Temporal Awareness Tension Management
9 AFP Who speaks? Whose voice is amplified? What do we speak of and to whom? Who listens, and to what end do they listen? Who has a place at the table? Who determines who has a place at the table? And on whose behalf do those seated at the table speak? Equity Curiosity Inclusivity
10 AFP The failure to address this hegemony perpetuates divides between those who circulate within the art world and those who do not. The only acknowledgment of this divide comes in the form of “audience development” initiatives based on liberal notions of inclusion. Inclusivity Equity
11 AFP When effective, constitutive protocols place experience in dialogue with principles and regulations. This is what I consider the most powerful use of protocols, which is when disciplinary and constitutive protocols form a contradiction or dialectic. Tension Management Balance
12 AFP This led us to borrow the concept of “desire lines”—trails or paths carved out over time, usually emerging as shortcuts between destinations. In built landscapes, they break protocol with prescribed routes. In natural environments, they often reveal animal migrations, paths used across generations. Desire lines are always a record of behavior—lines of movement suggested by previous path-takers and followed by future path-takers. Apparently, we cannot all be trailblazers. We love to follow in each others’ footsteps. Resistance Memory Iterative Development Imitation Agency
13 AFP Breaking protocol with accepted modes of behavior in public space can feel dangerous—especially given current and historical restrictions on sexual desire and, in particular, same-sex desire. Resistance Transgression Refusal Subversion
14 AFP Freedom and desire mean different things to different people at different times. So one of the central tenets is the liberating notion that we don’t all have to agree. Of course, with a proposal Autonomy Plurality Agency Freedom
15 AFP If I had been outside of my homeland, I then would have acknowledged whosoever’s territory I was visiting, as a political affirmation of their sovereignty and self-determination and a practice of respect. Respect Cultural Awareness Spatial Awareness
16 AFP Maria’s smile, though, was not protocol. There is no rule that Anishinaabe begin meetings, visits, or events with a big smile; if anything, our elders tend to show less emotion in facial expressions in comparison to Euro-Canadian or American culture. I experienced her smile as entirely Anishinaabe because it was contradictory to the colonial form of our encounter and the formality of artist talks and academic conversations. Transgression Respect Relationality Cultural Awareness Empathy
17 AFP we are not the first Indigenous women or artists to sit down and have a conversation about protocols. These conversations happen all the time around kitchen tables, on sidewalks, in galleries and studios, and in the bush. Memory Inheritance
18 AFP I didn’t set out to break protocol; my intention was to expand our ideas around protocol or to place protocols back within the larger network of Anishinaabe ethics. If the intent of protocols is to show respect and create spaces where we could be our best selves, what happens when there is such rigidity that the protocol erodes our foundational values of consent, diversity, self-determination, and non-interference? What happens when protocol backfires and causes harm? Transgression Respect
19 AFP How can we break the cage of protocol and embody a deeper understanding of Anishinaabe ethics and values? Transgression Inheritance Cultural Awareness Authenticity
20 AFP Anishinaabe life, to a great degree, is care work. Our foundational teachings, the Seven Ancestor teachings, in my area called the Kookum Dibajimowin, are not a set of laws or commandments, or protocols that we have to follow. Rather, they are a complex set of practices that, when embodied, both individually and in relation to other living things, create a world in which consent, accountability, problem solving, and kindness are embedded. Care Complex Systems Tolerance Consent Accountability Creative Problem Solving
21 AFP remember very early on in my career being out on the land with an Elder hunting geese. We shot one, and he had forgotten his tobacco. I remember wondering what was going to happen, because it is our practice to show gratitude through reciprocity, and normally this is done through an offering of tobacco. The Elder who I was with left a tiny bit of his baloney sandwich. When I asked him if this was going to be OK with the geese, he said “Of course,” because the gesture was thoughtful and would be seen by the geese as an expression of deep respect. Reciprocity Adaptability Respect
22 AFP Avoid using protocol to demonstrate how much of your culture you’ve recovered and instead use our practices as a point of connection and to create belonging and nurture relationships. Collectivity Relationality Authenticity
23 AFP It needs to go back to family and community, figuring out who you are, where you come from, what your family gifts, what your gifts are that you have to contribute, ‘cause they are not the same, and they are not always what we want them to be either. Inclusivity Collectivity Inheritance Authenticity
24 AFP An essential element of my practice is what I call spiritual fieldwork, or the process of developing relationships with the human and nonhuman entities of a particular place or field in tandem with gathering information. Relationality Curiosity Spatial Awareness
25 AFP I think time is an Indigenous currency, one that we especially lack in our capitalist society. Listening also requires that you be present, allowing what you hear to shape the process at every step. Temporal Awareness Adaptability Curiosity
26 AFP When trust has been built, it is important to be aware of one’s limitations, not to overstep, and not to overcommit. Trust is maintained by keeping promises, contracts, and boundaries. Humility Responsibility Accountability Reciprocity Trust
27 AFP reciprocity takes shape in responding to calls for mutual aid at any level, and by doing so it supports collectivities through personal and professional interactions. Reciprocity Collectivity
28 AFP In all Indigenous cultures, there is a natural law, a model of the world in which energies fluctuate between different levels. Associated with this vision of perpetual energy movement is the protocol of pagamento, or payback, which is the need to act based on the principle of reciprocity, to always give something in exchange for what is obtained, be it something material or service of any kind. Reciprocity
29 AFP The protocols I have shared here are not set in stone—they shift as I learn and grow, as society grows, and as the circumstances of our planet change rapidly. Adaptability Iterative Development Long-Term Vision
30 AFP Let us collectively recommit to center and sustain life through our diverse practices. Let us remember that we are all related and that our futures are intertwined. Plurality Interdependence Sustainable Practices Collectivity Relationality
31 AFP Stay low to the ground. Stay nimble and mobile (shifting between places, scales, times, elements). Keep it trans-local. Attend to the lower parts of the body. Think with and of pregnancy, with and of forms of degraded trans*ition, transformation, metamorphosis. Use your nose.36 Follow the shit. Follow the power. Follow the money.37 Embodiment Adaptability Groundedness Spatial Awareness Institutional Critique
32 AFP I argue that this is the kind of approach we need as we think through the nexus of ecology, climate, and racism. This grounding approach does not take refuge in ideal theory (climate ethics) or abstract calculations of emissions (some climate justice) but rather gets down in the muck, in the matter of life and death, to think and be in ways that (to borrow from Wynter) are “down to earth.” Embodiment Groundedness
33 AFP The behaviors that we think liberate us are based on the disappointments of the past and keep us constrained within the confines of colonial imaginations dispossessing us of our purpose and, ultimately, our freedom. Institutional Critique Agency Freedom
34 AFP To choose the self without fixing, changing, guilting, or blaming, we also have to choose rather than deny, escape, or wish away the histories that made us. We have to embark on a new protocol. Authenticity Historical Awareness Inheritance Design
35 AFP Escapism is one of the various epigenetic expressions I carry as a descendant of enslaved Indigenous peoples. I have the ability to not be here now as a way of enduring the present and making my way toward the future. Afrofuturist narratives like the folktales of High John and Brerer Rabbit were an already-always part of me when I needed hope—a cartography towards freedom letting me know that other ways of being are possible and that I am not stuck here. Inheritance Agency Refusal Imagination
36 AFP It does not honor our ancestors to create a binary construction of embodiment as celebration and disembodiment as problematic. We will not dismiss and flatten the narratives of escape. Inheritance Embodiment Refusal
37 AFP Whether slow or fast, micro or macro, invisible or detectable, this unseen world is responsible for a deep interconnectedness across species, substances, and timescales. Imagination Temporal Awareness Interdependence
38 AFP if we think through our vast entanglements under the molecular semiosphere, there are no such categories. We are already alien. Interdependence
39 AFP These exercises produce what AiG calls “cultivating an art of combinations,” or an art of symbiosis that “recomposes the commons in an odd world.”10 Working with AiG was the moment I began to see the potential of biohacking and collective world-making and the possibility of neutralizing a deeply ingrained fear conditioned in us from birth. More importantly, I learned that only from this point of emancipatory Reciprocity Experimentation Emergent Properties Courage
40 AFP There is no hard separation, clear boundary, or final destination in the form of an apocalypse, and perhaps we should all stop hoping for one. There are only relations—entanglements that transform us every day. Relationality Interdependence Tension Management
41 AFP We ask that, in entering this essay, you do not merely distill the offerings emerging from it for your needs and desires.8 Groundedness Respect Curiosity
42 AFP Access as accommodation cannot truly value disability culture, joy, and knowledge of ways to live otherwise, as it is fundamentally a project of normalization that neutralizes the political world-building potential of access as it is and has been practiced between humans unmediated by vast organizational bodies. The ableist world is just fine as it is and surely everybody wants in, right? Embodiment Accessibility Equity Cultural Awareness
43 AFP Access-centered practices include protocols because certain needs are best met with consistent solutions (like ASL interpretation), but access overall can’t be reduced to protocols.43 When access practices are responsive to the nuance and mutability of needs, responsibility for access becomes collectivized into culture rather than held by experts or individuals with static roles in policy, protocol, and procedure. Accessibility Shared Responsibility Adaptability
44 AFP Dependency and interdependency are where we materially and affectively meet: our needs are what connect us to one another, they bring us into the vulnerabilities of both love and harm. Interdependence Relationality Empathy
45 AFP These artworks hold the persistence and necessary creativity of access-centered life, embodying how disability justice organizer Mia Mingus’s concept of access intimacy comes out of (conscious or unconscious) praxis. Mingus emphasizes the possibility for access intimacy to occur instantaneously between people without shared experience or political identity. This intimacy need not be communicated linguistically, offering an intuitive, non-identity based, affective lens onto modes of relation beyond policy.48 Access intimacy centers the affective aspects of access essential to access-centered practice. Accessibility Relationality Care Empathy
46 AFP Within, we learn each other’s protocols (How do I inject you? When do you have to go to hospital despite the risks associated with being undocumented?). We cultivate practices of care that exceed what protocols encompass (What types of touch does my body welcome? Do you enjoy metaphors when I describe images to you? Who has space to host others?). Amongst, we fuck with policy—negotiate, circumvent, and refuse it. Work it, flip it, and reverse it. Consent Respect Care Transgression
47 AFP The infrastructure and its limitations have predetermined the communication trajectory and centered the West as a hub through which all information moves, making the internet’s architecture political. Institutional Critique Infrastructural Awareness Systems Thinking
48 AFP To Wood, Web3 is about building systems that don’t rely on trusting people, corporations, or governments to make moral choices, but that instead render evil choices impossible.” Infrastructural Awareness Distributed Trust Capture Resistance Constraint
49 AFP By care-based internet protocols, I mean a set of rules and guidelines that prioritize the well-being of users, their privacy, and their security over other considerations such as convenience or profit. These protocols move us away from technical jargon and encourage access through consentful participation.10 Care Equity Consent Accessibility
50 AFP Redesigning the collective timeline cannot be accomplished by a single, solitary voice or action, nor by a small group of individuals. It requires shared responsibility and agreement from multiple communities and their branching timelines. It calls for the collaboration of multiple forces from different times, spaces, and narratives. Shared Responsibility Temporal Awareness Plurality
51 AFP participants were invited to create their own representations of space-time disentangled from racial capitalist patriarchy. They were encouraged to imagine and visualize a space-time that transcends oppressive systems and structures through a series of reflective questions exploring the aesthetics and sensory experiences of their alternative space-time, such as: What does it look, sound, smell, and taste like? Who is present within this space-time? How do individuals choose to act or refrain from certain actions? And most importantly, how do they feel within this space-time free from the constraints of racial capitalist patriarchy? Imagination Spatial Awareness Cultural Awareness Empathy
52 AFP Protocols, resolutions, and practices are meant to be replicable and will be revisited at some collectively agreed-upon time and space. Adaptability Replicability Commons Stewardship
53 AFP That part of the thinking of Blackness in terms of Black studies is something other than the individual biography, individual greatness, or the individual artist being an individual genius. I think we’re all invited into something other than individuation in this symposium with the mode of artistic practices. Part of what I hear from Nadir’s cloud science is also a science of collectivity. That collectivity is a protocol for conducting science. Shared Responsibility Collectivity
