Sovereign Source

The Captive Commons

"Every great cause begins as a movement, becomes a business, and eventually degenerates into a racket." — Eric Hoffer

I. Why I Had to Build This

The four freedoms of free software are intact. Every one of them. You can run any GPL'd program for any purpose, study its source code, redistribute copies, and distribute modified versions. Forty years of legal infrastructure protect these rights. They are enforceable, recognized, and sound.

And the commons they were built to protect is dying.

Sixty percent of its maintainers are unpaid. Seventy-three percent report burnout. In 2024, a solo maintainer's exhaustion nearly let a state-level attacker backdoor the compression library embedded in virtually every Linux distribution on earth. The estimated value of this commons to the global economy is $8.8 trillion. Its annual funding is a rounding error on a rounding error.

The freedoms guarantee that value flows out of the commons. Anyone can take the code, deploy it, build on it, train a model with it. They provide no mechanism, none, to ensure that value flows back in. That gap is not a policy failure. It is a structural one, and this piece is the account of why.

I built the tools to explain it because I needed them. I spent ten years inside the open-source commons: writing packages, maintaining infrastructure, reviewing pull requests at hours no sane person should be awake. Then I watched the commons I helped build get captured from inside its own institutions. Governance committees seized by people who had never shipped a patch. Behavioral codes weaponized to silence the engineers who objected. And when I said so publicly, the cost was personal: my career, my reputation, my family's stability. Not because I was wrong. Because I dissented.

The self-appointed champions of the disadvantaged smacked down someone from precisely the background they claim to protect. I am currently surviving on a fraction of my previous salary, kept afloat by a client who recognized my skillset. The stability I spent years building was traded for the crime of speaking plainly. I would pay the cost again. They expected me to cave. My own difficult upbringing taught me young that staying quiet is its own form of miserable hell, one I will not suffer again, and one I will not condemn my children to.

That would have been enough to make me angry. It was not enough to make me build what I built. What pushed me further were encounters with institutional corruption that had nothing to do with software, personal upheavals that forced me to confront why systems designed to protect people so consistently produce the opposite of their stated purpose. Together, they compelled a descent to first principles: a three-part series that grounded ethics not in preference or consensus but in the structural constraints that entropy imposes on any complex system. I called the framework axiosophy: ethics from the axioms of physics, not from the opinions of philosophers.

From those constraints I derived a diagnostic tool: structural inversion. That tool is the engine of this piece. I built it because I needed to understand what happened to open source. Now I can say what the problem actually is.

It's not the corporations. It's not the governance committees. It's not the codes of conduct. Those are symptoms. The problem is the axioms.

The four freedoms were formalized between 1986 and 1999, and they were correct for the world they described: a world where software was a thing on a disk that you could hold in your hand. That world is gone, and the four freedoms, while still necessary, are catastrophically incomplete. They protect the artifact. They do not protect the commons. This piece identifies the structural gap, derives the conditions the original four fail to cover, and states a set of expanded freedoms that any developer can verify against their own experience.

And it matters beyond software, because the wonders of the internet era, the ones that modern society attributes to capitalism, are in reality the product of this decaying commons. Capitalism did not build the internet. The commons did. Capitalism showed up with a credit card and a term sheet. And if the commons dies, capitalism cannot replace it, because capitalism doesn't even understand what it is.

II. The Object and the Commons

When Stallman formalized the freedoms, software was an object. You could hold it. It came on a tape, or a disk, and you installed it on your machine, and it ran on your hardware. The question of what you could do with it was a question about your relationship to that object, and the four freedoms covered that relationship completely.

That question made sense in 1986. It makes less sense now, and not because software has become more complex or corporations more aggressive, but because the category has changed. Software is no longer primarily an object you possess. It is a commons you participate in.

An object is something you hold. A commons is a shared resource whose quality depends on the behavior of its participants. A loaf of bread is an object. A community oven is a commons. The difference matters because the governance requirements are fundamentally different. You can protect an object with property rights. You cannot protect a commons with property rights alone, because the commons has a maintenance budget, a governance structure, and a set of participants whose behavior affects everyone else. Elinor Ostrom spent her career proving this, and won the Nobel Prize for it.

Software-as-code is non-rivalrous. Copying a binary costs nothing. My use of your library doesn't degrade your copy. The four freedoms correctly identified this property and built their protections around it. But software-as-ecosystem is deeply rivalrous. Maintainer attention is rivalrous. Governance seats are rivalrous. Network position is rivalrous. Security auditing capacity is rivalrous. When a cloud provider wraps your project in a managed service and captures the revenue, they haven't degraded your copy of the code. They've degraded your capacity to sustain the ecosystem that makes the code worth using.

The freedoms protected what software was. They do not protect what software is.

Here is the structure of the problem, and to see it clearly you need to think about arguments the way you think about any complex system: in layers. Every argument has a rhetorical layer (what is said), a procedural layer (what is done), and a moral or structural layer (what is actually true underneath). Think of it as depth-testing: is the rhetoric consistent with the procedure? Is the procedure consistent with the underlying structural reality? When these layers diverge, you're looking at structural inversion, and you can map the distance between them with precision. I developed a formal version of this analysis in a previous piece, but the core idea is just honest engineering: check the surface against the substrate. Trust neither on its own.

Apply that to open source:

  • What's said (rhetorical): The four freedoms guarantee software freedom. They are intact. You can run, study, share, and modify any GPL'd program exactly as Stallman intended.
  • What's done (procedural): Governance, economics, and infrastructure operate according to rules that the freedoms do not address. Who decides the project's direction. Who gets paid. Who controls the registry, the CI, the hosting. None of this is covered.
  • What's structurally true (moral): The conditions for the commons to persist, whether the feedback loops exist, whether governance is capturable, whether the freedoms can actually be exercised by the people who nominally hold them, are not even acknowledged.

The surface is intact. The substrate is eroding. The gap between them is where the commons is dying.

III. The First Inversion

Before the cloud providers arrived, before the AI companies, before the SaaS loophole, the movement was structurally inverted once already. And the people who did it thought they were helping.

In February 1998, following Netscape's announcement that it would release its browser source code, a group of developers met in Palo Alto to discuss strategy. Eric Raymond, Bruce Perens, Christine Peterson, and others recognized an opportunity to bring the free software development model to the mainstream. The obstacle, as they saw it, was the word "free." Not because it was ambiguous (though it was), but because it was moral. Stallman's framework was explicitly ethical: software freedom is an obligation, not a marketing advantage. Raymond wanted to drop what he called the "moralizing" and the "confrontational" ideology, replacing it with a pragmatic pitch to business: open source is more efficient, more reliable, more innovative.

The rebranding worked. Spectacularly. Within a year, IBM, Oracle, and Sun Microsystems had formally embraced "open source." The movement gained corporate legitimacy, media coverage, and institutional momentum it had never had. The Open Source Initiative, co-founded by Raymond and Perens, became the definitional authority. The Debian Free Software Guidelines were adapted into the Open Source Definition. The word "freedom" was preserved in the rhetoric. The moral obligation behind it was surgically removed.

Apply the structural inversion diagnostic:

  • Hollow: The ethical substance of the movement, the claim that software freedom is a moral obligation, was removed and replaced with a pragmatic efficiency argument.
  • Substitute: The Open Source Definition performed the function of principled governance (it defined what counted as "open source") while stripping the moral reasoning that had motivated the original principles.
  • Preserve: The rhetorical surface, "freedom," "community," "sharing," remained intact. The words stayed. The obligation left.

This matters for the rest of the argument because it explains why the structural capture proceeded so cleanly. Once the ethical obligation was removed, the only structural defense remaining was the license. And the license, as §IV will show, had a gap, the SaaS loophole, that was invisible in 1986 but catastrophic by 2006. Through that gap drove every cloud provider, every AI company, and every VC-backed extraction cycle that followed.

I want to be careful here, because I am not moralizing the decision to rebrand. It's genuinely unclear whether we'd be in a better position without it. The rebranding built the commons at a scale that the free software movement, with its confrontational posture, might never have achieved. Without corporate adoption, the commons might never have grown large enough to demonstrate why commons governance matters. The very ecosystem whose capture I'm diagnosing exists in its current form because the rebranding succeeded. The irony is structural: the pragmatic move that stripped the ethical defense is also the move that built the thing worth defending. I'm not saying Raymond was wrong. I'm saying this is where the gap opened, and tracing the causal chain matters more than assigning blame.

Stallman saw it at the time. He refused to adopt the new terminology and spent the next two decades arguing that the distinction between "free software" and "open source" was not semantic but structural: one carried a moral obligation, the other carried a marketing pitch. He was right about the distinction. But even he didn't see that the freedoms themselves, moral obligation or not, were incomplete. The ethical dimension he fought to preserve was necessary but not sufficient. You needed the moral claim and the missing axioms. We lost the first. This piece adds the second.

IV. The Inversion of the Four Freedoms

In the trilogy preceding this piece, I described a pattern that shows up across domains with disturbing regularity: a right is structurally inverted when the mechanisms designed to protect it are turned against it, while the right itself is kept on display as proof of its own defeat. Three steps: hollow the substance of the right, substitute a procedural replacement that performs the function of protection without providing it, and preserve the rhetorical surface so that everyone can still point to the right and say "see, it's right there."

Every one of the four freedoms has undergone this process. Not by conspiracy. By structure. The architectural transformation of software from object to platform created the conditions under which each freedom could be formally preserved and structurally emptied. Let me show you.

The Freedom to Run

You can run the program as you wish, for any purpose. Nobody stops you.

Here's what "running" a meaningful piece of software looks like in 2026: you need a cloud account, an API key, a container orchestration platform, a CDN, a monitoring stack, a CI pipeline, and a user base. You can "run" PostgreSQL on your laptop. You cannot run a competitive database service without the operational layer that AWS has folded into a managed offering behind a credit card form. You can "run" Mastodon on a VPS. You cannot run a social network that anyone actually uses, because the network is the product and you can't fork a network. You can "run" an LLM locally. You cannot run a competitive AI service without billions of dollars in compute that produced the weights you don't have access to.

The freedom to run has been hollowed by infrastructure dependency. You have the right to run the code. You do not have the right to the substrate on which running the code is meaningful. Amartya Sen called this the capability distinction: a formal right without the material conditions to exercise it is structurally empty. A self-hosted instance of a platform no one uses satisfies Freedom 0 the way a nominally free person with no resources satisfies the formal definition of liberty. The freedom is a theorem that compiles but never executes.

And the cloud providers know this. They price data ingress at zero (getting your data in costs nothing) and egress at 0.090.12 per gigabyte (getting your data out costs a fortune). For large datasets, migration is not a business decision; it is a structural impossibility. Google Cloud offers to waive egress fees only if you close your account. The exit toll is not incidental. It is the business model. Your "freedom to run" exists inside a walled garden with a one-way gate.

The Freedom to Study

Source code is available. You can study how the program works and change it so it does your computing as you wish.

Chromium is roughly 35 million lines of code. Even if you had the time and expertise to read all of it, and you don't, the complexity is not incidental. It is the product of an engineering culture that optimizes for velocity over comprehensibility, a corporate culture that benefits from the opacity of its own "open-source" contributions. Nadia Asparouhova documented this shift precisely: from the "bazaar" model of distributed peers to the "stadium" model, a solo maintenance performer watched by a massive, silent audience who files issues but never sends patches. Publication of the code satisfies Freedom 1. Comprehensibility of the code is nobody's problem.

But the more profound hollowing is happening in AI. The "open-source" AI architectures, the model code, the training loop, the inference pipeline, are published. The model weights, the thing that actually makes the system work, the thing that required billions of dollars of compute to produce, are proprietary. The training data is proprietary. You can "study" the oven design. The recipe, the ingredients, and the fire are trade secrets. Publication of the architecture is the substitute: it performs the function of openness without providing it. The operational substance is withheld.

The Freedom to Redistribute

You can give copies to anyone. You can redistribute the code.

You cannot redistribute the network. You cannot redistribute the user base. You cannot redistribute the operational trust that enterprises have invested in the cloud provider's managed version. You cannot redistribute the institutional relationships, the support contracts, the compliance certifications.

Redistribution of the artifact, in an era of network effects, is the redistribution of a seed without the soil. Metcalfe's Law is unforgiving: the value of a network scales with the square of its participants. When Redis relicensed and AWS launched Valkey, within a year 83% of large Redis users were testing the AWS-backed fork. Not because Valkey was technically superior. Because AWS had the network position, the infrastructure, the pre-existing customer relationships. The code was identical. The network was not. The fork inherited the users because platform gravity determined the outcome before a single commit was reviewed.

The freedom to redistribute code in a world where value lives in networks is like the freedom to photocopy a deed to land everyone has already evacuated. The paper is free. The territory is captured.

The Freedom to Distribute Modified Versions

This is the cleanest case, because it's not hollowing. It's definitional capture, and it's the most elegant structural inversion of the four.

"Distribute" was defined when distribution meant handing someone a tape. In the SaaS era, deployment is distribution in every structural sense except the legal one. When you use Gmail, you are using Google's modified version of open-source components. You interact with it. You depend on it. You are subject to its modifications. You never receive a "copy." The GPL's reciprocity requirement, share your modifications if you distribute, is triggered by the legal act of distribution. Google can modify, deploy, and profit from GPL'd code without sharing a line, because the user never receives a binary. They receive a URL.

The AGPL attempted to close this gap. The SSPL went further. Both were resisted. The Open Source Initiative rejected the SSPL, invoking Criterion 6 of the Open Source Definition: "No Discrimination Against Fields of Endeavor." A criterion designed to prevent licenses that prohibit military or commercial use was deployed to prevent licenses that recognize cloud hosting as a form of distribution. The community's own definitional framework was weaponized to prevent the community from addressing the most significant structural change in software delivery since the floppy disk.

This is not hollowing. This is the substitute step operating at the definitional level: the meaning of "distribution" was captured to exclude the dominant mode of actual distribution. The freedom is intact. The definition was rewritten around it.

V. The Broken Feedback Loop

The four freedoms guarantee that value can flow out of the commons. Use it. Copy it. Modify it. Redistribute it. Build a trillion-dollar company on it. Train an AI with it. Offer it as a service. All of this is permitted. All of this is by design. This is what makes open source powerful.

What the four freedoms do not guarantee, and what no existing open-source license addresses, is that any of that value flows back in.

There is no structural mechanism, anywhere in the canonical stack of freedoms, definitions, and licenses, that ensures the commons receives the energy it needs to persist. The pipe is one-way. And the result is exactly what the Second Law of Thermodynamics predicts: the system is degrading.

A commons is what physicists call a dissipative structure: a system that maintains its internal order only by continuously importing energy from its environment and exporting entropy. A candle flame, a living cell, an economy, a software ecosystem: all dissipative structures. They persist far from equilibrium, and the moment the energy import stops, they collapse. Not slowly. Rapidly. Because equilibrium, for a dissipative structure, is death.

The internal entropy production of a software commons is always positive: technical debt accumulates, dependencies rot, security vulnerabilities compound, maintainers burn out, documentation decays. This is not a failure of management. It is a law of physics applied to information systems. The only question is whether the energy import, the human labor, the funding, the cognitive attention, the infrastructure, is sufficient to offset that internal degradation. For the open-source commons, empirically, it is not. And the four freedoms say nothing about it, because the four freedoms protect the artifact. All of this is happening to the commons.

In a previous piece, I described what I call the autonomic machine: a system that produces the opposite of its stated purpose and punishes those who notice. The open-source commons has become an autonomic machine. Its stated purpose is freedom. Its structural output is extraction. And the mechanisms designed to protect freedom, the licenses, the definitions, the governance frameworks, are the very mechanisms through which the extraction proceeds.

Three Extraction Patterns

Cloud extraction. AWS, Azure, and GCP take mature open-source projects and offer them as managed services. The original maintainers bear the development cost. The cloud providers capture the revenue. When MongoDB, Elastic, Redis, and HashiCorp attempted to close this gap through relicensing, they were met not with negotiation but with forks: OpenSearch, Valkey, OpenTofu. The message was blunt: we will rewrite the project before we will pay for it.

And here is a nuance that the tech press consistently misses, because the tech press itself is captured: when these projects relicensed, they bore the brunt of the bad publicity. Not the extractors. The maintainers who tried to create a sustainable business around their own work were branded as traitors to open source. The trillion-dollar cloud providers who precipitated the crisis by strip-mining maintainer labor were cast as defenders of the community. Just as you cannot have freedom in a sovereign nation without a free and independent press, you cannot have a sustainable software commons without a tech media ecosystem that isn't financially dependent on the platforms it covers.

AI extraction. Generative AI companies use open-source code as training data, performing a one-way value transformation: billions of lines of human-authored, licensed code go in; proprietary model weights come out. The code is "free to study." The model that learned from it charges $20/month. A substantial portion of these companies' training sets originated from decades of uncompensated maintainer labor. And this is not even the full picture. These same companies have captured trillions of dollars in reallocated public funding: government subsidies, tax incentives, regulatory capture, favorable trade policy. The extraction of the commons is part of a much larger structural pattern in which public value is systematically converted into private rent.

VC extraction. The lifecycle is patterned and predictable. Open-source → adoption → VC funding → proprietary layer → relicensing or acquisition. Docker, Confluent, HashiCorp: the arc is identical in each case. The commons funds the go-to-market. The exit extracts the value. HashiCorp's BSL relicensing in 2023 was followed by its $6.4 billion sale to IBM in 2024. The community launched OpenTofu under the Linux Foundation. Same pattern as Docker. Same pattern as Confluent. The commons builds; capital harvests.

Why It Matters

Modern society attributes its technological progress to capitalism. This is a lie. The wonders of the internet era, the infrastructure that powers global communication, the protocols that enable commerce, the security libraries that protect every transaction, the package ecosystems that make modern software development possible, are overwhelmingly the product of commons-based production. Of volunteers. Of maintainers who were never paid. Of communities that organized around shared problems and built solutions that no corporation planned, funded, or understood.

Capitalism did not build this. Capitalism showed up after the building was done, moved into the penthouse, and sent the builders an invoice for the elevator.

And it gets worse: the claim that capitalists are "substantially more productive" and therefore deserve outsized returns is nullified by their deliberate destruction of the very commons from which that "productive value" is extracted. The extractors are not adding value. They are capturing it while degrading the source, which is the opposite of productivity. It is consumption performing the role of production while the host organism weakens.

Neither capitalism nor communism has an answer here, and for the same structural reason: both are centralizing forces. Capitalism as practiced by the tech monopolies optimizes for unbounded private extraction. Communism optimizes for total state legibility and command. Both destroy the distributed, localized knowledge that makes complex systems adaptive. Both inevitably converge on surveillance, because whether the central hub is a Politburo or a Board of Directors, maintaining an unnatural monopoly over information requires total information extraction. What we actually need is something closer to what Ostrom and Mises understood from different angles: decentralized, proportional stewardship of shared resources, governed not by central authority but by the localized wisdom of the people who actually do the work. Call it commonsism, if you need a word. It is not a political ideology. It is a structural requirement for any commons that intends to persist.

Ironically, AI proves their thesis more powerfully than perhaps anything else in human history. These systems represent the most expensive, most computationally intensive attempt at centralizing knowledge ever undertaken: unprecedented capital, unprecedented stolen data, unprecedented power concentration. And they still cannot reliably produce the intimate, domain-specific structural knowledge that Mises argued could never be centralized. A maintainer who has spent three years inside a codebase knows things about its failure modes that no model trained on its git history can reproduce. That knowledge is produced by sustained human engagement with specific systems, and it is irreplaceable, not because we haven't built a big enough model, but because the knowledge is the engagement. Centralize the data and you lose the signal. This is Mises's calculation problem and Ostrom's local knowledge principle, validated at civilizational scale by the most powerful information-processing infrastructure ever built, and it still isn't enough.

And here is the deepest irony: at a time when the ideals behind open source are at their structural weakest in decades, undermined by extraction, hollowed by platform capture, and betrayed by the very institutions that claim to defend them, their spirit has likely never been needed more. The AI revolution, whatever form it takes, will either be built on a sustainable commons or it will be built on a captured one. If we don't fix the foundations now, we're handing the most powerful technology in human history to the same extraction machines that broke the last one.

The Human Cost

In March 2024, a Microsoft engineer named Andres Freund noticed a 500-millisecond delay in SSH logins. He investigated. What he found was a backdoor (CVE-2024-3094) inserted into xz-utils, a compression library embedded in virtually every Linux distribution, by an attacker who had spent more than two years building trust with the project's sole maintainer.

The vector was not a zero-day exploit. It was a burned-out human being.

Lasse Collin maintained xz-utils alone. The attacker, operating as "Jia Tan," began submitting legitimate patches in late 2021. Sock puppet accounts then pressured Collin publicly, criticizing his slow release cycle, weaponizing the very exhaustion that the extractive model created. By late 2022, Collin granted Jia Tan co-maintainer access with signing authority. The backdoor went in.

Now apply the structural inversion diagnostic. The "freedom to study" xz-utils was formally intact: the code was open, the commit history was public, the signing keys were transparent. The substance of that freedom, the actual capacity for meaningful security review by a community with the resources to perform it, was empty. One person, unsupported, was bearing the maintenance load of infrastructure that underpinned the internet. The freedom was on display. The capability was gone.

Heartbleed was the same pattern, earlier. In 2014, a missing bounds check in OpenSSL (CVE-2014-0160) exposed the private keys of up to 55% of HTTPS servers. OpenSSL had one full-time developer and received approximately $2,000 per year in donations. An $8.8 trillion ecosystem resting on a project funded at the level of a modest coffee habit.

These are not anecdotes. They are structural predictions. The numbers I opened with (60% unpaid, 73% burnout) are not anomalies. The Tidelift survey fills in the rest: 61% of maintainers are solo operators, and the share of contributors under 26 has dropped from 25% to 10% since 2021. The commons is graying. The pipeline is drying up. The feedback loop is broken or was never there, and the four freedoms have nothing to say about any of it.

Because all of this, every bit of it, is happening on a layer the freedoms were never designed to reach.

VI. The Missing Freedoms

The diagnosis is structural, and so the fix must be structural. Not a patch on the governance. Not a new donation platform. Not a more cleverly worded license. The fix is additional axioms: freedoms that the original four do not cover and cannot imply, because they address a layer of the stack that didn't exist when the originals were written.

The four freedoms protect the artifact. What follows protects the commons.

