THE USER NETWORK- WHITEPAPER
A STRATEGY FOR THE USER TO CONTROL VALUES
WITHIN THE COMPUTATIONAL ENVIRONMENT OF WEB 3 AND ARTIFICIAL INTELLIGENCE
by J. Wayne Slade
Abstract:
This whitepaper proposes a strategy for Users to control and manage their values with computational systems. The paper outlines the challenges of the User to navigate user capture and describes how values are misaligned in current systems. Web 3 and AI provide a pathway for the User to express and control values, however this path is far from built and the User needs assistance to build protocols and tools which provide the User computational control. The paper proposes the formation of a decentralized open-source community, the User Network, which acts as a value layer and User advocate which exists to develop the necessary protocols and tools to provide User controls. The paper concludes by presenting case studies and potential applications for the User Network.
1. Introduction
The development of computational systems is no doubt one of humanity’s most impressive achievements to date. However, the trajectory on which software technology is used toward the benefit of humanity requires correction. Most advancements have focused on novel applications of software based on product-market-fit. Some advancements are a benefit to society; however, some software applications have amplified social conflict and are not beneficial to the society or the Individual aka User. A vast economy has been created by the ability of computational systems to create financial value from scratch. The software economy has created large corporations and power structures which have captured the User’s computational experience. Centralized platforms prevent the User from controlling their values. Instead, the values of the platform or system are prioritized. For the User to take control of their values, a new computational environment is required. An environment where the User retains self-sovereignty when interacting with systems. If the User can regain control over their values in the digital environment, perhaps the Individual can exercise more control and self-sovereignty in their physical environment.
2. Misalignment- Incentive Structures and Capture
To date, value alignment is often used to discuss AI systems, however, it is useful to apply value alignment when discussing User interaction with all software systems. Value misalignment between Users and software is the core cause for much of the User’s conflict created by current systems and is often caused by misaligned incentive structures and capture.
Misaligned incentives can easily be seen when analyzing current Web 2 platforms. Users are subject to the protocols of the platform on which they are operating. The corporations which operate the platforms are motivated by the financial values of the shareholders. The incentive structure of a corporation is to increase quarterly profits, which for big tech equates to monopolizing user attention. Platform algorithms are then used to increase user engagement, which optimizes addictive content, which in turn contributes to the amplification of psychological distress and social conflict.
Even when analyzing new software products, the current software market and incentive structures around venture funding are misaligned to the User. The primary driving variable of product-market-fit does not consider User values or User well-being.
Misalignment in Web 3 is more subtle but still prevalent. Although most blockchain communities start with noble ambitions and build valuable tools to benefit the User, over time the value of the community’s token takes priority, and the incentive structures of the community are to increase the value of the token. The User’s values take a back seat.
Capture is another aspect which leads to value misalignment. When a system is captured, the capturing entity enforces their values over the values of others. Capture is a problem which has plagued humanity since recorded history and before. The recent pandemic exposed the extent of capture across government agencies, corporations, and even scientific institutions. In the computational environment, capture generally takes the form of organizational capture and regulatory capture. A corporate executive can capture the system by inserting their personal values in the corporate controlled platform or system. Individuals of political influence can capture a system, as shown by the historical exposure of Twitter and the more recent example where influence was placed on Meta by politicians to sensor content and Users. Regulatory capture provides another scenario where corporations and individuals in government undermine the Users they are supposed to protect.
In order for the User to overcome the problem of misalignment and capture and freely express and control their values, a new paradigm is required in the computational environment.
3. The Prospect and Shortcomings of Web 3
The emergence of blockchain technology has provided the foundation for a new type of Internet, Web 3. Blockchains have shown to be a valuable tool for the User, with decentralized systems which provide a method to communicate and verify data. It is very difficult to undermine and capture these systems, especially as they mature. Cryptocurrencies are the first successful use of blockchain, a groundbreaking achievement to allow Users uncensored control over financial values. With blockchain as the backbone, Web 3 has fostered a growing ethos of user self-sovereignty and system decentralization. Web 3 is a dramatic shift, providing a path for the User to control values as opposed to the Platform or System. This new internet environment offers significant benefits and new trajectory for the User, but the problems of misalignment and capture discussed above are not fully solved in Web 3.
Protocols and tools which allow the User to express and control values across all systems do not exist. Blockchains alone are not a cure-all solution. Furthermore, the User has new problems in Web 3, such as interoperability and value management.
4. The Interoperability Problem
Currently a variety of blockchain communities are emerging, each with unique characteristics and differences. It is not obvious that any one blockchain will be the winner. It is likely each blockchain will provide different solutions, meet different needs of the user environment, and continue to evolve. It is also likely the User will still need to navigate systems which are off chain such as emerging AI systems and will need the ability to express values in both environments. It is beneficial to the User to have access to a diversity of evolving systems. However, with a diversity of systems, interoperability becomes a complex issue for the User.
Some blockchains are creating bridges and interoperable chains such as Cosmos or interoperable protocols such as Chainlink, however, the User is still limited to which blockchains communicate and the Web 3 environment is still very difficult to navigate between applications. Often the User must download and manage dozens of wallets and protocols to access different applications and chains.
Several Web 3 projects are creating value management protocols for the User, however, many of these technologies lack interoperable functionality across all systems. Interoperability is a difficult problem, and as Web 3 continues to grow and evolve, interoperability is expected to become even more complicated.
5. The User Value Management Problem
Although Web 3 has developed valuable tools, the User still needs help with the problem of incentive structures and value management. Many are calling this the UX/UI problem of Web 3. Since the problem is more broad than conventional UX/UI, this whitepaper discusses the problem from the lens of value management and value alignment.
For the User to express and manage their values in the computational environment a diverse toolkit is required. The Web 3 toolkit is incomplete and difficult to navigate for the User. For example, protocols around identity, proof of humanity, and personal data are emerging, but similar to different blockchains, it is not obvious that any one protocol is the winner. The User needs the ability to access all the different protocols in a seamless and interoperable manner across all systems.
There are also protocols which still need to be developed around User values. The User needs protocols which allow the User to control and filter content, determine value alignment, and reputation protocols to determine malicious systems on-chain and off-chain.
Many of the new AI systems and agents will be partially or wholly off-chain. The protocols and tools being developed in Web 3 are primarily on-chain, and the current stack doesn’t incorporate off-chain AI systems or know how to integrate the AI stack on-chain. The User needs assistance in knowing which agents and systems to trust and which ones are gaming the User
6. AI- A New Problem and A New Solution
LLMs and soon-to-come General Intelligence models will exponentially accelerate the evolution of computational systems, providing the User with powerful tools and also creating more complex problems. With malicious AI systems, it may become easier to capture and game the User.
Because AI will introduce entropy to the User’s computational experience, it will increase complexity around the User’s problem set but will also provide a unique opportunity for the User. AI is going to completely change the computational landscape. This delta moment creates a window to build new computational scaffolding. If the User can express and control values within the new scaffolding, perhaps the User can take control of their computational paradigm.
The same AI technology which could dramatically harm humanity may also be the technology which could most benefit humanity.
7. User Value Layer and User Advocate
For the User to overcome the problems of capture and misaligned incentive structures, a new layer to the computation experience is necessary. A layer whose primary function is to allow the User to express and control values. If the User’s values are not a controlling variable within the computational stack, it will always be the System or malicious Users who obtain control. The current environment requires the User to bend to the rules of the System. By introducing a User Value Layer, it will require the System to bend to the values of the User. Only when the User’s values can be expressed, protected, and prioritized can the User be fully self-sovereign and find alignment within the System and with other Users.
The current computational environment is complicated, and only likely to get more complicated. To build a User Value Layer in a way which is sophisticated and evolves to the changing environment, the User needs assistance. It’s not just a few protocols or tools needed. The User needs a community of experts and advocates across a multitude of computational landscapes whose primary fiduciary responsibility is to the User. A fiduciary community who cannot be captured and undermine the values of the User.
To fulfill the role of User advocate and provide a path to build a layer of protocols and tools for the benefit of the User’s values, this whitepaper proposes the formation of The User Network.
8. The User Network
As its core mission, the User Network is an open-source community to develop protocols and tools for the User to express and control values in computational environments. The protocols and tools created by the community provide a User Value Layer between the User and the System. The layer consists of a diverse toolkit of in-network protocols, trusted 3rd party protocols, APIs, and in-network agents which allow the User to communicate values with the Systems. When the User interacts with dApps, AI agents, outside networks, or web sites, the Network selects the protocols, APIs, or in-network agents which interface between the User’s values and the System, as shown in the Network Overview.
9. Incentive Structures and Tokenization
To build a community which is both a fiduciary to the User and rewards contributions, the Network will create a market to monetize open-source development. The Network will tokenize User values and distribute tokens to the community based on contributions. Tokenization of User values creates an incentive structure around the User which currently does not exist outside the current market structures of software technologies and existing open-source communities. The in-network market provides the framework to develop protocols to benefit the User which might normally fall outside the parameters of product-market-fit. The Network has its own market where User values determine in-network product-market-fit.
The in-network market creates an environment of competition, so the Network is always organically looking to create better protocols and tooling around different User values. The Network also provides framework for cooperation and collaboration. Contributions are tracked on-chain, and since developers will share contributions they will be rewarded if the overall aspect of the project becomes monetizable. Others can collaborate where contribution is needed. A modular architecture incentivizes the Network stack to grow both vertically and horizontally.
Network contributions may be in the form of writing code which is beneficial to the Network stack. Contributions can also take the form of ideas. Ideas are more powerful than the code itself so the Network rewards all contributions which contribute to the User Value Layer and improves the Network. All ideas submitted to the Network are tracked and attached to the submitting Users. Users receive tokens when the idea is implemented and used by the Network.
Users can also earn tokens as validators. Validators take on the role of conventional blockchain validation but also check to see if the User value being validated accurately represents the value with human-in-the-loop levers. (An example of validators in the User Network is comparable to Reputers in the Allora Network.) User Validators can contribute to community consensus to determine whether a Network transaction aligns to the User value as shown in the Network example.
10. Network Organization
To create a network which is resilient to capture and allows proper incentive structures, the proposed organization is similar to blockchain communities with two components: a non-profit foundation and a for-profit lab.
The Network Foundation is an advocate for the User and is only beholden to the User. The primary goal of the Foundation is to help the User navigate their computational environments through protocol development. User well-being is the lens through which the Foundation makes development decisions with a primary focus on the individual human User. The Foundation determines and monetizes the values of the User within the in-network market to optimize and incentivize the community toward User values which are most beneficial to the User. The Foundation creates and evolves community policies, token policies, and token distribution.
The Network Lab is the for-profit arm which looks to implement tooling of the foundation protocols within the context of the in-network market and exterior markets. Where the goal of the Foundation is to develop protocols and tokenization optimized for User well-being, the goal of the Lab is to create and out-source tooling for the benefit of the Users which provide a path toward product-market-fit. To effectively launch the Network, the two groups will complement each other. The Lab will need the Foundation as a protocol layer, and the Foundation will need the Lab to develop meaningful tools with user utility and market adaptation, otherwise the protocols will be of little use to the User.
The following are examples of case study projects for the User Network:
11. Protocol Use Case- Identity
To articulate the role of the User Network, this paper will discuss User identity as a use case. Currently it is challenging for the User to easily manage Web 3 identity. There are several protocols emerging around identity such as Disco, Unstoppable Domains, and Polygon. Each protocol provides the User some solutions around identity. Other protocols such as Ceramic provide solutions around how the User wishes to share data around identity. However, the typical User may not be aware of these protocols, does not understand the value they provide, or know how to effectively use them.
The User Network would synthesis and create protocols which allow the User the ability to easily control and manage identity. If new protocols emerge around identity, the User doesn’t have to search them out. The Network will provide a protocol path for User integration and an environment where identity protocols evolve and improve.
As a case study example, the Foundation could start by analyzing what identity values are important for the User, then determine what values are provided by existing protocols and what protocols are needed. The Foundation might determine the User needs protocols to manage identity avatars and so the User can assign different values to different avatars. Protocols would then be developed to provide the framework for avatars, the values for each avatar, and avatar management.
AI might also provide valuable tools around User identity and become an import part of the identity stack. For example, AI models can track patterns around a User’s behavior and part of identity could be determined by User pattern recognition.