54 AFP Each individual cloud, as you can see, it’s kind of chaotic. They all have their small differences, but it turns out that they actually have a lot in common. The best way to describe it is by thinking of them as one collective entity and describing their behavior collectively. Complex Systems Tolerance Emergent Properties Alignment
55 AFP happening in the atmosphere is instantaneous from the point of view of the deep ocean; three to five years is nothing. When we’re thinking in terms of this deep climate time or this deep time, again, relative to a concrete change that’s happening here, the adjustment time here is invisible. It’s instant. Temporal Awareness Long-Term Vision
56 AFP what if rather than remixing and repurposing existing protocols, we orchestrated new ones—protocols that, instead of summoning us into productive labor, compliant tool use, or compulsive consumption, cultivate a soundtrack for camaraderie or care or caprice? Can we imagine an alarm clock whose aubade, or morning song, awakens us into an otherwise world of possibility? Imagination Creative Problem Solving Design
57 AFP Each day, especially after I have taken photographs of the desk, I write in the notebook. How I have managed to do that all month takes me by surprise. I have never undertaken such an activity, habitually skirting through several notebooks as though incapable of regimen. I imagine this sudden focus has to do with five years of attempting to write a novel—novels, in fact, at one point, coming to forty thousand words—and failing to see the point, the throughline to connect story with imperative. Temporal Awareness Repetition Emergent Properties
58 AFP I was an active participant in the perpetuation of the protocols of that very culture, which I grew accustomed to over many years. These unspoken criteria applied not just to job interviews but to all kinds of curatorial closed-door meetings where we would discuss research, invite scholars to speak on certain topics, or discuss issues connected with exhibitions. Imitation Institutional Critique
59 AFP the particular role of the art museum as a tastemaker, gatekeeper, and arbiter of high-end culture has created the demands of a particular economic and cultural model and its intrinsic protocols that, as I will try to argue, are highly fragile and, because of their fragility, highly conservative in their financial and intellectual ambitions. Institutional Critique Equity
60 AFP Once we step outside the metaphorical classroom, we put protocols in motion in order to welcome everyone into these encounters: we work across platforms; we adjust language, design, content, technology; and we insert periods of reflection and time to accommodate different time spans and evolutions in thinking. Inclusivity Reflexivity Accessibility
61 AFP Taking the topic of protocols at its most radical form of collective intervention, we had hoped to push the standards of peer review even further with this volume. Adaptability Transgression Shared Responsibility
62 AFP For this book, we decided to produce two separate versions and make them available. One is a designed PDF fixed layout—a version that mirrors the printed book and foregrounds the design as a protocol-related feature—and the other is an EPUB file that does not have many of the design features, but it includes all the text of the book while still being extremely accessible to assisted reading devices. Accessibility Design
63 AFP What we’ve learned from this volume is that a protocol—a form embedded in the origins of publishing itself as a medium—can be unbound from any particular monovocal convention. Transgression Capture Resistance Design
64 PR the modern burglar often understands the protocols of urbanism better than the insiders who are their nominal stewards. In a world that increasingly comprises protocols, power follows knowledge, not ascriptive authority. Transgression Infrastructural Awareness
65 PR the hero of a protocolized world has mastered a general set of technological patterns that undergird not just the internal realities of organizations across the entire planet but even the interstitial spaces between them. Infrastructural Awareness Institutional Critique
66 PR what we might call the protocol punk hero operates from within a protocolized environment where boundaries separating insides and outsides are increasingly meaningless. Transgression Interdependence
67 PR the protocol punk hero, unlike the bureaucratic hero or the outsider maverick, is master of both smooth and striated spaces, and able to navigate both arborescent and rhizomatic epistemic environments. Adaptability Plurality
68 PR It is easy to miss the myriad invisible ways in which clock time structures our lives, from train schedules and norms of scheduling meetings to begin at half-hour boundaries, to the structuring of work and leisure hours by calendars with roots in ancient religions. Temporal Awareness
69 PR Every successful protocol, arguably, is the result of successfully anticipating some sort of traffic jam, and presciently engineering mechanisms to manage the underlying tensions. Tension Management Anticipation Design
70 PR Unlike the epic heroes of antiquity, or even cyberpunk heroes, protocol punk heroes are rarely lone wolves. Instead, they often exhibit remarkable social skills. Their uncanny protocol-whispering abilities often rest as much on social engineering skills as on technical engineering or architecture skills. Relationality Cultural Awareness Infrastructural Awareness
71 PR major component of the work of protocol whisperers is to manage constantly shifting tensions at an ecosystem level, rather than within a single organization Tension Management Plurality Systems Thinking Complex Systems Tolerance
72 PR trusted relationships with allies on many sides of many active arguments Relationality Plurality Tension Management
73 PR a strong sense of the collective memory of an evolving commons. Commons Stewardship Memory Inheritance
74 PR protocol design and architecture conversations, a truly remarkable amount of conscious and active attention is devoted to things like selection pressures, incentives, red-teaming, and modeling of emergent equilibria. Unlike the engineer in a private corporation, or the bureaucrat in a hospital or a government agency, the protocol whisperer must simultaneously think like an Organization Man, a central banker, a hacker, a market maker, and a military strategist Incentive Alignment Tension Management Complex Systems Tolerance
75 PR Efforts to create the right engineered arguments are the exceptions. Playing to win is the norm. Playing to continue the game is rare. Long-Term Vision Tension Management
76 PR The pluralist infinite-game idea of a protocol as an engineered argument can be contrasted with a complementary “playing to win” definition of an API Plurality Long-Term Vision Tension Management
77 PR There are also non-human single points of failure (SPOFs). In a thoughtful critique, Moxie Marlinspike, co-creator of the Signal messaging protocol, pointed out the many SPOF vulnerabilities in the Ethereum ecosystem.14 In the worst cases, they can lurk unseen until they cause the unexpected fatal collapse of a valued protocol. In well-managed protocols, SPOFs are broadly recognized, consciously managed, gradually mitigated, progressively moved to less and less critical loci, and in the best cases, eliminated altogether. Resilience Decentralized Governance Shared Responsibility
78 PR When it comes to protocols, sticking to any kind of ideological hardline position cedes agency to those willing to participate in the engineered arguments. There is no winning move, and the only way to continue to play is to recognize that you’re not in traffic, you are traffic. Tension Management Adaptability
79 PR is easier to reorganize the furniture in one’s house than to change the building’s structure or expand the site on which it’s built. Longer-term interventions in the built environment that adapt the base layers to new conditions are still worthwhile—they are as critical as ever—but, for individuals working at smaller spatial and temporal scales, the “software” (and the protocols that mediate it) may be a more fruitful domain of intervention than the hardware Long-Term Vision Adaptability Systems Thinking
80 PR Today we build fulfillment centers, freeways, container ships, and supertall skyscrapers, all accidental monuments to the various protocols that utilize them, and equally impressive (but usually more esoteric, largely appreciated by the “protocol literate”). Unlike cathedrals and pyramids, the charismatic qualities of protocol monuments are likely to be incidental, a side effect of their primary purpose. Infrastructural Awareness Systems Thinking
81 PR As our world becomes increasingly automated, networked, and sensor-filled, our levels of awareness regarding the invisible interfaces, processes, and protocols through which computers comprehend our world will translate into a new awareness of physical space. Our digital literacy will enable us to retain a sense of effective agency as we design and navigate what is a new category of virtual worlds operating (through the assistance of automation) within the medium of physical space. Spatial Awareness Agency
82 PR To deal with limited memory and processing powers, we get used to things going well. The result: our brains only notice when things go wrong—when there is an event. We do not notice the non-events (i.e., the status quo, the day-to-day). But events and non-events are both consequences of human actions. No actions, no events. Action performance varies, putting the dynamic in dynamic non-event.90 Safety is a dynamic non-event. Talking about safety (and health) is difficult because it is a sustained absence of events, not an event itself. Infrastructural Awareness
83 PR health protocols don’t have fast feedback loops, so adoption is challenging. From my experience, we operate more proactively when the risk is obvious, probable, and has the possibility of immediate harm. Safety issues trigger acute stress responses that encourage action. Anything beyond obvious risk requires empathy for a “future version of oneself” that is difficult to nurture. This can change via instrumentation, such as calorie, nutrient, movement trackers, and continuous glucose, heart rate, and sleep monitors. Anticipation Systems Thinking
84 PR Following protocol involves several actions: perceive another person following protocol or receive instructions on how to follow the protocol; store the protocol in memory; and replicate the protocol. Errors can occur during any one of these actions. The primary way that protocols mutate is via such unintentional errors. A protocol is a type of meme: like genes, protocols reproduce using humans as hosts. Imitation Memory Replicability
85 PR The other two ways that protocols mutate is through tinkering and design. Adaptability Iterative Development
86 PR The three sources of protocol mutation, characterized by their pace and strength, are design, tinkering, and memetic error. They fall on a spectrum of pace and strength of mutation Iterative Development Temporal Awareness Replicability
87 PR Protocol systems are always two things at once—individuals and a group. A bistable perception—individual versus system—is actually important in examining them. If we only think about the aggregated whole, we may overlook harms suffered by individuals within the system or problematic power dynamics masked by the continued functioning of the system. On the other hand, if we only focus on individuals within the system, we may miss emergent risks and benefits coming from the system as a whole. Systems Thinking Autonomy Collectivity Commons Stewardship
88 PR If there is a bad fit between your internal self and your role, you can suffer from a sense of compelled inauthenticity, or dysphoria, while if there is a good fit, and you authentically align with your role, you can thrive. Authenticity Incentive Alignment Role Awareness
89 PR If Pip has awareness of a protocol system, they are “seeing the water” that they swim in—the culture and world (protocol system) that surrounds them, shapes them, and constrains them. When aware, Pip sees the ocean they swim in, knows that other oceans and non-oceans exist, knows how they got into their ocean, and understands that the ocean currents affect their movements. Spatial Awareness Systems Thinking
90 PR Pip has awareness with regard to a particular protocol system if they know: that they are entering, participating in, or exiting it; that they play a certain role within it; that there are alternatives to joining or participating in this particular protocol system; whether they entered the system by choice or under the influence or control of others; and that the protocol is influencing their thoughts and actions. Agency Autonomy Authenticity Role Awareness
91 PR Insight is about the depth of knowledge and understanding Pip has about a protocol system.156 Insight allows a person to make a meaningful choice about their participation and role within a protocol system. Systems Thinking Agency Role Awareness Situational Awareness
92 PR As we become more networked, opportunities for alignment and attunement technologies will become increasingly apparent. They present a possible path to support the success of swarms and other online formations while addressing platform business needs. Networked Intelligence Collaboration Alignment
93 PR A nascent sensibility defined here, orientation can be understood as a form of situational awareness that arranges knowledge in a selective and associative manner aligned with a particular purpose. Orientation enables navigation based on partial cues, feelings, and hints within an environment, without presuming complete situational awareness. Situational Awareness Alignment
94 PR Fixed, hard points across time that let us make the world more predictable. We need these hard points because it is impossible to coordinate at scale without them. Money doesn’t work unless there is a degree of certainty it will still be valuable in the future. Trade is very risky if there isn’t confidence that parties will follow their commitments. Temporal Awareness Anticipation Long-Term Vision Incentive Alignment Constraint
95 PR Good rituals can liberate the individual—in the case of the artist—by helping them coordinate their actions towards their creative goals. Protocols are not just about constraints that are necessarily enforced at the cost of creativity and liberty; they can generate creativity and liberty, if well-designed and implemented. Repetition Agency Freedom Constraint Design
96 PR the art of protocol subversion looks more commonly like tai chi, where participants follow protocol, but in a way that better suits their needs. As Galloway proposed, “it is through protocol that one must guide one’s efforts, not against it.” Subversion
97 PR Instead of resisting protocols, we ought to bring a greater awareness to their overall influence, so that we can make better decisions about which protocols we wish to be a part of and how we might live peaceably under their reign. Agency Infrastructural Awareness
98 PR Any sufficiently healthy world will spawn activity in peripheral forums where the protocol is discussed. It will spread and animate spaces outside itself. The life of the world is not only in the world. Looking for these spaces is an important and often overlooked world-assessment criteria. Institutional Critique
