Part II — The Citizen Layer
Derived from Axioms 1 (sovereignty), 7 (verifiability), 12 (subsidiarity), 14 (minimal complexity), and the consent precondition of §0.2. This is how a real person becomes a verified, sovereign participant — without the system becoming a surveillance state.
The Citizen Layer is the base of the whole model: the mandate (Part III) and verifiability (Part VIII) are only as trustworthy as the answer to "is each participant a real, unique, eligible person, freely expressing their will?" Getting this right — securely and privately and inclusively — is the hardest single engineering problem in the design, so it is specified first.
II.1 Secure digital identity — the foundation
Every citizen has a state-guaranteed digital identity that proves three things and no more: that they are real, unique (one person, one identity — sybil-resistant), and eligible for a given action. The design is governed by four hard requirements that are normally in tension; a 10/10 solution must satisfy all four:
- Sybil-resistant — impossible to manufacture fake or duplicate citizens.
- Privacy-preserving — the state can verify eligibility without learning what you did. Identity must not become a single key that links all your activity. This is forbidden by the privacy/data rights in §I.3.
- Inclusive — works for citizens without smartphones, without internet, with disabilities, and offline (Criterion 12). No one is excluded by the technology.
- Verifiable — any citizen can confirm the system is behaving correctly (Axiom 7).
The architecture that achieves this (detailed in Part VIII):
- Separation of powers, applied to data. The body that issues identity is institutionally and technically separate from the body that records votes or delivers services. No single database links a person to all their actions.
- Zero-knowledge eligibility proofs. A citizen proves "I am an eligible voter who has not yet voted" without revealing who they are. Cryptography lets the system check the claim without storing the link.
- Unlinkable credentials. Separate, non-correlatable credentials per domain (voting, services, participation) so activity cannot be aggregated into a profile.
- Citizen-held keys, state-backed recovery. The citizen controls their identity; a robust, abuse-resistant recovery process (multi-party, audited) prevents permanent lock-out without creating a master backdoor.
- Mandatory offline equivalent. A physical credential and in-person process that delivers the same rights as the digital path. Digital is a convenience, never a gate.
Forbidden by design: a single, linkable national ID that tracks citizens across all activity. That is the surveillance-state failure mode, and §I.3 makes it unlawful. The identity layer proves eligibility, not behaviour.
II.2 The franchise — who participates
- Voting age: 16, paired with mandatory civic education (§II.6). Why: 16-year-olds are bound by the state's decisions for the longest, are old enough for considered civic judgement (Scotland and several democracies already enfranchise them), and earlier enfranchisement raises lifelong participation. This is a deliberate 10/10 choice favouring intergenerational fairness (Axiom 13).
- Eligibility: citizenship + a residency/registration test, verified once via the identity layer; automatic registration (the state knows who is eligible and registers them — non-registration is a state failure, not a citizen's).
- Minimal disenfranchisement. Because power flows from the people (Axiom 1), removal of the vote is exceptional, never automatic, and never a tool of punishment beyond narrowly defined, Court-reviewable circumstances.
II.3 Three modes of participation
The people exercise sovereignty through three complementary channels, each chosen to cover the others' failure modes:
| Mode | Mechanism | What it is good at | Its failure mode (covered by the others) |
|---|---|---|---|
| A. Periodic election | The reformed electoral system (Part III) → Representative Assembly | Stable, accountable representation; setting law/priorities | Can drift from public will between elections |
| B. Direct democracy | Referenda on values & constitutional questions; bounded citizen-initiative | Direct consent on fundamental "ends" | Vulnerable to heat, money, disinformation, tyranny of majority |
| C. Deliberative sortition | Citizens' Assemblies chosen by lot, demographically representative, paid, expert-briefed, deliberating over time | Considered judgement on complex value trade-offs; immune to electoral incentives and capture | No standing mandate; advisory unless constituted |
The key innovation: combining election (B legitimacy + accountability) with sortition (immune to campaign money, lobbying, and re-election incentives). Election and lot are the only two legitimate ways to select people for power; using both, each checking the other, is stronger than either alone. The standing Citizens' Sortition Chamber is constituted in Part IX as the second chamber.
II.4 Bounding direct democracy (so it is consent, not mob rule)
Direct democracy is powerful and dangerous. It is bounded so it expresses informed, considered consent (§0.2) rather than transient passion:
- Rights-checked. No referendum or initiative may breach Class A rights or target a minority's qualified rights — the Court screens proposals against the Charter before they go to vote.
- Deliberation required. A mandatory cooling-off + Citizens' Assembly review precedes any binding referendum, so the public decides after deliberation, not in a flash of feeling.
- Thresholds for initiative. Citizen-initiated proposals require a meaningful, geographically distributed signature threshold (verified via the identity layer) to prevent narrow or astroturfed capture.
- Truthful-information duty. An independent public-information function (§II.5) must publish a balanced, fact-checked brief to every voter before the vote.
II.5 Civic information rights — the precondition of informed consent
Consent obtained through ignorance or deception is not consent (§0.2). Therefore:
- Citizens have a right to truthful information from the state (§I.3) and to the reasoning behind decisions.
- An independent Public Information function (constituted under the Integrity Assembly, Part VI) provides balanced, evidence-based briefings before every vote and publishes a continuous, neutral account of what the government is doing and why.
- Counter-disinformation is handled by transparency and verifiability, not censorship (which would breach §I.3 expression). The state floods the zone with verifiable truth and provenance; it does not decide what citizens may say. (Mechanism in Part VIII.)
II.6 Civic education
A standing, non-partisan civic-education entitlement: how the system works, how to verify it, how to reason about evidence and trade-offs, and media/disinformation literacy. This is the enabler of the age-16 franchise and of Criterion 1 (informed legitimacy). It is curriculum-independent of the government of the day (overseen by the Integrity Assembly) so it can never become state propaganda.
II.7 Inclusiveness — no citizen excluded by the technology
Criterion 12 is a hard requirement, not an afterthought:
- Every digital civic action has a fully equivalent non-digital path (in person, by post, assisted).
- Accessibility (disability, language, literacy) is built in, not bolted on.
- Digital exclusion never reduces a citizen's rights or weight; the offline citizen is a first-class citizen.
II.8 Failure modes and safeguards
| Failure mode | How it attacks | Safeguard in this model |
|---|---|---|
| Surveillance creep | Identity becomes a tracking key | Data separation + zero-knowledge proofs + unlinkable credentials (§II.1); §I.3 privacy rights enforced by Court |
| Sybil / fake citizens | Manufacture duplicate identities to stuff votes | Uniqueness at issuance; cryptographic sybil-resistance; independent audit |
| Identity lock-out | Citizen loses access, loses rights | Abuse-resistant multi-party recovery; mandatory offline path (§II.7) |
| Digital exclusion | The non-digital are disenfranchised | Fully equivalent offline path; automatic registration; first-class offline citizen |
| Mob-rule referendum | Heat/money/disinfo drive a rights-breaching vote | Rights pre-screen by Court; deliberation + cooling-off; truthful-information duty (§II.4) |
| Astroturfed initiative | Narrow/funded interest fakes grassroots demand | Verified, distributed signature thresholds (§II.4.3); funding transparency (Part III) |
| State propaganda via "civic info" | Government captures the information function | Independence under Integrity Assembly; balanced-brief duty; transparency not censorship (§II.5) |
| Coercion / vote-buying | Pressure or pay people for their vote | Secret ballot guaranteed cryptographically (Part VIII); receipt-freeness; offence with audit trail |
Part II ends. Next: Part III — The Electoral System.