These freedoms have not been derived before because the tools to derive them did not exist. The free software movement has debated sustainability, governance capture, and maintainer exploitation for decades. Good people have proposed good solutions. But proposals are not derivations. A proposal says "this seems like a good idea." A derivation says "this is a conditional necessity given these structural constraints, and here is the chain of reasoning."

The framework I built in the previous series, axiosophy, formalizes the structural constraints under which complex systems persist or degrade. When you formalize the structure, the conditions for its success and failure stop being matters of debate and become demonstrable. Formalism denotes mechanism. You cannot derive what you haven't formalized. Now that the formalism exists, the derivation follows.

Each freedom below is derived from the same entropic constraint that grounds the entire framework: complex systems persist only by importing energy, maintaining self-correction, and resisting structural capture. These are not preferences. They are conditional necessities. If the commons is to survive, these conditions must be met, the same way a building that violates load-bearing requirements will eventually fall. Not because an engineer says so. Because gravity says so.

The Freedom to Sustain and Be Sustained (Freedom 4)

The four freedoms guarantee that value can flow out of the commons. They provide no corresponding guarantee that value flows back in. This is not an oversight in hindsight. It is a structural gap that becomes lethal once the commons reaches sufficient scale and the extractors arrive with sufficient appetite.

Ostrom's second design principle, validated across centuries of commons governance from Spanish irrigation systems to Swiss alpine meadows, states that the benefits extracted from a commons must be proportional to the costs borne by its participants. Commons where this proportionality holds persist for centuries. Commons where it doesn't collapse within decades. This is what entropy demands: a dissipative structure must import energy in proportion to its internal entropy production. The four freedoms provide no mechanism for this import.

Henry George, writing in 1879, identified an analogous structure in land economics. Land value, he observed, is not created by the landowner. It is created by the community: the roads, the schools, the economic activity, the population. The landowner captures this community-created value as economic rent, income derived from position rather than productive activity. George proposed taxing this rent specifically: not the improvements (what you build is yours), but the positional value the community created for you.

Open source has the same structure. AWS does not create the value of PostgreSQL. Decades of community maintenance, security patching, and ecosystem development create that value. AWS captures it by virtue of its position: the ability to host at scale with pre-existing customer relationships. That positional surplus is economic rent in the Georgist sense. And like George's land, it cannot be hidden: commercial deployment requires public visibility. You cannot secretly sell a product. You cannot secretly offer a managed service. The act of commercial deployment is the structural fact that no amount of corporate restructuring, no shell company arrangement, no contractor layering can conceal.

Freedom 4 (The Freedom to Sustain and Be Sustained): Those who produce and maintain a commons resource shall have structural mechanisms ensuring that value generated from commercial deployment of the commons flows back proportionally to sustain it.

The mechanism is a Commons Value Return (CVR): a continuous, proportional return that follows the deployment, not the entity. It can take the form of funding, engineering contribution, infrastructure, or documentation. The specific rates are governance parameters. But the existence of the return mechanism is the freedom itself. A commons without a feedback loop is a dissipative structure with its energy import cut. It is not a question of fairness. It is a question of physics.

The Freedom from Institutional Capture (Freedom 5)

Philip Pettit distinguished between two conceptions of liberty: freedom from interference and freedom from domination. The distinction is load-bearing. A slave with a kind master experiences no interference. But the master could interfere at any time, for any reason. The slave's freedom is structurally empty because it depends on the goodwill of an entity with the power to revoke it.

This is the exact configuration of open-source projects governed by single corporate sponsors. Google could reshape Chromium's direction tomorrow. Meta could change React's license. Corporate sponsors who fund 90% of a project's development have the structural capacity to dictate its direction, even if they currently exercise restraint. The "kind master" is not the absence of capture. It is capture with a pleasant demeanor.

I want to be precise about what I'm not saying. Contributing substantial code through the governance process is legitimate influence. Having strong technical opinions that prevail on technical merit is not capture. Being the largest funder of a foundation does not automatically constitute capture if governance mechanisms prevent funding from translating into control. Capture is the structural capacity to dictate arbitrarily, acquired through financial leverage, infrastructure dependency, or governance position, independent of technical merit.

I chose the word "capture" deliberately. "Domination" is the correct term in political philosophy, but in the current cultural climate it would be weaponized within a week. "Your expertise is a form of domination." "Contributing more code dominates the discussion." We've seen this movie. "Capture" is a defined, falsifiable, structural term from institutional economics. "I feel dominated" is unfalsifiable and weaponizable. "This entity has captured the governance" is a structural claim you can verify against evidence.

Freedom 5 (The Freedom from Institutional Capture): No entity shall acquire the structural capacity to dictate the direction, governance, or economic terms of a commons-produced resource through the scale of its investment, dependency, or infrastructure control alone.