99 PR Protocol makers, know this: your protocol will die. It may become so inflexible that it must be discarded —“if the constitution is too rigid, it becomes necessary to kill the king”412—or the conditions around it may change so much as to become unrecognizable. Adaptability Finitude
100 PR to your protocol and whether they would withstand an existential question Finitude
101 PR In The Timeless Way of Building, Christopher Alexander argues that patterns in architecture and the urban organization have a “quality without a name” that makes a house, a street, a town more or less “alive.” We perceive a place as alive when it is structured or organized to allow congruence within us—this congruence is the capacity to align us with our biological reality and natural desires, allowing those forces to move freely. Authenticity Alignment
102 PR Flourishing requires the cultivation of character, which almost always requires that we examine the systems to which we are beholden and that we break with our narratives and frames. This requires us to take responsibility for our own development—a mindset at odds with mindlessly following a protocol. Like bad habits (which are, after all, effective habits), effective protocols make it easy for people to continue following protocol. Systems Thinking Responsibility Accessibility
103 PR order to pursue flourishing, one must take responsibility for one’s actions and life—if participants are disposed by the protocol to reject responsibility, and if the protocol forms a significant part of their life (say, as a social, cultural, or religious protocol), then flourishing is hindered Responsibility
104 PR In some situations, all that is needed for the emergence of a good protocol is the recognition and diffusion of good solutions that are also easy to imitate. Imitation Replicability Design
105 PR Good protocols learn, grow, and mature in ways that catalyze thoughtful stewardship and sustained generativity. Bad protocols on the other hand, if they avoid early mortality, tend to become increasingly neglected over time, leading to extended periods of sterility and stagnation, and succumbing to capture and corruption. Adaptability Finitude Reflexivity Capture Resistance
106 PR Good protocols seem to strike a robust balance between ensuring order at some loci, and inducing serendipitous creative chaos at adjacent loci. As a result, within their sphere of influence, they create conditions of exceptional serendipity, or at least significantly reduced malevolence, Tension Management Emergent Properties Balance Design
107 PR good protocols seem to thread the needle between too much and too little automation, and too much and too little room for discretionary governance decisions, stabilizing at the right level for their circumstances. They are sufficiently stewardable. Balance Commons Stewardship
108 PR consideration of trade-offs, costs and benefits, and thorough evaluation of designs, leading to good engineering outcomes. They are neither so underconstrained that arbitrary tastes can drive outcomes, nor so overconstrained that there are no good solutions to problems at all. Instead, they encourage a search for opinionated but principled solutions to core problems Balance Tension Management Constraint
109 PR areas in the study of protocols, and the one that comes closest to rising to the level of a science. Our ability to design and build better protocols is strongly driven by the quality of our understanding of fundamental limits, and cultures of tastefully opinionated leadership for navigating them Systems Thinking Constraint Design
110 PR A feature common to protocols and adjacent categories such as APIs, grammars, or rules, is their relationship to literacy. Every protocol, arguably, is by definition also a literacy that takes effort to acquire and practice. The value of a protocol is a strong function of the ease with which participants can acquire literacy and fluency in the behaviors it codifies. Accessibility Situational Awareness
111 PR An effective culture of literacy around a protocol ensures that all participants have the skills necessary to safely and productively participate in it. Mass or retail participants must have sufficient literacy to use protocols safely. For example, pedestrians and drivers must understand and respond to traffic signals. Expert participants and stewards must have enough literacy to govern the protocol and evolve it in the face of changing circumstances and evolving domain knowledge. Creating and sustaining a broad-based culture of literacy around a protocol is a non-trivial task, but is often underestimated, and either treated as a promotional task, to be handled alongside marketing or public relations, or a matter of foolproof user-experience design. Situational Awareness Accessibility Reflexivity Shared Responsibility
112 PR Good protocols are not just sufficiently learnable, they are sufficiently hackable to do without formal educational institutions, especially early in their histories. Accessibility Adaptability
113 PR This ludic quality is arguably essential for meaning-making, and is conceivably the spiritual essence of protocols. Play
114 PR Good protocols, arguably, are sufficiently ludic to serve as engines of meaning-making beyond their nominal functions, while also fulfilling their nominal functions. Play Emergent Properties
115 PR surprisingly many protocols manage to survive early mortality threats and achieve equilibrium states where they are sufficiently defensible to function anyway, even if in significantly diseased conditions. Surprisingly small groups of well-positioned stewards can keep established and critical protocols going long past the point where critics predict they should have succumbed to their varied apparently fatal vulnerabilities. Resilience Commons Stewardship
116 PR While protocols can be hard to kill, and sufficiently defensible against their threat environments, they are neither impossible to kill, nor naturally immortal. They are sufficiently mortal that they do not persist indefinitely, choking the domains they organize. The League of Nations, which preceded the United Nations, is an example of a geopolitical protocol that died after it failed to fulfill its functions in the 1930s. Resilience Finitude Capture Resistance
117 PR Standards-making, it turns out, is high-leverage design, ripe with the ability to change the technological playing field in ways that no individual firm can on its own. It’s like finding the control room of our modern world. Infrastructural Awareness Design
118 PR best way to learn how to work with standards is by studying how they’ve evolved over time. Historical Awareness
119 PR true standards movement must be rooted in the fundamentals. The idealism can’t outweigh the pragmatism Pragmatism
120 PR My professional focus has been, as long as I can remember, about designing for comprehension. That is, understanding what’s going on in one’s surroundings, how things in the world work, and effective ways of thinking and talking about it. Accessibility Situational Awareness
121 PR need to get more people model-literate, which means an order-of-magnitude (or two) increase in the efficiency of uptake. We need to figure out a way to bulk-load models into people’s heads, simultaneously bringing the cost down and the salience up so it becomes something people perceive to be worth doing Accessibility Situational Awareness
122 PR Instead we need to adapt and extend the existing protocols to the internet and its engaged communities. A first step is acknowledging the deep bench of untapped talent. Adaptability
123 PR major lesson of cryptocurrency protocols is that when you design something with a trust-minimized architecture, people approach it with a mercenary perspective Relationality Reflexivity
124 PR Exploration involves trying out new options that may lead to better outcomes. Exploitation involves choosing the best-available option based on exploration. Finding the optimal balance between these two strategies is a crucial challenge in many decision-making situations, where the goal is to maximize long-term benefits. Experimentation Balance Incentive Alignment Long-Term Vision
125 PR Protocols are designed in reaction to some troubling condition rather than being conceived of independently from their environment. This argument is more obvious for some protocols than for others. Pragmatism Tension Management
126 PR stating that protocols are conservative is not a political assertion. This statement does not challenge the value of preservation and conservation during periods of undeniable turmoil. The intention of highlighting the backward-oriented nature of protocols is merely to underscore—as some of the researchers did—that these tools often possess their own agency. They assert their temporal logic upon anything we endeavor with them, especially where there is no conscious reflection on their use. Inheritance Historical Awareness Temporal Awareness Reflexivity
127 PR value can oscillate quickly into costs and at such a magnitude that even precious systems must have a stop. This poses the question of how to shut the thing down, and who should make the decision to do so. While the options that have predominated up to now involve highly centralized control of the killswitch protocol, this form of engineered system death is also the least interesting from a systems engineering perspective because it boils down to designing a killswitch that a concentrated authority can exercise Decentralized Governance
128 PR Whereas the Linux kernel doesn’t produce anything for users until distros add their features, running Ethereum software produces a usable artifact right away. Accessibility Pragmatism
129 PR The protocol system conveys the people and their relationship to data, spaces, and other people, describing it as a “role in a box” with different preset levels of access, permissions, and incentives to represent and augment the organization. Role Awareness Incentive Alignment Precision
130 PR The interoperability allows for a seamless transfer of users and data between apps and cities, while the composability comes into play when any aspect of the protocol becomes shared infrastructure that can be combined together or taken apart. Interoperability Infrastructural Awareness
131 PR “Copying was such a taboo back then, less so in the software world, especially in open-source, but outside of those bubbles it wasn’t considered acceptable. People were still romanticising the idea of the lone genius or decision-maker,” recounts Das. “It wasn’t until we were forced to work together during the collapse that folks realized ideas were meant to be shared and modified; that it was ok to edit and improve upon them. Replicability Collaboration Adaptability
132 PR Without a critical capacity, it becomes difficult to keep the checks and balances averaging. Furthermore, the whole system relies on trust. Without it, the IOU-based system fails as people become unsure if the value they’ve given to others will be returned when they’re in need. Institutional Critique Trust
133 PR The study showed there were some conditions to the benefits of diversity, however, which only began to take effect when at least four functional groups or different plant species were present and increased as the number of plants in each species increased. When this minimum diversity threshold was met, researchers saw it triggered a change in the behavior of the fungal network that supported the nutrient and water uptake of the plants towards mutualism, rather than competition or parasitism seen in less diverse and dense plantings. Plurality
134 PR The je ne sais quoi of protocols, after all, is an ineffable quality of openness, Openness
135 PR Beyond hardening our activities against capture or co-option by narrower agendas, and doing our best to articulate, in honest but unapologetic ways, the opinionated tastes we are bringing to our curation and catalysis efforts, we aim to keep our role small and limited, and indeed, shrink it over time. Role Awareness Capture Resistance

BIN
text_coding/coding.ods Normal file

Binary file not shown.

93
text_coding/results.csv Normal file
View File

@@ -0,0 +1,93 @@
Adaptability,17
Tension Management,13
Accessibility,13
Temporal Awareness,11
Design,11
Agency,10
Institutional Critique,10
Systems Thinking,10
Resistance,10
Relationality,10
Infrastructural Awareness,10
Responsibility,9
Transgression,9
Plurality,9
Alignment,9
Inheritance,8
Collectivity,8
Authenticity,7
Long-Term Vision,7
Cultural Awareness,6
Equity,6
Interdependence,6
Shared Responsibility,6
Respect,6
Spatial Awareness,6
Situational Awareness,6
Capture Resistance,6
Commons Stewardship,5
Emergent Properties,5
Reflexivity,5
Memory,5
Incentive Alignment,5
Embodiment,5
Inclusivity,5
Reciprocity,5
Replicability,5
Balance,5
Role Awareness,5
Constraint,5
Care,4
Complex Systems Tolerance,4
Curiosity,4
Empathy,4
Historical Awareness,4
Imagination,4
Iterative Development,4
Imitation,4
Refusal,4
Finitude,4
Autonomy,3
Collaboration,3
Decentralized Governance,3
Pragmatism,3
Resilience,3
Trust,3
Consent,3
Groundedness,3
Anticipation,3
Freedom,3
Subversion,3
Creative Problem Solving,2
Experimentation,2
Accountability,2
Repetition,2
Play,2
Courage,1
Distributed Trust,1
Humility,1
Interoperability,1
Networked Intelligence,1
Openness,1
Sustainable Practices,1
Tradition,1
Precision,1
Community,0
Compassion,0
Contingency Planning,0
Digital Literacy,0
Discipline,0
Ethical Conduct,0
Fluidity,0
Future-Oriented Thinking,0
Grace,0
Justice,0
Learning Orientation,0
Meta-Awareness,0
Mindfulness,0
Non-Dogmatism,0
Patience,0
Reflection,0
Robustness,0
Strategic Thinking,0
Virtuous Cycles,0
1 Adaptability 17
2 Tension Management 13
3 Accessibility 13
4 Temporal Awareness 11
5 Design 11
6 Agency 10
7 Institutional Critique 10
8 Systems Thinking 10
9 Resistance 10
10 Relationality 10
11 Infrastructural Awareness 10
12 Responsibility 9
13 Transgression 9
14 Plurality 9
15 Alignment 9
16 Inheritance 8
17 Collectivity 8
18 Authenticity 7
19 Long-Term Vision 7
20 Cultural Awareness 6
21 Equity 6
22 Interdependence 6
23 Shared Responsibility 6
24 Respect 6
25 Spatial Awareness 6
26 Situational Awareness 6
27 Capture Resistance 6
28 Commons Stewardship 5
29 Emergent Properties 5
30 Reflexivity 5
31 Memory 5
32 Incentive Alignment 5
33 Embodiment 5
34 Inclusivity 5
35 Reciprocity 5
36 Replicability 5
37 Balance 5
38 Role Awareness 5
39 Constraint 5
40 Care 4
41 Complex Systems Tolerance 4
42 Curiosity 4
43 Empathy 4
44 Historical Awareness 4
45 Imagination 4
46 Iterative Development 4
47 Imitation 4
48 Refusal 4
49 Finitude 4
50 Autonomy 3
51 Collaboration 3
52 Decentralized Governance 3
53 Pragmatism 3
54 Resilience 3
55 Trust 3
56 Consent 3
57 Groundedness 3
58 Anticipation 3
59 Freedom 3
60 Subversion 3
61 Creative Problem Solving 2
62 Experimentation 2
63 Accountability 2
64 Repetition 2
65 Play 2
66 Courage 1
67 Distributed Trust 1
68 Humility 1
69 Interoperability 1
70 Networked Intelligence 1
71 Openness 1
72 Sustainable Practices 1
73 Tradition 1
74 Precision 1
75 Community 0
76 Compassion 0
77 Contingency Planning 0
78 Digital Literacy 0
79 Discipline 0
80 Ethical Conduct 0
81 Fluidity 0
82 Future-Oriented Thinking 0
83 Grace 0
84 Justice 0
85 Learning Orientation 0
86 Meta-Awareness 0
87 Mindfulness 0
88 Non-Dogmatism 0
89 Patience 0
90 Reflection 0
91 Robustness 0
92 Strategic Thinking 0
93 Virtuous Cycles 0

143
text_coding/snippets.csv Normal file
View File

@@ -0,0 +1,143 @@
AFP//You have a past, but you remember it with more detail than you should. And these details cannot be stopped by time. They have become a tradition.
AFP//You have no past. Either you have forgotten it or it was erased from you. You are piecing together the rest of the story from the information of others and you have placed yourself inside. This is your protocol.
AFP//Identifying and working against these protocols necessitates civil disobedience against the limitations of institutionalized knowledge and biopolitical power that seek to govern and interpellate our bodies, our health, gender, sexuality, and (re)production.
AFP//Investigating protocols as such allows us to contribute to the creation of new protocols that are inclusive and equitable.
AFP//We were interested in how this process may contribute to long-term political organizing, which requires ongoing cycles of action, reflection, and adjustments to the dynamics and protocols of shared struggle.
AFP//Ultra-red has no single organized political affiliation. The collectives members are engaged with anti-racist movements in Britain, migrant struggles in Germany, community-based education in London, New York City, and Los Angeles, and struggles for housing and just community development in East Los Angeles.
AFP//At the passing of four and a half minutes, the workshop organizer announced, “Time.” Then we asked, “What did you hear?” We noticed that this practice increased concerns with and discussion of the contexts within which people gathered to address the crisis.
AFP//Who speaks? Whose voice is amplified? What do we speak of and to whom? Who listens, and to what end do they listen? Who has a place at the table? Who determines who has a place at the table? And on whose behalf do those seated at the table speak?
AFP//The failure to address this hegemony perpetuates divides between those who circulate within the art world and those who do not. The only acknowledgment of this divide comes in the form of “audience development” initiatives based on liberal notions of inclusion.
AFP//When effective, constitutive protocols place experience in dialogue with principles and regulations. This is what I consider the most powerful use of protocols, which is when disciplinary and constitutive protocols form a contradiction or dialectic.
AFP//This led us to borrow the concept of “desire lines”—trails or paths carved out over time, usually emerging as shortcuts between destinations. In built landscapes, they break protocol with prescribed routes. In natural environments, they often reveal animal migrations, paths used across generations. Desire lines are always a record of behavior—lines of movement suggested by previous path-takers and followed by future path-takers. Apparently, we cannot all be trailblazers. We love to follow in each others footsteps.
AFP//Breaking protocol with accepted modes of behavior in public space can feel dangerous—especially given current and historical restrictions on sexual desire and, in particular, same-sex desire.
AFP//Freedom and desire mean different things to different people at different times. So one of the central tenets is the liberating notion that we dont all have to agree. Of course, with a proposal
AFP//If I had been outside of my homeland, I then would have acknowledged whosoevers territory I was visiting, as a political affirmation of their sovereignty and self-determination and a practice of respect.
AFP//Marias smile, though, was not protocol. There is no rule that Anishinaabe begin meetings, visits, or events with a big smile; if anything, our elders tend to show less emotion in facial expressions in comparison to Euro-Canadian or American culture. I experienced her smile as entirely Anishinaabe because it was contradictory to the colonial form of our encounter and the formality of artist talks and academic conversations.
AFP//we are not the first Indigenous women or artists to sit down and have a conversation about protocols. These conversations happen all the time around kitchen tables, on sidewalks, in galleries and studios, and in the bush.
AFP//I didnt set out to break protocol; my intention was to expand our ideas around protocol or to place protocols back within the larger network of Anishinaabe ethics. If the intent of protocols is to show respect and create spaces where we could be our best selves, what happens when there is such rigidity that the protocol erodes our foundational values of consent, diversity, self-determination, and non-interference? What happens when protocol backfires and causes harm?
AFP//How can we break the cage of protocol and embody a deeper understanding of Anishinaabe ethics and values?
AFP//Anishinaabe life, to a great degree, is care work. Our foundational teachings, the Seven Ancestor teachings, in my area called the Kookum Dibajimowin, are not a set of laws or commandments, or protocols that we have to follow. Rather, they are a complex set of practices that, when embodied, both individually and in relation to other living things, create a world in which consent, accountability, problem solving, and kindness are embedded.
AFP//remember very early on in my career being out on the land with an Elder hunting geese. We shot one, and he had forgotten his tobacco. I remember wondering what was going to happen, because it is our practice to show gratitude through reciprocity, and normally this is done through an offering of tobacco. The Elder who I was with left a tiny bit of his baloney sandwich. When I asked him if this was going to be OK with the geese, he said “Of course,” because the gesture was thoughtful and would be seen by the geese as an expression of deep respect.
AFP//Avoid using protocol to demonstrate how much of your culture youve recovered and instead use our practices as a point of connection and to create belonging and nurture relationships.
AFP//It needs to go back to family and community, figuring out who you are, where you come from, what your family gifts, what your gifts are that you have to contribute, cause they are not the same, and they are not always what we want them to be either.
AFP//An essential element of my practice is what I call spiritual fieldwork, or the process of developing relationships with the human and nonhuman entities of a particular place or field in tandem with gathering information.
AFP//I think time is an Indigenous currency, one that we especially lack in our capitalist society. Listening also requires that you be present, allowing what you hear to shape the process at every step.
AFP//When trust has been built, it is important to be aware of ones limitations, not to overstep, and not to overcommit. Trust is maintained by keeping promises, contracts, and boundaries.
AFP//reciprocity takes shape in responding to calls for mutual aid at any level, and by doing so it supports collectivities through personal and professional interactions.
AFP//In all Indigenous cultures, there is a natural law, a model of the world in which energies fluctuate between different levels. Associated with this vision of perpetual energy movement is the protocol of pagamento, or payback, which is the need to act based on the principle of reciprocity, to always give something in exchange for what is obtained, be it something material or service of any kind.
AFP//The protocols I have shared here are not set in stone—they shift as I learn and grow, as society grows, and as the circumstances of our planet change rapidly.
AFP//Let us collectively recommit to center and sustain life through our diverse practices. Let us remember that we are all related and that our futures are intertwined.
AFP//Stay low to the ground. Stay nimble and mobile (shifting between places, scales, times, elements). Keep it trans-local. Attend to the lower parts of the body. Think with and of pregnancy, with and of forms of degraded trans*ition, transformation, metamorphosis. Use your nose.36 Follow the shit. Follow the power. Follow the money.37
AFP//I argue that this is the kind of approach we need as we think through the nexus of ecology, climate, and racism. This grounding approach does not take refuge in ideal theory (climate ethics) or abstract calculations of emissions (some climate justice) but rather gets down in the muck, in the matter of life and death, to think and be in ways that (to borrow from Wynter) are “down to earth.”
AFP//The behaviors that we think liberate us are based on the disappointments of the past and keep us constrained within the confines of colonial imaginations dispossessing us of our purpose and, ultimately, our freedom.
AFP//To choose the self without fixing, changing, guilting, or blaming, we also have to choose rather than deny, escape, or wish away the histories that made us. We have to embark on a new protocol.
AFP//Escapism is one of the various epigenetic expressions I carry as a descendant of enslaved Indigenous peoples. I have the ability to not be here now as a way of enduring the present and making my way toward the future. Afrofuturist narratives like the folktales of High John and Brerer Rabbit were an already-always part of me when I needed hope—a cartography towards freedom letting me know that other ways of being are possible and that I am not stuck here.
AFP//It does not honor our ancestors to create a binary construction of embodiment as celebration and disembodiment as problematic. We will not dismiss and flatten the narratives of escape.
AFP//Whether slow or fast, micro or macro, invisible or detectable, this unseen world is responsible for a deep interconnectedness across species, substances, and timescales.
AFP//if we think through our vast entanglements under the molecular semiosphere, there are no such categories. We are already alien.
AFP//These exercises produce what AiG calls “cultivating an art of combinations,” or an art of symbiosis that “recomposes the commons in an odd world.”10 Working with AiG was the moment I began to see the potential of biohacking and collective world-making and the possibility of neutralizing a deeply ingrained fear conditioned in us from birth. More importantly, I learned that only from this point of emancipatory
AFP//There is no hard separation, clear boundary, or final destination in the form of an apocalypse, and perhaps we should all stop hoping for one. There are only relations—entanglements that transform us every day.
AFP//We ask that, in entering this essay, you do not merely distill the offerings emerging from it for your needs and desires.8
AFP//Access as accommodation cannot truly value disability culture, joy, and knowledge of ways to live otherwise, as it is fundamentally a project of normalization that neutralizes the political world-building potential of access as it is and has been practiced between humans unmediated by vast organizational bodies. The ableist world is just fine as it is and surely everybody wants in, right?
AFP//Access-centered practices include protocols because certain needs are best met with consistent solutions (like ASL interpretation), but access overall cant be reduced to protocols.43 When access practices are responsive to the nuance and mutability of needs, responsibility for access becomes collectivized into culture rather than held by experts or individuals with static roles in policy, protocol, and procedure.
AFP//Dependency and interdependency are where we materially and affectively meet: our needs are what connect us to one another, they bring us into the vulnerabilities of both love and harm.
AFP//These artworks hold the persistence and necessary creativity of access-centered life, embodying how disability justice organizer Mia Minguss concept of access intimacy comes out of (conscious or unconscious) praxis. Mingus emphasizes the possibility for access intimacy to occur instantaneously between people without shared experience or political identity. This intimacy need not be communicated linguistically, offering an intuitive, non-identity based, affective lens onto modes of relation beyond policy.48 Access intimacy centers the affective aspects of access essential to access-centered practice.
AFP//Within, we learn each others protocols (How do I inject you? When do you have to go to hospital despite the risks associated with being undocumented?). We cultivate practices of care that exceed what protocols encompass (What types of touch does my body welcome? Do you enjoy metaphors when I describe images to you? Who has space to host others?). Amongst, we fuck with policy—negotiate, circumvent, and refuse it. Work it, flip it, and reverse it.
AFP//The infrastructure and its limitations have predetermined the communication trajectory and centered the West as a hub through which all information moves, making the internets architecture political.
AFP//To Wood, Web3 is about building systems that dont rely on trusting people, corporations, or governments to make moral choices, but that instead render evil choices impossible.”
AFP//By care-based internet protocols, I mean a set of rules and guidelines that prioritize the well-being of users, their privacy, and their security over other considerations such as convenience or profit. These protocols move us away from technical jargon and encourage access through consentful participation.10
AFP//Redesigning the collective timeline cannot be accomplished by a single, solitary voice or action, nor by a small group of individuals. It requires shared responsibility and agreement from multiple communities and their branching timelines. It calls for the collaboration of multiple forces from different times, spaces, and narratives.
AFP//participants were invited to create their own representations of space-time disentangled from racial capitalist patriarchy. They were encouraged to imagine and visualize a space-time that transcends oppressive systems and structures through a series of reflective questions exploring the aesthetics and sensory experiences of their alternative space-time, such as: What does it look, sound, smell, and taste like? Who is present within this space-time? How do individuals choose to act or refrain from certain actions? And most importantly, how do they feel within this space-time free from the constraints of racial capitalist patriarchy?
AFP//Protocols, resolutions, and practices are meant to be replicable and will be revisited at some collectively agreed-upon time and space.
