Skip to content

Conversation

@labormedia
Copy link

@labormedia labormedia commented Jan 14, 2026

Summary

This PR submits RFC-0162: The Ecosystem Anti-Trust & Market Structure Omnibus to the Fellowship RFC repository.

The RFC treats institutional capture as a security failure mode (analogous to DoS / centralization drift / chokepoint formation) and introduces operational constraints that preserve:

  • Contestability (markets remain open to new entrants),
  • Neutrality (canonical utility rails do not discriminate beyond validity predicates),
  • Substitutability / Portability (users and applications are not locked into single registries or single distribution channels),
  • Rule-based exit (no privileged lanes; anti-jamming protections).

This is a “constitutional” standard: it primarily defines reviewable invariants and metrics, and is designed to be implementable as three independently reviewable follow-up PRs.


Scope

Normative changes introduced by RFC-0162

  1. Process (Meta): Amend 0000-template.md to require a mandatory Market Structure Impact section for all future RFCs.
  2. Infrastructure (Open Utilities): Amend RFC-0032 and RFC-0078 to add:
    • validity-only neutrality for canonical utility state,
    • proof-carrying export (portability),
    • multi-source metadata resilience.
  3. Economics (Fair Markets): Amend RFC-0149, RFC-0097, RFC-0007 to add:
    • coretime re-entry events + concentration friction,
    • unbonding anti-jamming constraints (per-controller caps, deterministic carry-over),
    • time-bounded privileged sets (invulnerables) with explicit liveness guardrails.

Non-goals

  • This RFC does not prescribe treasury procurement policy beyond protocol-governed mechanisms.
  • It does not define editorial/media governance.
  • It does not require a single identity system.
  • It does not introduce discretionary censorship (validity predicates only).
  • It does not claim capture can be eliminated, only that major capture surfaces must be identified and bounded.

Why now

As Polkadot’s roadmap increasingly relies on System Chains, Coretime Markets, and standards (e.g., metadata), these become part of the protocol’s de facto security perimeter. If any of these surfaces form a chokepoint (market cornering, registry monopoly, privileged lanes), decentralization degrades even if the chain remains live.

RFC-0162 is intended as the next step in security maturity: explicit threat model, explicit metrics, explicit mitigations.


Review guidance

Please focus feedback on:

  1. Parameter bounds and liveness guardrails

    • EXIT_CAP_PER_CONTROLLER bounds and epoch definition
    • INVULN_MIN_FLOOR and decay schedule safety
  2. Concentration metrics and triggers

    • purchaser-level metrics vs. higher-order identity modeling
    • practical C_MAX thresholds and measurement windows
  3. Compatibility with existing RFC intent

    • confirm these constraints can be satisfied without constraining legitimate spam-control / weight limits
    • confirm portability requirements are scoped to claims (proof-carrying exports), not unilateral balance migration

Implementation plan (follow-up PRs)

The RFC proposes implementation as three independently reviewable PRs:

  • PR-A (Meta): update 0000-template.md
  • PR-B (Open Utilities): patch RFC-0032 and RFC-0078
  • PR-C (Fair Markets): patch RFC-0149, RFC-0097, RFC-0007 (including explicit enactment blocks/epochs and deprecation schedules)

These will be opened as separate PRs to keep diffs small and reviewable once consensus on the Omnibus text is reached.


Checklist

  • RFC text added under text/ following repository conventions
  • File renamed to match PR number (after PR is opened)
  • References to amended RFCs verified
  • Monitoring requirements and parameter governance included

@monsieurbulb
Copy link

monsieurbulb commented Jan 17, 2026

i’ve read everything you’ve written - if i’m honest it is often hard work to get through as it is presented in dense and complex language - perhaps you could dumb things down a little bit, and in turn make your contributions more accessible as you are clearly passionate and (possibly?) have some experience in the antitrust arena…

fwiw I understand the meta problems/issues you are pointing at, but a lot of these issues are downstream of the genesis distribution and the basic economic incentives of the network.

i struggle to understand what you are requesting with this RFC.

Market Structure Omnibus

? i don’t even get the title…

@labormedia
Copy link
Author

labormedia commented Jan 17, 2026

I appreciate the time you have taken to read RFC-0162. For the benefit of the broader community, I would like to expand on this Request for Comments with a few clarifying points.

The market, specially under decentralized economies, is holistically interdependent. This RFC-0162 treats the ecosystemic threat on institutional capture, given by the market structure (the rules of the game), within three consecutive PRs coordinated together as an Omnibus, an indivisible package of reforms on the whole structure.

With “RFC-0162: The Ecosystem Anti-Trust & Market Structure Omnibus” we are proposing a single, comprehensive act to engineer fair competition and prevent institutional capture across the entire Polkadot protocol design.

This is the minimal mapping from RFC-0162’s threat model to concrete amendment points + engineering invariants; if anyone sees a better anchor for any node, I’m happy to revise the references accordingly:

flowchart LR
  %% RFC-0162 — Diagram-Anchored Review Map (GitHub Mermaid)
  %% Failure Mode -> Vulnerable Rail -> Norm (Invariant)

  %% --- STYLING ---
  classDef rail fill:#0f172a,stroke:#475569,stroke-width:2px,color:#f1f5f9;
  classDef fail fill:#450a0a,stroke:#ef4444,stroke-width:2px,color:#fecaca;
  classDef inv fill:#064e3b,stroke:#10b981,stroke-width:2px,color:#d1fae5;
  linkStyle default stroke:#64748b,stroke-width:1px,fill:none;