The User Network protocol architecture would provide a way for the User to incorporate existing protocols and the framework on which new protocols could be built upon. In this manner, a collaborative approach would allow for identity protocols to grow and evolve. The Foundation would always be looking for ways to improve upon user identity. When a future innovation is made around identity, whether developed by the in-network Lab or by others, the Foundation would revise protocols and incorporate new technologies which would benefit the User.
12. Case Study- Browser and dApp Extension
An immediate need for Users is the ability to seamlessly communicate values in an interoperable manner on both Web 2 and Web 3 applications or dApps. As a potential project the User network would provide a single extension for the User to connect to browsers and dApps. The extension would provide protocols and tooling for the User to manage all values with a single experience. Value management would include identity, wallets, content filtering, data sharing, and monetization.
When the User connects to an application, the User would control which identity setting or avatar to use. For some applications the User can choose whether to pay a subscription or allow ads. Content controls would allow the User to control the type of ads they view. Default settings will allow a seamless interaction which would allow Users to set defaults for different types of dApps.
Wallet protocols and tooling would allow a seamless integration for connecting all wallets. The extension would determine which wallet to connect to the dApp automatically. Wallet tooling would also allow for key management. The User would have the ability to use key management tools at their discretion and choose between a variety of trusted wallet management protocols.
Users will be able to control what data to share and what to keep private. With some dApps the User may receive compensation for sharing data. The User may also participate in monetization for using a dApp or interaction within a dApp or an iOT device. Protocol management and tooling would provide monetization if the User has a certain amount of followers, possesses certain NFTs, etc. User values such as friends, followers, NFTs will follow the User between dApps.
Although the motivation for the extension is to allow the User to express values, the extension would also make it easier for developers of applications to interface with the User. The extension would be compatible with several language protocols including Java. As an example, a Java developer could write a Web 3 application with no need to learn Rust or Python nor be technically versed in blockchain. The APIs and protocols behind the extension would also make it easier for AI-powered software generators to build web sites and dApps without getting “stuck”.
13. Case Study- Value Alignment Research and Reputation Protocols
Many are concerned about the impact and influence of artificial intelligence systems being used for malicious activities. As these computational systems become more powerful, their ability to influence the User is greatly amplified and present a viable risk. Two strategies to protect the User are regulation and tooling.
The effort to regulate AI systems is very challenging. Different jurisdictions will regulate AI differently and will make it almost impossible for a comprehensive regulation strategy to protect the User. Malicious Users of unregulated AI systems will easily bypass regulators in an international environment. Regulation is also likely to lead to more centralized systems which are more prone to capture and misalignment.
A more plausible solution to protect the User against harmful AI systems and malicious Users is to provide the User protocols and tooling to allow the User controls over the systems with which they interact. The User Network will provide the User with such protocols and tools. The Network will synthesis development of reputation protocols and tooling to monitor system output. By allowing the User to express values in a system and providing the User with tooling to monitor system output, a path toward value alignment might be achieved. A path which puts alignment within control of the User not the System. This path may provide a plausible solution for the AI alignment problem.
In this environment where the User has control of their values, it provides the most beneficial AI environment for the User, one which involves many decentralized user-controlled systems working toward aligned goals. In this manner, user-controlled AI systems can work together to identify malicious Users and harmful systems. Collectively, users can avoid interaction with such systems. It will be difficult for a system to harm a user if the User does not interact with the system. To interact with the User, the System must build trust with the User. The Network will assist the User with tooling to determine whether the System can be trusted and whether the System output aligns with the User values.
The contrary approach is an environment of centralized AI systems in a partially regulated environment. In this environment the User will not have the ability to fully control their values and the User will be limited to the systems with which they interact. This will inevitably lead to capture, misalignment, and exploitation of the User.
With the proper protocol environment, not only will the User be able to manage system influence but will be able to optimize systems to their benefit. When AI systems are tuned with user-controlled value alignment, systems can be optimized to help and improve the User. For example, if optimized for user well-being, AI agents can effectively take on the role of user coaching applications or wellness optimizations which may contribute and improve user mental health, social interactions, productivity, and career trajectory.
Conclusion:
If successful, the Network will provide a path for the community to build a User Value Layer across a diversity of computational landscapes, contributing to the UX/UI problem in Web 3 and a path which allows the User to find alignment with AI systems and agents.