AFP//That part of the thinking of Blackness in terms of Black studies is something other than the individual biography, individual greatness, or the individual artist being an individual genius. I think were all invited into something other than individuation in this symposium with the mode of artistic practices. Part of what I hear from Nadirs cloud science is also a science of collectivity. That collectivity is a protocol for conducting science.
AFP//Each individual cloud, as you can see, its kind of chaotic. They all have their small differences, but it turns out that they actually have a lot in common. The best way to describe it is by thinking of them as one collective entity and describing their behavior collectively.
AFP//happening in the atmosphere is instantaneous from the point of view of the deep ocean; three to five years is nothing. When were thinking in terms of this deep climate time or this deep time, again, relative to a concrete change thats happening here, the adjustment time here is invisible. Its instant.
AFP//what if rather than remixing and repurposing existing protocols, we orchestrated new ones—protocols that, instead of summoning us into productive labor, compliant tool use, or compulsive consumption, cultivate a soundtrack for camaraderie or care or caprice? Can we imagine an alarm clock whose aubade, or morning song, awakens us into an otherwise world of possibility?
AFP//Each day, especially after I have taken photographs of the desk, I write in the notebook. How I have managed to do that all month takes me by surprise. I have never undertaken such an activity, habitually skirting through several notebooks as though incapable of regimen. I imagine this sudden focus has to do with five years of attempting to write a novel—novels, in fact, at one point, coming to forty thousand words—and failing to see the point, the throughline to connect story with imperative.
AFP//I was an active participant in the perpetuation of the protocols of that very culture, which I grew accustomed to over many years. These unspoken criteria applied not just to job interviews but to all kinds of curatorial closed-door meetings where we would discuss research, invite scholars to speak on certain topics, or discuss issues connected with exhibitions.
AFP//the particular role of the art museum as a tastemaker, gatekeeper, and arbiter of high-end culture has created the demands of a particular economic and cultural model and its intrinsic protocols that, as I will try to argue, are highly fragile and, because of their fragility, highly conservative in their financial and intellectual ambitions.
AFP//Once we step outside the metaphorical classroom, we put protocols in motion in order to welcome everyone into these encounters: we work across platforms; we adjust language, design, content, technology; and we insert periods of reflection and time to accommodate different time spans and evolutions in thinking.
AFP//Taking the topic of protocols at its most radical form of collective intervention, we had hoped to push the standards of peer review even further with this volume.
AFP//For this book, we decided to produce two separate versions and make them available. One is a designed PDF fixed layout—a version that mirrors the printed book and foregrounds the design as a protocol-related feature—and the other is an EPUB file that does not have many of the design features, but it includes all the text of the book while still being extremely accessible to assisted reading devices.
AFP//What weve learned from this volume is that a protocol—a form embedded in the origins of publishing itself as a medium—can be unbound from any particular monovocal convention.
PR//the modern burglar often understands the protocols of urbanism better than the insiders who are their nominal stewards. In a world that increasingly comprises protocols, power follows knowledge, not ascriptive authority.
PR//the hero of a protocolized world has mastered a general set of technological patterns that undergird not just the internal realities of organizations across the entire planet but even the interstitial spaces between them.
PR//what we might call the protocol punk hero operates from within a protocolized environment where boundaries separating insides and outsides are increasingly meaningless.
PR//the protocol punk hero, unlike the bureaucratic hero or the outsider maverick, is master of both smooth and striated spaces, and able to navigate both arborescent and rhizomatic epistemic environments.
PR//It is easy to miss the myriad invisible ways in which clock time structures our lives, from train schedules and norms of scheduling meetings to begin at half-hour boundaries, to the structuring of work and leisure hours by calendars with roots in ancient religions.
PR//Every successful protocol, arguably, is the result of successfully anticipating some sort of traffic jam, and presciently engineering mechanisms to manage the underlying tensions.
PR//Unlike the epic heroes of antiquity, or even cyberpunk heroes, protocol punk heroes are rarely lone wolves. Instead, they often exhibit remarkable social skills. Their uncanny protocol-whispering abilities often rest as much on social engineering skills as on technical engineering or architecture skills.
PR//major component of the work of protocol whisperers is to manage constantly shifting tensions at an ecosystem level, rather than within a single organization
PR//trusted relationships with allies on many sides of many active arguments
PR//a strong sense of the collective memory of an evolving commons.
PR//protocol design and architecture conversations, a truly remarkable amount of conscious and active attention is devoted to things like selection pressures, incentives, red-teaming, and modeling of emergent equilibria. Unlike the engineer in a private corporation, or the bureaucrat in a hospital or a government agency, the protocol whisperer must simultaneously think like an Organization Man, a central banker, a hacker, a market maker, and a military strategist
PR//Efforts to create the right engineered arguments are the exceptions. Playing to win is the norm. Playing to continue the game is rare.
PR//The pluralist infinite-game idea of a protocol as an engineered argument can be contrasted with a complementary “playing to win” definition of an API
PR//There are also non-human single points of failure (SPOFs). In a thoughtful critique, Moxie Marlinspike, co-creator of the Signal messaging protocol, pointed out the many SPOF vulnerabilities in the Ethereum ecosystem.14 In the worst cases, they can lurk unseen until they cause the unexpected fatal collapse of a valued protocol.
In well-managed protocols, SPOFs are broadly recognized, consciously managed, gradually mitigated, progressively moved to less and less critical loci, and in the best cases, eliminated altogether.
PR//When it comes to protocols, sticking to any kind of ideological hardline position cedes agency to those willing to participate in the engineered arguments. There is no winning move, and the only way to continue to play is to recognize that youre not in traffic, you are traffic.
PR//Part 4, Living With Protocols
PR//is easier to reorganize the furniture in ones house than to change the buildings structure or expand the site on which its built. Longer-term interventions in the built environment that adapt the base layers to new conditions are still worthwhile—they are as critical as ever—but, for individuals working at smaller spatial and temporal scales, the “software” (and the protocols that mediate it) may be a more fruitful domain of intervention than the hardware
PR//Today we build fulfillment centers, freeways, container ships, and supertall skyscrapers, all accidental monuments to the various protocols that utilize them, and equally impressive (but usually more esoteric, largely appreciated by the “protocol literate”). Unlike cathedrals and pyramids, the charismatic qualities of protocol monuments are likely to be incidental, a side effect of their primary purpose.
PR//As our world becomes increasingly automated, networked, and sensor-filled, our levels of awareness regarding the invisible interfaces, processes, and protocols through which computers comprehend our world will translate into a new awareness of physical space. Our digital literacy will enable us to retain a sense of effective agency as we design and navigate what is a new category of virtual worlds operating (through the assistance of automation) within the medium of physical space.
PR//To deal with limited memory and processing powers, we get used to things going well. The result: our brains only notice when things go wrong—when there is an event. We do not notice the non-events (i.e., the status quo, the day-to-day). But events and non-events are both consequences of human actions. No actions, no events. Action performance varies, putting the dynamic in dynamic non-event.90 Safety is a dynamic non-event. Talking about safety (and health) is difficult because it is a sustained absence of events, not an event itself.
PR//health protocols dont have fast feedback loops, so adoption is challenging. From my experience, we operate more proactively when the risk is obvious, probable, and has the possibility of immediate harm. Safety issues trigger acute stress responses that encourage action. Anything beyond obvious risk requires empathy for a “future version of oneself” that is difficult to nurture. This can change via instrumentation, such as calorie, nutrient, movement trackers, and continuous glucose, heart rate, and sleep monitors.
PR//Following protocol involves several actions: perceive another person following protocol or receive instructions on how to follow the protocol; store the protocol in memory; and replicate the protocol. Errors can occur during any one of these actions. The primary way that protocols mutate is via such unintentional errors. A protocol is a type of meme: like genes, protocols reproduce using humans as hosts.
PR//The other two ways that protocols mutate is through tinkering and design.
PR//The three sources of protocol mutation, characterized by their pace and strength, are design, tinkering, and memetic error. They fall on a spectrum of pace and strength of mutation
PR//Protocol systems are always two things at once—individuals and a group. A bistable perception—individual versus system—is actually important in examining them. If we only think about the aggregated whole, we may overlook harms suffered by individuals within the system or problematic power dynamics masked by the continued functioning of the system. On the other hand, if we only focus on individuals within the system, we may miss emergent risks and benefits coming from the system as a whole.
PR//If there is a bad fit between your internal self and your role, you can suffer from a sense of compelled inauthenticity, or dysphoria, while if there is a good fit, and you authentically align with your role, you can thrive.
PR//If Pip has awareness of a protocol system, they are “seeing the water” that they swim in—the culture and world (protocol system) that surrounds them, shapes them, and constrains them. When aware, Pip sees the ocean they swim in, knows that other oceans and non-oceans exist, knows how they got into their ocean, and understands that the ocean currents affect their movements.
PR//Pip has awareness with regard to a particular protocol system if they know:
that they are entering, participating in, or exiting it;
that they play a certain role within it;
that there are alternatives to joining or participating in this particular protocol system;
whether they entered the system by choice or under the influence or control of others; and
that the protocol is influencing their thoughts and actions.
PR//Insight is about the depth of knowledge and understanding Pip has about a protocol system.156 Insight allows a person to make a meaningful choice about their participation and role within a protocol system.
PR//As we become more networked, opportunities for alignment and attunement technologies will become increasingly apparent. They present a possible path to support the success of swarms and other online formations while addressing platform business needs.
PR//A nascent sensibility defined here, orientation can be understood as a form of situational awareness that arranges knowledge in a selective and associative manner aligned with a particular purpose. Orientation enables navigation based on partial cues, feelings, and hints within an environment, without presuming complete situational awareness.
PR//Fixed, hard points across time that let us make the world more predictable.
We need these hard points because it is impossible to coordinate at scale without them. Money doesnt work unless there is a degree of certainty it will still be valuable in the future. Trade is very risky if there isnt confidence that parties will follow their commitments.
PR//Good rituals can liberate the individual—in the case of the artist—by helping them coordinate their actions towards their creative goals. Protocols are not just about constraints that are necessarily enforced at the cost of creativity and liberty; they can generate creativity and liberty, if well-designed and implemented.
PR//the art of protocol subversion looks more commonly like tai chi, where participants follow protocol, but in a way that better suits their needs. As Galloway proposed, “it is through protocol that one must guide ones efforts, not against it.”
PR//Instead of resisting protocols, we ought to bring a greater awareness to their overall influence, so that we can make better decisions about which protocols we wish to be a part of and how we might live peaceably under their reign.
PR//Any sufficiently healthy world will spawn activity in peripheral forums where the protocol is discussed. It will spread and animate spaces outside itself. The life of the world is not only in the world. Looking for these spaces is an important and often overlooked world-assessment criteria.
PR//Protocol makers, know this: your protocol will die. It may become so inflexible that it must be discarded —“if the constitution is too rigid, it becomes necessary to kill the king”412—or the conditions around it may change so much as to become unrecognizable.
PR//to your protocol and whether they would withstand an existential question
PR//In The Timeless Way of Building, Christopher Alexander argues that patterns in architecture and the urban organization have a “quality without a name” that makes a house, a street, a town more or less “alive.” We perceive a place as alive when it is structured or organized to allow congruence within us—this congruence is the capacity to align us with our biological reality and natural desires, allowing those forces to move freely.
PR//Flourishing requires the cultivation of character, which almost always requires that we examine the systems to which we are beholden and that we break with our narratives and frames. This requires us to take responsibility for our own development—a mindset at odds with mindlessly following a protocol. Like bad habits (which are, after all, effective habits), effective protocols make it easy for people to continue following protocol.
PR//order to pursue flourishing, one must take responsibility for ones actions and life—if participants are disposed by the protocol to reject responsibility, and if the protocol forms a significant part of their life (say, as a social, cultural, or religious protocol), then flourishing is hindered
PR//In some situations, all that is needed for the emergence of a good protocol is the recognition and diffusion of good solutions that are also easy to imitate.
PR//Good protocols learn, grow, and mature in ways that catalyze thoughtful stewardship and sustained generativity. Bad protocols on the other hand, if they avoid early mortality, tend to become increasingly neglected over time, leading to extended periods of sterility and stagnation, and succumbing to capture and corruption.
