← The Rulebook Part VIII

Part VIII — The Digital & Technological Layer

Derived from Axiom 7 (end-to-end verifiability), 9 (resilience), 11 (anti-capture), and the privacy/data rights of §I.3. This is the substrate beneath the whole model. The premise of BIG — "given all technological advances" — lives here, governed by one rule: technology serves the model; it never governs.

VIII.1 Principles for governing technology

Every system in this layer obeys, without exception:

  1. Open and verifiable — all governing-critical software is open-source, independently auditable, and reproducibly built (§VIII.8). No black box decides anything about a citizen.
  2. Privacy by design — data minimisation and unlinkability are defaults, not options (§I.3).
  3. Resilient and offline-capable — graceful degradation and paper fallback are requirements, not extras (Axiom 9).
  4. No single point of failure — of code, key, vendor, or datacentre.
  5. Security as a first-class property — assume a nation-state adversary (§VIII.6).
  6. Human-accountable — technology advises and verifies; humans decide and answer (§V.6).

VIII.2 Secure identity and authentication (the §II.1 architecture, technically)

VIII.3 End-to-end verifiable voting (E2E-V)

The hardest problem in the model, and the one where honesty matters most. The required properties:

Honest engineering boundary (required by §0.6's "no design that only works in ideal conditions"): remote internet voting at national scale remains an unsolved problem for coercion-resistance and client-side malware. Therefore:

VIII.4 The transparency ledger (technically)

A public record with these properties (specified as properties, not products — no dependence on any single technology or vendor):

VIII.5 AI and computational decision-support (technically)

Implementing §V.6:

VIII.6 Cybersecurity and the threat surface

The digital layer is the highest-value target in the country; it is defended accordingly:

VIII.7 Data sovereignty and privacy

VIII.8 Open-source and verifiability mandate

VIII.9 Resilience and offline operation (technically)

VIII.10 Failure modes and safeguards

Failure modeHow it attacksSafeguard
Vote malware / coercionCompromise clients; buy/coerce votesE2E-V + receipt-freeness + software-independence + paper + RLA (§VIII.3); remote voting bounded
Identity database breachSteal/forge identities; build a surveillance graphSeparated, unlinkable, ZK design — there is no central graph to steal (§VIII.2)
Ledger tamperingRewrite the public recordTamper-evident + independently replicated across custodians (§VIII.4)
AI bias / opacityUnfair or unaccountable automated outputsPublic register, bias-testing, explainability, no autonomous power (§VIII.5)
Nation-state cyber-attackDisrupt or subvert the digital stateAssume-breach, formal verification, red-teaming, supply-chain security, fallback (§VIII.6, VII.6)
Vendor lock-in / black boxPrivate control of governing codeOpen-source + reproducible builds + no critical lock-in (§VIII.8)
Surveillance creepAggregate data into a profile of citizensUnlinkable credentials; data minimisation; §I.3 enforced by §VI.4
Tech outage disenfranchisesOutage blocks voting/servicesPaper/manual fallback delivering identical rights; distributed architecture (§VIII.9)
"Convenient but insecure"Ship remote e-voting that can be riggedHonest engineering boundary; verifiability never traded for convenience (§VIII.3)

Part VIII ends. Next: Part IX — Separation of Powers & Checks, which arranges all these institutions so that no branch — including the new ones — can dominate.