The mechanism is structural caps on governance concentration: no single entity or common-control group may hold more than a defined fraction of governance authority. The specific fraction is a governance parameter. The structural cap is the freedom.

The Freedom to Dissent (Freedom 6)

Self-correction requires error detection. Error detection requires agents who can name errors without being destroyed for naming them. This is not a nice-to-have. It is the immune system of every complex adaptive system, and without it, errors accumulate until the system fails catastrophically.

Stanley Milgram demonstrated something striking in his Experiment 17: when a single peer in the room visibly refused to comply with the authority's instructions, obedience collapsed from 65% to 10%. The immune function of a social system is not the majority. It is the visible dissenter. The person who says "no" first. Destroy that person and you don't just lose their contribution. You destroy the social proof that makes dissent possible for everyone else.

I documented the mechanism by which this destruction proceeds in a previous piece: isolate the dissenter, reframe their technical objection as a behavioral infraction, escalate through the behavioral governance process, remove them, then cite the removal as evidence that the system works. In open source, the pattern is documented and recurring. Governance bodies dominated by non-technical actors adopt behavioral codes that make "unwelcoming behavior" or "disruptive communication" sanctionable offenses. Technical dissent, because it inherently involves disagreement and sometimes emotional intensity, gets reclassified as a behavioral violation. The governance process becomes the weapon. The dissenter faces a double bind: participate and risk sanction, or withdraw and lose the ability to contest.

The vocabulary of weaponized inclusion ("safety," "welcoming," "community standards") is itself a case study in structural inversion. These words have structural meanings that matter. They've been hollowed and refilled with the precise opposite of their original content, used not to protect the vulnerable but to silence the inconvenient. The pernicious cruelty of this culture is that it demands the censoring of one's true thoughts at all times, forgoing curiosity altogether in one final surrender to the machine. Societies have always had an immune response to precisely this kind of rhetorical capture: ridicule, the correction that operates below the level of formal argument and cannot be suppressed by procedural intimidation.

The Second Law of Thermodynamics doesn't care about your feelings. A system that suppresses its own error-correction function will degrade. That is not an opinion. It is a physical prediction, and the xz-utils backdoor is what it looks like when the prediction comes true.

Freedom 6 (The Freedom to Dissent): The freedom to contest the commons' direction, governance, or architecture without structural retaliation.

The mechanism: mandatory separation of behavioral and technical governance. Technical dissent, the act of arguing that the project is going in the wrong direction, cannot trigger behavioral sanctions. Behavioral governance addresses conduct. Technical governance addresses direction. The two tracks do not cross. This is not a procedural nicety. It is the structural condition for the immune system to function.

The Freedom to Exercise (Freedom 7)

A freedom whose exercise requires infrastructure controlled by another entity that can revoke access at will has been structurally inverted, whatever the license says.

This is Sen's capability approach applied to software. If your "freedom to fork" a project requires you to replicate infrastructure controlled by a single cloud provider, and that infrastructure has no interoperable alternative, your freedom is formally present and structurally empty. The freedom to leave a platform you depend on is the freedom to jump from a moving vehicle.

The specific mechanisms: cloud-only features that don't exist in the self-hosted version. Data formats that only work with one vendor's tooling. Package registries with no federated alternative. CI/CD pipelines that can only run on one provider's infrastructure. APIs with no interoperable specification. Each of these creates a dependency chain that terminates in a revocable resource, and a freedom that depends on a revocable resource is, in the structural sense defined by this entire piece, a counterfeit.

Freedom 7 (The Freedom to Exercise): The meaningful exercise of Freedoms 0–3 shall not be structurally contingent on resources controlled by any entity capable of revoking access.

The mechanism: protocol interoperability requirements. Data portability mandates. Not "self-host everything." Meaningful alternatives. Fork must be materially viable, not just legally permitted. This freedom is the capability condition that makes all the others structurally operative.

The Freedom to Observe (Freedom 8)

Capture proceeds undetected when governance is opaque. Proportional return cannot be enforced when financial flows are invisible. Retaliation against dissenters cannot be proven when sanction proceedings are hidden. Transparency is not a procedural convenience. It is the precondition for every other commons freedom to be verifiable.

Ostrom's fourth design principle states that monitors of a commons must be accountable to the community. In software, monitoring is code review, CI pipelines, automated security audits, and these are generally functional for code quality. But governance transparency, the visibility of who decides what, of where the money goes, of how sanctions are applied, is far less robust. Many major open-source foundations operate with opaque financial structures, private governance deliberations, and sanction processes deliberately hidden from public scrutiny.