PR//Good protocols seem to strike a robust balance between ensuring order at some loci, and inducing serendipitous creative chaos at adjacent loci. As a result, within their sphere of influence, they create conditions of exceptional serendipity, or at least significantly reduced malevolence,
PR//good protocols seem to thread the needle between too much and too little automation, and too much and too little room for discretionary governance decisions, stabilizing at the right level for their circumstances. They are sufficiently stewardable.
PR//consideration of trade-offs, costs and benefits, and thorough evaluation of designs, leading to good engineering outcomes. They are neither so underconstrained that arbitrary tastes can drive outcomes, nor so overconstrained that there are no good solutions to problems at all. Instead, they encourage a search for opinionated but principled solutions to core problems
PR//areas in the study of protocols, and the one that comes closest to rising to the level of a science. Our ability to design and build better protocols is strongly driven by the quality of our understanding of fundamental limits, and cultures of tastefully opinionated leadership for navigating them
PR//A feature common to protocols and adjacent categories such as APIs, grammars, or rules, is their relationship to literacy. Every protocol, arguably, is by definition also a literacy that takes effort to acquire and practice. The value of a protocol is a strong function of the ease with which participants can acquire literacy and fluency in the behaviors it codifies.
PR//An effective culture of literacy around a protocol ensures that all participants have the skills necessary to safely and productively participate in it. Mass or retail participants must have sufficient literacy to use protocols safely. For example, pedestrians and drivers must understand and respond to traffic signals. Expert participants and stewards must have enough literacy to govern the protocol and evolve it in the face of changing circumstances and evolving domain knowledge. Creating and sustaining a broad-based culture of literacy around a protocol is a non-trivial task, but is often underestimated, and either treated as a promotional task, to be handled alongside marketing or public relations, or a matter of foolproof user-experience design.
PR//Good protocols are not just sufficiently learnable, they are sufficiently hackable to do without formal educational institutions, especially early in their histories.
PR//This ludic quality is arguably essential for meaning-making, and is conceivably the spiritual essence of protocols.
PR//Good protocols, arguably, are sufficiently ludic to serve as engines of meaning-making beyond their nominal functions, while also fulfilling their nominal functions.
PR//surprisingly many protocols manage to survive early mortality threats and achieve equilibrium states where they are sufficiently defensible to function anyway, even if in significantly diseased conditions. Surprisingly small groups of well-positioned stewards can keep established and critical protocols going long past the point where critics predict they should have succumbed to their varied apparently fatal vulnerabilities.
PR//While protocols can be hard to kill, and sufficiently defensible against their threat environments, they are neither impossible to kill, nor naturally immortal. They are sufficiently mortal that they do not persist indefinitely, choking the domains they organize. The League of Nations, which preceded the United Nations, is an example of a geopolitical protocol that died after it failed to fulfill its functions in the 1930s.
PR//Standards-making, it turns out, is high-leverage design, ripe with the ability to change the technological playing field in ways that no individual firm can on its own. Its like finding the control room of our modern world.
PR//best way to learn how to work with standards is by studying how theyve evolved over time.
PR//true standards movement must be rooted in the fundamentals. The idealism cant outweigh the pragmatism
PR//My professional focus has been, as long as I can remember, about designing for comprehension. That is, understanding whats going on in ones surroundings, how things in the world work, and effective ways of thinking and talking about it.
PR//need to get more people model-literate, which means an order-of-magnitude (or two) increase in the efficiency of uptake. We need to figure out a way to bulk-load models into peoples heads, simultaneously bringing the cost down and the salience up so it becomes something people perceive to be worth doing
PR//Instead we need to adapt and extend the existing protocols to the internet and its engaged communities. A first step is acknowledging the deep bench of untapped talent.
PR//major lesson of cryptocurrency protocols is that when you design something with a trust-minimized architecture, people approach it with a mercenary perspective
PR//Exploration involves trying out new options that may lead to better outcomes. Exploitation involves choosing the best-available option based on exploration. Finding the optimal balance between these two strategies is a crucial challenge in many decision-making situations, where the goal is to maximize long-term benefits.
PR//Protocols are designed in reaction to some troubling condition rather than being conceived of independently from their environment. This argument is more obvious for some protocols than for others.
PR//stating that protocols are conservative is not a political assertion. This statement does not challenge the value of preservation and conservation during periods of undeniable turmoil. The intention of highlighting the backward-oriented nature of protocols is merely to underscore—as some of the researchers did—that these tools often possess their own agency. They assert their temporal logic upon anything we endeavor with them, especially where there is no conscious reflection on their use.
PR//value can oscillate quickly into costs and at such a magnitude that even precious systems must have a stop. This poses the question of how to shut the thing down, and who should make the decision to do so. While the options that have predominated up to now involve highly centralized control of the killswitch protocol, this form of engineered system death is also the least interesting from a systems engineering perspective because it boils down to designing a killswitch that a concentrated authority can exercise
PR//Whereas the Linux kernel doesnt produce anything for users until distros add their features, running Ethereum software produces a usable artifact right away.
PR//The protocol system conveys the people and their relationship to data, spaces, and other people, describing it as a “role in a box” with different preset levels of access, permissions, and incentives to represent and augment the organization.
PR//The interoperability allows for a seamless transfer of users and data between apps and cities, while the composability comes into play when any aspect of the protocol becomes shared infrastructure that can be combined together or taken apart.
PR//“Copying was such a taboo back then, less so in the software world, especially in open-source, but outside of those bubbles it wasnt considered acceptable. People were still romanticising the idea of the lone genius or decision-maker,” recounts Das.
“It wasnt until we were forced to work together during the collapse that folks realized ideas were meant to be shared and modified; that it was ok to edit and improve upon them.
PR//Without a critical capacity, it becomes difficult to keep the checks and balances averaging. Furthermore, the whole system relies on trust. Without it, the IOU-based system fails as people become unsure if the value theyve given to others will be returned when theyre in need.
PR//The study showed there were some conditions to the benefits of diversity, however, which only began to take effect when at least four functional groups or different plant species were present and increased as the number of plants in each species increased. When this minimum diversity threshold was met, researchers saw it triggered a change in the behavior of the fungal network that supported the nutrient and water uptake of the plants towards mutualism, rather than competition or parasitism seen in less diverse and dense plantings.
PR//The je ne sais quoi of protocols, after all, is an ineffable quality of openness,
PR//Beyond hardening our activities against capture or co-option by narrower agendas, and doing our best to articulate, in honest but unapologetic ways, the opinionated tastes we are bringing to our curation and catalysis efforts, we aim to keep our role small and limited, and indeed, shrink it over time.
1 AFP//You have a past, but you remember it with more detail than you should. And these details cannot be stopped by time. They have become a tradition.
2 AFP//You have no past. Either you have forgotten it or it was erased from you. You are piecing together the rest of the story from the information of others and you have placed yourself inside. This is your protocol.
3 AFP//Identifying and working against these protocols necessitates civil disobedience against the limitations of institutionalized knowledge and biopolitical power that seek to govern and interpellate our bodies, our health, gender, sexuality, and (re)production.
4 AFP//Investigating protocols as such allows us to contribute to the creation of new protocols that are inclusive and equitable.
5 AFP//We were interested in how this process may contribute to long-term political organizing, which requires ongoing cycles of action, reflection, and adjustments to the dynamics and protocols of shared struggle.
6 AFP//Ultra-red has no single organized political affiliation. The collective’s members are engaged with anti-racist movements in Britain, migrant struggles in Germany, community-based education in London, New York City, and Los Angeles, and struggles for housing and just community development in East Los Angeles.
7 AFP//At the passing of four and a half minutes, the workshop organizer announced, “Time.” Then we asked, “What did you hear?” We noticed that this practice increased concerns with and discussion of the contexts within which people gathered to address the crisis.
8 AFP//Who speaks? Whose voice is amplified? What do we speak of and to whom? Who listens, and to what end do they listen? Who has a place at the table? Who determines who has a place at the table? And on whose behalf do those seated at the table speak?
9 AFP//The failure to address this hegemony perpetuates divides between those who circulate within the art world and those who do not. The only acknowledgment of this divide comes in the form of “audience development” initiatives based on liberal notions of inclusion.
10 AFP//When effective, constitutive protocols place experience in dialogue with principles and regulations. This is what I consider the most powerful use of protocols, which is when disciplinary and constitutive protocols form a contradiction or dialectic.
11 AFP//This led us to borrow the concept of “desire lines”—trails or paths carved out over time, usually emerging as shortcuts between destinations. In built landscapes, they break protocol with prescribed routes. In natural environments, they often reveal animal migrations, paths used across generations. Desire lines are always a record of behavior—lines of movement suggested by previous path-takers and followed by future path-takers. Apparently, we cannot all be trailblazers. We love to follow in each others’ footsteps.
12 AFP//Breaking protocol with accepted modes of behavior in public space can feel dangerous—especially given current and historical restrictions on sexual desire and, in particular, same-sex desire.
13 AFP//Freedom and desire mean different things to different people at different times. So one of the central tenets is the liberating notion that we don’t all have to agree. Of course, with a proposal
14 AFP//If I had been outside of my homeland, I then would have acknowledged whosoever’s territory I was visiting, as a political affirmation of their sovereignty and self-determination and a practice of respect.
15 AFP//Maria’s smile, though, was not protocol. There is no rule that Anishinaabe begin meetings, visits, or events with a big smile; if anything, our elders tend to show less emotion in facial expressions in comparison to Euro-Canadian or American culture. I experienced her smile as entirely Anishinaabe because it was contradictory to the colonial form of our encounter and the formality of artist talks and academic conversations.
16 AFP//we are not the first Indigenous women or artists to sit down and have a conversation about protocols. These conversations happen all the time around kitchen tables, on sidewalks, in galleries and studios, and in the bush.
17 AFP//I didn’t set out to break protocol; my intention was to expand our ideas around protocol or to place protocols back within the larger network of Anishinaabe ethics. If the intent of protocols is to show respect and create spaces where we could be our best selves, what happens when there is such rigidity that the protocol erodes our foundational values of consent, diversity, self-determination, and non-interference? What happens when protocol backfires and causes harm?
18 AFP//How can we break the cage of protocol and embody a deeper understanding of Anishinaabe ethics and values?
19 AFP//Anishinaabe life, to a great degree, is care work. Our foundational teachings, the Seven Ancestor teachings, in my area called the Kookum Dibajimowin, are not a set of laws or commandments, or protocols that we have to follow. Rather, they are a complex set of practices that, when embodied, both individually and in relation to other living things, create a world in which consent, accountability, problem solving, and kindness are embedded.
20 AFP//remember very early on in my career being out on the land with an Elder hunting geese. We shot one, and he had forgotten his tobacco. I remember wondering what was going to happen, because it is our practice to show gratitude through reciprocity, and normally this is done through an offering of tobacco. The Elder who I was with left a tiny bit of his baloney sandwich. When I asked him if this was going to be OK with the geese, he said “Of course,” because the gesture was thoughtful and would be seen by the geese as an expression of deep respect.
21 AFP//Avoid using protocol to demonstrate how much of your culture you’ve recovered and instead use our practices as a point of connection and to create belonging and nurture relationships.
22 AFP//It needs to go back to family and community, figuring out who you are, where you come from, what your family gifts, what your gifts are that you have to contribute, ‘cause they are not the same, and they are not always what we want them to be either.
23 AFP//An essential element of my practice is what I call spiritual fieldwork, or the process of developing relationships with the human and nonhuman entities of a particular place or field in tandem with gathering information.
24 AFP//I think time is an Indigenous currency, one that we especially lack in our capitalist society. Listening also requires that you be present, allowing what you hear to shape the process at every step.
25 AFP//When trust has been built, it is important to be aware of one’s limitations, not to overstep, and not to overcommit. Trust is maintained by keeping promises, contracts, and boundaries.
26 AFP//reciprocity takes shape in responding to calls for mutual aid at any level, and by doing so it supports collectivities through personal and professional interactions.
27 AFP//In all Indigenous cultures, there is a natural law, a model of the world in which energies fluctuate between different levels. Associated with this vision of perpetual energy movement is the protocol of pagamento, or payback, which is the need to act based on the principle of reciprocity, to always give something in exchange for what is obtained, be it something material or service of any kind.
28 AFP//The protocols I have shared here are not set in stone—they shift as I learn and grow, as society grows, and as the circumstances of our planet change rapidly.
29 AFP//Let us collectively recommit to center and sustain life through our diverse practices. Let us remember that we are all related and that our futures are intertwined.
30 AFP//Stay low to the ground. Stay nimble and mobile (shifting between places, scales, times, elements). Keep it trans-local. Attend to the lower parts of the body. Think with and of pregnancy, with and of forms of degraded trans*ition, transformation, metamorphosis. Use your nose.36 Follow the shit. Follow the power. Follow the money.37
31 AFP//I argue that this is the kind of approach we need as we think through the nexus of ecology, climate, and racism. This grounding approach does not take refuge in ideal theory (climate ethics) or abstract calculations of emissions (some climate justice) but rather gets down in the muck, in the matter of life and death, to think and be in ways that (to borrow from Wynter) are “down to earth.”
32 AFP//The behaviors that we think liberate us are based on the disappointments of the past and keep us constrained within the confines of colonial imaginations dispossessing us of our purpose and, ultimately, our freedom.
33 AFP//To choose the self without fixing, changing, guilting, or blaming, we also have to choose rather than deny, escape, or wish away the histories that made us. We have to embark on a new protocol.
34 AFP//Escapism is one of the various epigenetic expressions I carry as a descendant of enslaved Indigenous peoples. I have the ability to not be here now as a way of enduring the present and making my way toward the future. Afrofuturist narratives like the folktales of High John and Brerer Rabbit were an already-always part of me when I needed hope—a cartography towards freedom letting me know that other ways of being are possible and that I am not stuck here.
35 AFP//It does not honor our ancestors to create a binary construction of embodiment as celebration and disembodiment as problematic. We will not dismiss and flatten the narratives of escape.
36 AFP//Whether slow or fast, micro or macro, invisible or detectable, this unseen world is responsible for a deep interconnectedness across species, substances, and timescales.
37 AFP//if we think through our vast entanglements under the molecular semiosphere, there are no such categories. We are already alien.
38 AFP//These exercises produce what AiG calls “cultivating an art of combinations,” or an art of symbiosis that “recomposes the commons in an odd world.”10 Working with AiG was the moment I began to see the potential of biohacking and collective world-making and the possibility of neutralizing a deeply ingrained fear conditioned in us from birth. More importantly, I learned that only from this point of emancipatory
39 AFP//There is no hard separation, clear boundary, or final destination in the form of an apocalypse, and perhaps we should all stop hoping for one. There are only relations—entanglements that transform us every day.
40 AFP//We ask that, in entering this essay, you do not merely distill the offerings emerging from it for your needs and desires.8
41 AFP//Access as accommodation cannot truly value disability culture, joy, and knowledge of ways to live otherwise, as it is fundamentally a project of normalization that neutralizes the political world-building potential of access as it is and has been practiced between humans unmediated by vast organizational bodies. The ableist world is just fine as it is and surely everybody wants in, right?
42 AFP//Access-centered practices include protocols because certain needs are best met with consistent solutions (like ASL interpretation), but access overall can’t be reduced to protocols.43 When access practices are responsive to the nuance and mutability of needs, responsibility for access becomes collectivized into culture rather than held by experts or individuals with static roles in policy, protocol, and procedure.
43 AFP//Dependency and interdependency are where we materially and affectively meet: our needs are what connect us to one another, they bring us into the vulnerabilities of both love and harm.
44 AFP//These artworks hold the persistence and necessary creativity of access-centered life, embodying how disability justice organizer Mia Mingus’s concept of access intimacy comes out of (conscious or unconscious) praxis. Mingus emphasizes the possibility for access intimacy to occur instantaneously between people without shared experience or political identity. This intimacy need not be communicated linguistically, offering an intuitive, non-identity based, affective lens onto modes of relation beyond policy.48 Access intimacy centers the affective aspects of access essential to access-centered practice.
45 AFP//Within, we learn each other’s protocols (How do I inject you? When do you have to go to hospital despite the risks associated with being undocumented?). We cultivate practices of care that exceed what protocols encompass (What types of touch does my body welcome? Do you enjoy metaphors when I describe images to you? Who has space to host others?). Amongst, we fuck with policy—negotiate, circumvent, and refuse it. Work it, flip it, and reverse it.
46 AFP//The infrastructure and its limitations have predetermined the communication trajectory and centered the West as a hub through which all information moves, making the internet’s architecture political.
47 AFP//To Wood, Web3 is about building systems that don’t rely on trusting people, corporations, or governments to make moral choices, but that instead render evil choices impossible.”
48 AFP//By care-based internet protocols, I mean a set of rules and guidelines that prioritize the well-being of users, their privacy, and their security over other considerations such as convenience or profit. These protocols move us away from technical jargon and encourage access through consentful participation.10
49 AFP//Redesigning the collective timeline cannot be accomplished by a single, solitary voice or action, nor by a small group of individuals. It requires shared responsibility and agreement from multiple communities and their branching timelines. It calls for the collaboration of multiple forces from different times, spaces, and narratives.
50 AFP//participants were invited to create their own representations of space-time disentangled from racial capitalist patriarchy. They were encouraged to imagine and visualize a space-time that transcends oppressive systems and structures through a series of reflective questions exploring the aesthetics and sensory experiences of their alternative space-time, such as: What does it look, sound, smell, and taste like? Who is present within this space-time? How do individuals choose to act or refrain from certain actions? And most importantly, how do they feel within this space-time free from the constraints of racial capitalist patriarchy?
51 AFP//Protocols, resolutions, and practices are meant to be replicable and will be revisited at some collectively agreed-upon time and space.
52 AFP//That part of the thinking of Blackness in terms of Black studies is something other than the individual biography, individual greatness, or the individual artist being an individual genius. I think we’re all invited into something other than individuation in this symposium with the mode of artistic practices. Part of what I hear from Nadir’s cloud science is also a science of collectivity. That collectivity is a protocol for conducting science.
53 AFP//Each individual cloud, as you can see, it’s kind of chaotic. They all have their small differences, but it turns out that they actually have a lot in common. The best way to describe it is by thinking of them as one collective entity and describing their behavior collectively.
54 AFP//happening in the atmosphere is instantaneous from the point of view of the deep ocean; three to five years is nothing. When we’re thinking in terms of this deep climate time or this deep time, again, relative to a concrete change that’s happening here, the adjustment time here is invisible. It’s instant.
55 AFP//what if rather than remixing and repurposing existing protocols, we orchestrated new ones—protocols that, instead of summoning us into productive labor, compliant tool use, or compulsive consumption, cultivate a soundtrack for camaraderie or care or caprice? Can we imagine an alarm clock whose aubade, or morning song, awakens us into an otherwise world of possibility?
56 AFP//Each day, especially after I have taken photographs of the desk, I write in the notebook. How I have managed to do that all month takes me by surprise. I have never undertaken such an activity, habitually skirting through several notebooks as though incapable of regimen. I imagine this sudden focus has to do with five years of attempting to write a novel—novels, in fact, at one point, coming to forty thousand words—and failing to see the point, the throughline to connect story with imperative.
57 AFP//I was an active participant in the perpetuation of the protocols of that very culture, which I grew accustomed to over many years. These unspoken criteria applied not just to job interviews but to all kinds of curatorial closed-door meetings where we would discuss research, invite scholars to speak on certain topics, or discuss issues connected with exhibitions.
58 AFP//the particular role of the art museum as a tastemaker, gatekeeper, and arbiter of high-end culture has created the demands of a particular economic and cultural model and its intrinsic protocols that, as I will try to argue, are highly fragile and, because of their fragility, highly conservative in their financial and intellectual ambitions.
59 AFP//Once we step outside the metaphorical classroom, we put protocols in motion in order to welcome everyone into these encounters: we work across platforms; we adjust language, design, content, technology; and we insert periods of reflection and time to accommodate different time spans and evolutions in thinking.
60 AFP//Taking the topic of protocols at its most radical form of collective intervention, we had hoped to push the standards of peer review even further with this volume.
61 AFP//For this book, we decided to produce two separate versions and make them available. One is a designed PDF fixed layout—a version that mirrors the printed book and foregrounds the design as a protocol-related feature—and the other is an EPUB file that does not have many of the design features, but it includes all the text of the book while still being extremely accessible to assisted reading devices.
62 AFP//What we’ve learned from this volume is that a protocol—a form embedded in the origins of publishing itself as a medium—can be unbound from any particular monovocal convention.
63 PR//the modern burglar often understands the protocols of urbanism better than the insiders who are their nominal stewards. In a world that increasingly comprises protocols, power follows knowledge, not ascriptive authority.
64 PR//the hero of a protocolized world has mastered a general set of technological patterns that undergird not just the internal realities of organizations across the entire planet but even the interstitial spaces between them.
65 PR//what we might call the protocol punk hero operates from within a protocolized environment where boundaries separating insides and outsides are increasingly meaningless.
66 PR//the protocol punk hero, unlike the bureaucratic hero or the outsider maverick, is master of both smooth and striated spaces, and able to navigate both arborescent and rhizomatic epistemic environments.
67 PR//It is easy to miss the myriad invisible ways in which clock time structures our lives, from train schedules and norms of scheduling meetings to begin at half-hour boundaries, to the structuring of work and leisure hours by calendars with roots in ancient religions.
68 PR//Every successful protocol, arguably, is the result of successfully anticipating some sort of traffic jam, and presciently engineering mechanisms to manage the underlying tensions.
69 PR//Unlike the epic heroes of antiquity, or even cyberpunk heroes, protocol punk heroes are rarely lone wolves. Instead, they often exhibit remarkable social skills. Their uncanny protocol-whispering abilities often rest as much on social engineering skills as on technical engineering or architecture skills.
70 PR//major component of the work of protocol whisperers is to manage constantly shifting tensions at an ecosystem level, rather than within a single organization
71 PR//trusted relationships with allies on many sides of many active arguments
72 PR//a strong sense of the collective memory of an evolving commons.
73 PR//protocol design and architecture conversations, a truly remarkable amount of conscious and active attention is devoted to things like selection pressures, incentives, red-teaming, and modeling of emergent equilibria. Unlike the engineer in a private corporation, or the bureaucrat in a hospital or a government agency, the protocol whisperer must simultaneously think like an Organization Man, a central banker, a hacker, a market maker, and a military strategist
74 PR//Efforts to create the right engineered arguments are the exceptions. Playing to win is the norm. Playing to continue the game is rare.
75 PR//The pluralist infinite-game idea of a protocol as an engineered argument can be contrasted with a complementary “playing to win” definition of an API
76 PR//There are also non-human single points of failure (SPOFs). In a thoughtful critique, Moxie Marlinspike, co-creator of the Signal messaging protocol, pointed out the many SPOF vulnerabilities in the Ethereum ecosystem.14 In the worst cases, they can lurk unseen until they cause the unexpected fatal collapse of a valued protocol.
77 In well-managed protocols, SPOFs are broadly recognized, consciously managed, gradually mitigated, progressively moved to less and less critical loci, and in the best cases, eliminated altogether.
78 PR//When it comes to protocols, sticking to any kind of ideological hardline position cedes agency to those willing to participate in the engineered arguments. There is no winning move, and the only way to continue to play is to recognize that you’re not in traffic, you are traffic.
79 PR//Part 4, Living With Protocols
80 PR//is easier to reorganize the furniture in one’s house than to change the building’s structure or expand the site on which it’s built. Longer-term interventions in the built environment that adapt the base layers to new conditions are still worthwhile—they are as critical as ever—but, for individuals working at smaller spatial and temporal scales, the “software” (and the protocols that mediate it) may be a more fruitful domain of intervention than the hardware
81 PR//Today we build fulfillment centers, freeways, container ships, and supertall skyscrapers, all accidental monuments to the various protocols that utilize them, and equally impressive (but usually more esoteric, largely appreciated by the “protocol literate”). Unlike cathedrals and pyramids, the charismatic qualities of protocol monuments are likely to be incidental, a side effect of their primary purpose.
82 PR//As our world becomes increasingly automated, networked, and sensor-filled, our levels of awareness regarding the invisible interfaces, processes, and protocols through which computers comprehend our world will translate into a new awareness of physical space. Our digital literacy will enable us to retain a sense of effective agency as we design and navigate what is a new category of virtual worlds operating (through the assistance of automation) within the medium of physical space.
83 PR//To deal with limited memory and processing powers, we get used to things going well. The result: our brains only notice when things go wrong—when there is an event. We do not notice the non-events (i.e., the status quo, the day-to-day). But events and non-events are both consequences of human actions. No actions, no events. Action performance varies, putting the dynamic in dynamic non-event.90 Safety is a dynamic non-event. Talking about safety (and health) is difficult because it is a sustained absence of events, not an event itself.
84 PR//health protocols don’t have fast feedback loops, so adoption is challenging. From my experience, we operate more proactively when the risk is obvious, probable, and has the possibility of immediate harm. Safety issues trigger acute stress responses that encourage action. Anything beyond obvious risk requires empathy for a “future version of oneself” that is difficult to nurture. This can change via instrumentation, such as calorie, nutrient, movement trackers, and continuous glucose, heart rate, and sleep monitors.
85 PR//Following protocol involves several actions: perceive another person following protocol or receive instructions on how to follow the protocol; store the protocol in memory; and replicate the protocol. Errors can occur during any one of these actions. The primary way that protocols mutate is via such unintentional errors. A protocol is a type of meme: like genes, protocols reproduce using humans as hosts.
86 PR//The other two ways that protocols mutate is through tinkering and design.
87 PR//The three sources of protocol mutation, characterized by their pace and strength, are design, tinkering, and memetic error. They fall on a spectrum of pace and strength of mutation
88 PR//Protocol systems are always two things at once—individuals and a group. A bistable perception—individual versus system—is actually important in examining them. If we only think about the aggregated whole, we may overlook harms suffered by individuals within the system or problematic power dynamics masked by the continued functioning of the system. On the other hand, if we only focus on individuals within the system, we may miss emergent risks and benefits coming from the system as a whole.
89 PR//If there is a bad fit between your internal self and your role, you can suffer from a sense of compelled inauthenticity, or dysphoria, while if there is a good fit, and you authentically align with your role, you can thrive.
90 PR//If Pip has awareness of a protocol system, they are “seeing the water” that they swim in—the culture and world (protocol system) that surrounds them, shapes them, and constrains them. When aware, Pip sees the ocean they swim in, knows that other oceans and non-oceans exist, knows how they got into their ocean, and understands that the ocean currents affect their movements.
91 PR//Pip has awareness with regard to a particular protocol system if they know:
92 that they are entering, participating in, or exiting it;
93 that they play a certain role within it;
94 that there are alternatives to joining or participating in this particular protocol system;
95 whether they entered the system by choice or under the influence or control of others; and
96 that the protocol is influencing their thoughts and actions.
97 PR//Insight is about the depth of knowledge and understanding Pip has about a protocol system.156 Insight allows a person to make a meaningful choice about their participation and role within a protocol system.
98 PR//As we become more networked, opportunities for alignment and attunement technologies will become increasingly apparent. They present a possible path to support the success of swarms and other online formations while addressing platform business needs.
99 PR//A nascent sensibility defined here, orientation can be understood as a form of situational awareness that arranges knowledge in a selective and associative manner aligned with a particular purpose. Orientation enables navigation based on partial cues, feelings, and hints within an environment, without presuming complete situational awareness.
100 PR//Fixed, hard points across time that let us make the world more predictable.
101 We need these hard points because it is impossible to coordinate at scale without them. Money doesn’t work unless there is a degree of certainty it will still be valuable in the future. Trade is very risky if there isn’t confidence that parties will follow their commitments.
102 PR//Good rituals can liberate the individual—in the case of the artist—by helping them coordinate their actions towards their creative goals. Protocols are not just about constraints that are necessarily enforced at the cost of creativity and liberty; they can generate creativity and liberty, if well-designed and implemented.
103 PR//the art of protocol subversion looks more commonly like tai chi, where participants follow protocol, but in a way that better suits their needs. As Galloway proposed, “it is through protocol that one must guide one’s efforts, not against it.”
104 PR//Instead of resisting protocols, we ought to bring a greater awareness to their overall influence, so that we can make better decisions about which protocols we wish to be a part of and how we might live peaceably under their reign.
105 PR//Any sufficiently healthy world will spawn activity in peripheral forums where the protocol is discussed. It will spread and animate spaces outside itself. The life of the world is not only in the world. Looking for these spaces is an important and often overlooked world-assessment criteria.
106 PR//Protocol makers, know this: your protocol will die. It may become so inflexible that it must be discarded —“if the constitution is too rigid, it becomes necessary to kill the king”412—or the conditions around it may change so much as to become unrecognizable.
107 PR//to your protocol and whether they would withstand an existential question
108 PR//In The Timeless Way of Building, Christopher Alexander argues that patterns in architecture and the urban organization have a “quality without a name” that makes a house, a street, a town more or less “alive.” We perceive a place as alive when it is structured or organized to allow congruence within us—this congruence is the capacity to align us with our biological reality and natural desires, allowing those forces to move freely.
109 PR//Flourishing requires the cultivation of character, which almost always requires that we examine the systems to which we are beholden and that we break with our narratives and frames. This requires us to take responsibility for our own development—a mindset at odds with mindlessly following a protocol. Like bad habits (which are, after all, effective habits), effective protocols make it easy for people to continue following protocol.
110 PR//order to pursue flourishing, one must take responsibility for one’s actions and life—if participants are disposed by the protocol to reject responsibility, and if the protocol forms a significant part of their life (say, as a social, cultural, or religious protocol), then flourishing is hindered
111 PR//In some situations, all that is needed for the emergence of a good protocol is the recognition and diffusion of good solutions that are also easy to imitate.
112 PR//Good protocols learn, grow, and mature in ways that catalyze thoughtful stewardship and sustained generativity. Bad protocols on the other hand, if they avoid early mortality, tend to become increasingly neglected over time, leading to extended periods of sterility and stagnation, and succumbing to capture and corruption.
113 PR//Good protocols seem to strike a robust balance between ensuring order at some loci, and inducing serendipitous creative chaos at adjacent loci. As a result, within their sphere of influence, they create conditions of exceptional serendipity, or at least significantly reduced malevolence,
114 PR//good protocols seem to thread the needle between too much and too little automation, and too much and too little room for discretionary governance decisions, stabilizing at the right level for their circumstances. They are sufficiently stewardable.
115 PR//consideration of trade-offs, costs and benefits, and thorough evaluation of designs, leading to good engineering outcomes. They are neither so underconstrained that arbitrary tastes can drive outcomes, nor so overconstrained that there are no good solutions to problems at all. Instead, they encourage a search for opinionated but principled solutions to core problems
116 PR//areas in the study of protocols, and the one that comes closest to rising to the level of a science. Our ability to design and build better protocols is strongly driven by the quality of our understanding of fundamental limits, and cultures of tastefully opinionated leadership for navigating them
117 PR//A feature common to protocols and adjacent categories such as APIs, grammars, or rules, is their relationship to literacy. Every protocol, arguably, is by definition also a literacy that takes effort to acquire and practice. The value of a protocol is a strong function of the ease with which participants can acquire literacy and fluency in the behaviors it codifies.
118 PR//An effective culture of literacy around a protocol ensures that all participants have the skills necessary to safely and productively participate in it. Mass or retail participants must have sufficient literacy to use protocols safely. For example, pedestrians and drivers must understand and respond to traffic signals. Expert participants and stewards must have enough literacy to govern the protocol and evolve it in the face of changing circumstances and evolving domain knowledge. Creating and sustaining a broad-based culture of literacy around a protocol is a non-trivial task, but is often underestimated, and either treated as a promotional task, to be handled alongside marketing or public relations, or a matter of foolproof user-experience design.
119 PR//Good protocols are not just sufficiently learnable, they are sufficiently hackable to do without formal educational institutions, especially early in their histories.
120 PR//This ludic quality is arguably essential for meaning-making, and is conceivably the spiritual essence of protocols.
121 PR//Good protocols, arguably, are sufficiently ludic to serve as engines of meaning-making beyond their nominal functions, while also fulfilling their nominal functions.
122 PR//surprisingly many protocols manage to survive early mortality threats and achieve equilibrium states where they are sufficiently defensible to function anyway, even if in significantly diseased conditions. Surprisingly small groups of well-positioned stewards can keep established and critical protocols going long past the point where critics predict they should have succumbed to their varied apparently fatal vulnerabilities.
123 PR//While protocols can be hard to kill, and sufficiently defensible against their threat environments, they are neither impossible to kill, nor naturally immortal. They are sufficiently mortal that they do not persist indefinitely, choking the domains they organize. The League of Nations, which preceded the United Nations, is an example of a geopolitical protocol that died after it failed to fulfill its functions in the 1930s.
124 PR//Standards-making, it turns out, is high-leverage design, ripe with the ability to change the technological playing field in ways that no individual firm can on its own. It’s like finding the control room of our modern world.
125 PR//best way to learn how to work with standards is by studying how they’ve evolved over time.
126 PR//true standards movement must be rooted in the fundamentals. The idealism can’t outweigh the pragmatism
127 PR//My professional focus has been, as long as I can remember, about designing for comprehension. That is, understanding what’s going on in one’s surroundings, how things in the world work, and effective ways of thinking and talking about it.
128 PR//need to get more people model-literate, which means an order-of-magnitude (or two) increase in the efficiency of uptake. We need to figure out a way to bulk-load models into people’s heads, simultaneously bringing the cost down and the salience up so it becomes something people perceive to be worth doing
129 PR//Instead we need to adapt and extend the existing protocols to the internet and its engaged communities. A first step is acknowledging the deep bench of untapped talent.
130 PR//major lesson of cryptocurrency protocols is that when you design something with a trust-minimized architecture, people approach it with a mercenary perspective
131 PR//Exploration involves trying out new options that may lead to better outcomes. Exploitation involves choosing the best-available option based on exploration. Finding the optimal balance between these two strategies is a crucial challenge in many decision-making situations, where the goal is to maximize long-term benefits.
132 PR//Protocols are designed in reaction to some troubling condition rather than being conceived of independently from their environment. This argument is more obvious for some protocols than for others.
133 PR//stating that protocols are conservative is not a political assertion. This statement does not challenge the value of preservation and conservation during periods of undeniable turmoil. The intention of highlighting the backward-oriented nature of protocols is merely to underscore—as some of the researchers did—that these tools often possess their own agency. They assert their temporal logic upon anything we endeavor with them, especially where there is no conscious reflection on their use.
134 PR//value can oscillate quickly into costs and at such a magnitude that even precious systems must have a stop. This poses the question of how to shut the thing down, and who should make the decision to do so. While the options that have predominated up to now involve highly centralized control of the killswitch protocol, this form of engineered system death is also the least interesting from a systems engineering perspective because it boils down to designing a killswitch that a concentrated authority can exercise
135 PR//Whereas the Linux kernel doesn’t produce anything for users until distros add their features, running Ethereum software produces a usable artifact right away.
136 PR//The protocol system conveys the people and their relationship to data, spaces, and other people, describing it as a “role in a box” with different preset levels of access, permissions, and incentives to represent and augment the organization.
137 PR//The interoperability allows for a seamless transfer of users and data between apps and cities, while the composability comes into play when any aspect of the protocol becomes shared infrastructure that can be combined together or taken apart.
138 PR//“Copying was such a taboo back then, less so in the software world, especially in open-source, but outside of those bubbles it wasn’t considered acceptable. People were still romanticising the idea of the lone genius or decision-maker,” recounts Das.
139 “It wasn’t until we were forced to work together during the collapse that folks realized ideas were meant to be shared and modified; that it was ok to edit and improve upon them.
140 PR//Without a critical capacity, it becomes difficult to keep the checks and balances averaging. Furthermore, the whole system relies on trust. Without it, the IOU-based system fails as people become unsure if the value they’ve given to others will be returned when they’re in need.
141 PR//The study showed there were some conditions to the benefits of diversity, however, which only began to take effect when at least four functional groups or different plant species were present and increased as the number of plants in each species increased. When this minimum diversity threshold was met, researchers saw it triggered a change in the behavior of the fungal network that supported the nutrient and water uptake of the plants towards mutualism, rather than competition or parasitism seen in less diverse and dense plantings.
142 PR//The je ne sais quoi of protocols, after all, is an ineffable quality of openness,
143 PR//Beyond hardening our activities against capture or co-option by narrower agendas, and doing our best to articulate, in honest but unapologetic ways, the opinionated tastes we are bringing to our curation and catalysis efforts, we aim to keep our role small and limited, and indeed, shrink it over time.