  %% --- 1) THREATS ---
  subgraph THREATS["Failure Modes (Risk)"]
    direction TB
    F1["F1 Contestability Failure<br/>(Entrenchment)<br/><sub>§2 • §3</sub>"]:::fail
    F2["F2 Neutrality Failure<br/>(Discrimination)<br/><sub>§6.1–§6.2</sub>"]:::fail
    F4["F4 Exit Rights Failure<br/>(Jamming / Lock-in)<br/><sub>§3</sub>"]:::fail
    F3["F3 Portability Failure<br/>(Data Lock-in)<br/><sub>§2 • §6.5</sub>"]:::fail
  end

  %% --- 2) RAILS ---
  subgraph RAILS["Vulnerable Targets"]
    direction TB

    subgraph MKT["Market Domain"]
      direction TB
      CT["CT Coretime Market<br/>(amends RFC-0149)<br/><sub>§7.7</sub>"]:::rail
      GOV["GOV Governance Rail<br/>(amends RFC-0032)<br/><sub>§7.3</sub>"]:::rail
    end

    subgraph OPS["Operations Domain"]
      direction TB
      EXIT["EXIT Staking / Unbonding<br/>(amends RFC-0097)<br/><sub>§7.8</sub>"]:::rail
      COL["COL Collator Selection / Invulnerables<br/>(amends RFC-0007)<br/><sub>§7.9</sub>"]:::rail
    end

    subgraph UTL["Utility Domain"]
      direction TB
      ID["ID Identity / System Utilities<br/>(amends RFC-0032)<br/><sub>§7.4–§7.5</sub>"]:::rail
      MD["MD Metadata Rail<br/>(amends RFC-0078)<br/><sub>§7.6</sub>"]:::rail
    end
  end

  %% --- 3) FIX ---
  subgraph FIX["§7 Norms (Fix)"]
    direction TB
    I1["I1 Contestability<br/>(Forced Re-entry / Anti-cornering)<br/><sub>§7.7.1 • §7.9</sub>"]:::inv
    I2["I2 Neutrality<br/>(Validity-only / Common-carrier)<br/><sub>§7.3 • §6.1–§6.2</sub>"]:::inv
    I4["I4 Rule-based Exit<br/>(Ordering + Per-controller caps)<br/><sub>§7.8.1–§7.8.2</sub>"]:::inv
    I3["I3 Portability<br/>(Proof export + Multi-source)<br/><sub>§7.4 • §7.6 • §6.5</sub>"]:::inv
  end

  %% --- WIRING ---
  F1 ==> CT
  F1 ==> GOV
  CT ==> I1
  GOV ==> I1

  F2 ==> GOV
  F2 ==> COL
  GOV ==> I2
  COL ==> I2

  F4 ==> EXIT
  F4 ==> CT
  EXIT ==> I4
  CT ==> I4

  F3 ==> ID
  F3 ==> MD
  ID ==> I3
  MD ==> I3
Loading

Column 1: THREATS (The Risk)

Mapped to §2 (Motivation) and §3 (Threat Model).

Chart Node RFC Text Reference Context in RFC
F1: Contestability
(Entrenchment)
§2 Motivation
§3 Threat Model
Capture via incumbency entrenchment and monopolizing scarce resources (coretime).
F2: Neutrality
(Discrimination)
§6.2 Definition
§7.3 Amendment A
“Discrimination” = inclusion/exclusion by non-validity attributes; neutrality is normed as common-carrier, with validity predicates only as exceptions (§6.1).
F3: Portability
(Data Lock-in)
§6.5 Definition
§7.4, §7.6
“Portability” = proof-carrying export (light-client verifiable); reinforced by multi-source metadata resilience.
F4: Exit Rights
(Jamming / Lock-in)
§3 Threat Model
§7.8 Amendment
Adversary “dominates exit capacity”; mitigated by rule-based queue ordering + per-controller rate limits.

Column 2: RAILS (The Target)

Mapped to the specific RFCs being amended in §7 (Specification).

Chart Node Target System RFC Text Reference
CT: Coretime Market RFC-0149 §7.7 (Anti-hoarding invariants; re-entry events + concentration friction).
GOV: Governance Rail RFC-0032 §7.3 (Canonical utility state neutrality; validity-only inclusion).
EXIT: Staking/Unbond RFC-0097 §7.8 (Exit neutrality + anti-jamming constraints).
COL: Collator Selection RFC-0007 §7.9 (Sunsetting invulnerables; rule-based replacement + liveness safety).
ID: Identity System RFC-0032 §7.4–§7.5 (Proof-carrying export; multi-attestation compatibility).
MD: Metadata Rail RFC-0078 §7.6 (Anti-registry capture; multi-source resilience).

Column 3: FIX (The Norms)

Mapped to the engineering invariants defined in §7 (Specification).

Chart Node RFC Text Reference The Constitutional Norm
I1: Contestability
(Forced Re-entry + Sunset Privilege)
§7.7.1; §7.9 Periodic contestability: renewed coretime can be forced back into competition; discretionary privilege must be time-bounded and replaced by rule-based mechanisms.
I2: Neutrality
(Validity Only)
§7.3; §6.1–§6.2 Common Carrier for canonical utility state: no discrimination beyond validity predicates.
I3: Portability
(Proof Export + Multi-Source)
§7.4; §7.6; §6.5 Verifiable export + multi-source retrieval validated against on-chain commitments.
I4: Rule-Based Exit
(Ordering + Per-Controller Rate Limits)
§7.8.1; §7.8.2 Unbonding must be purely rule-based, with per-controller caps and order-preserving carry-over (no privileged fast lanes).

Last but not least, this roadmap starts by patching 0000-template.md, immediately enforcing market security considerations as a review standard for all subsequent RFCs.

@anaelleltd anaelleltd added the Proposed Is awaiting 3 formal reviews. label Jan 19, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Proposed Is awaiting 3 formal reviews.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants