April 01, 2024

Section A. Human Readable Protocols

The primary focus is on designing human-readable protocols for systems, specifically the background commons infrastructure. This is seen as a potential area of improvement. Human readable protocols can make systems more accessible and easier to understand, which can lead to better usage and adoption.

Role of Electoral Appointees

Electoral appointees can make edits to these systems. This suggests that the responsibility for system improvement is not limited to those with coding skills. Individuals who do not code or do not wish to write machine instructions can contribute to the design of the protocols.

Strengths and Weaknesses

Recognizing that everyone has different strengths and weaknesses is essential. The goal is to create a space where individuals can focus on their strengths and turn their weaknesses into opportunities for growth. This approach can lead to a more effective and diverse team.

Adoption and Action

The adoption of these systems and protocols largely depends on action. Learning cannot be forced and is often experiential. Therefore, the more these systems are used, the more likely they are to be adopted and improved.

Network Safety and Infrastructure

The network is considered to be relatively safe, but it could benefit from a more distributed infrastructure and less dependency on the same group of people. This would increase the robustness and resilience of the system.

Self-Correction and Improvement

The systems are designed to self-correct and avoid crashing into pseudo structures. This is achieved by tracking and tracing the bot's training for different types of use cases. The more the network is used, the more it can course correct and improve itself.


In conclusion, designing human-readable protocols for systems can make them more accessible and easier to use. This, coupled with a diverse team and a focus on strengths, can lead to better system adoption and improvement. The systems are also designed to self-correct, which can lead to continuous improvement over time.

Section B: Open Council Exit Notifications

The Trustee Council has implemented a system for voluntary and involuntary exit notifications. These are now available at the Governance Center.

Involuntary Removal

In certain scenarios, a Council body chair may recommend the involuntary removal of a member for ethical reasons, such as a breach of trust. After filing this resolution and receiving a 'Vote Out', the Council body chairperson has the option to file another resolution. This second resolution can be used to initiate disciplinary action on the exiting member and invoke the Observer's Council or Ethics Council report.

Public Record

It's important to note that this is a significant step. It leaves a public record in the Trust Association, which can be accessed by any individual, company, or group. This record is for the removed member and serves as a form of penal diligence action.

Judicious usage of powers of removing

Chairpersons are urged to exercise caution when using these powers against members in their constitutional body. The powers vested in the chairpersons should be used responsibly.

Implementation of the Articles of Association for exit notifications

The autonomous presentation layer of implementing the Articles of Association has been set up in a human-readable form. This is expected to improve and simplify over time—a special thanks to Executive Council for setting this up.

Privacy Considerations

In the interest of privacy, it is recommended not to use fellow members' names in any trust Governance proposals, tickets and proceedings. This is because these tickets and the fields, entries are used by the network AI for learning about the governance processes in a highly contextualized manner. This is one of the reasons why the Trust's Governance Center is kept highly componentized.

Given the finiteness of our linguistic conventions, many humans on the planet carry the same or similar names. Using names in this context could confuse the machine and potentially infringe on privacy.

Last updated

Maintained by © Muellners Foundation. All Rights Reserved.