Without transparency, Freedom 5 (immunity from capture) becomes undetectable. Freedom 4 (sustenance) becomes unenforceable. Freedom 6 (dissent) becomes unprovable. Transparency is the enabling condition for the entire commons freedom set.

Freedom 8 (The Freedom to Observe): The freedom to observe and audit the commons' governance, economics, and sanction proceedings.

The mechanism: all governance decisions, financial flows, and sanction proceedings must be observable by commons participants. Not "available upon request." Observable. The default is visibility. Opacity requires justification, and the justification itself must be visible.

VII. The Expanded Freedom Set

Nine freedoms. Two layers. The first four protect the artifact. The next five protect the commons. Together, they span the full stack from code to ecosystem.

The Artifact Freedoms (Stallman's Originals, Re-derived)

The OSI rebranding dismissed Stallman's freedoms as ideological, a moralist's hobby horse that scared corporate adopters. For a quarter century, the consensus has been that these are ethical preferences, not structural requirements. The consensus is wrong.

Each of the original four freedoms maps to a specific thermodynamic condition for the persistence of a complex system. They are not moral sentiments. They are load-bearing requirements, derivable from the same entropic constraints that produce the commons freedoms below.

  • Freedom 0 (Use): The freedom to run the program as you wish, for any purpose. A dissipative structure maintains itself by deploying its components where they are needed, when they are needed. A cell that cannot express a gene in response to environmental stress dies. A society that cannot deploy its own tools for its own purposes has surrendered its adaptive capacity to whoever controls the deployment conditions. Restricted execution is restricted adaptation. This is not a philosophical preference. It is the minimum condition for a complex system to respond to a changing environment.

  • Freedom 1 (Study): The freedom to study how the program works, and change it so it does your computing as you wish. In a previous piece, I derived a structural requirement for civilizational persistence: any system that wishes to persist must maintain a structural path from Slavery to Mastery for its members (∀c ∈ Citizens: ∃path(c, Slavery → Mastery)). Without the ability to inspect the code that increasingly governs commerce, communication, infrastructure, and law, citizens cannot audit the systems shaping their lives. They cannot detect errors. They cannot identify capture. They cannot distinguish a tool from a cage. The path to mastery is destroyed, and the system loses the self-correcting agents it needs to survive. Opacity is not a business strategy. It is entropy's most reliable accelerant.

  • Freedom 2 (Share): The freedom to redistribute copies so you can help others. Redundancy is the primary defense against catastrophic single-point failure. Every critical biological system is redundant: two kidneys, two lungs, distributed neural pathways. A commons that cannot replicate its critical components across independent actors is one compromised node from systemic collapse. The xz-utils backdoor succeeded because the maintenance of a critical compression library had been concentrated in a single, exhausted human being. Redistribution creates the structural redundancy that prevents this. It is not generosity. It is resilience.

  • Freedom 3 (Modify): The freedom to distribute copies of your modified versions to others. Adaptation requires variation. This is not a metaphor drawn from biology; it is the same structural principle. Any system that persists in a changing environment does so by producing variants, testing them against reality, and propagating the ones that work. A commons that cannot produce and distribute modified versions of itself cannot adapt. It becomes brittle, increasingly mismatched with the environment it was built to serve, until the gap between its structure and its context produces catastrophic failure. Modification is the mechanism of adaptation. Lock it down and you lock down the system's capacity to survive.

Stallman got the freedoms right. He did not get the justification right, or rather, he grounded them in moral obligation when they could have been grounded in physics. The OSI stripped the moral obligation and left the freedoms floating as pragmatic conventions, easily dismissed when they became inconvenient. Grounding them in entropy makes them non-optional. You can argue with a philosopher. You cannot argue with the Second Law.

The Commons Freedoms

  • Freedom 4 (Sustenance): The freedom to sustain and be sustained by the commons you produce. Those who commercially deploy commons-produced resources owe a proportional return to the commons that created the value they capture.
  • Freedom 5 (Immunity): The freedom from institutional capture. No entity shall acquire the structural capacity to dictate the commons through the scale of its investment, dependency, or infrastructure control alone.
  • Freedom 6 (Dissent): The freedom to contest the commons' direction without structural retaliation. Technical dissent shall not be sanctionable through behavioral governance.
  • Freedom 7 (Substrate): The freedom to exercise these freedoms without revocable dependency. Fork must be materially viable, not just legally permitted.
  • Freedom 8 (Transparency): The freedom to observe and audit the commons' governance, economics, and sanction proceedings. The default is visibility.

The Artifact Freedoms protect what you can do with the code. The Commons Freedoms protect the structural conditions for the ecosystem to persist. The originals were never wrong, and they were never merely ideological. They were never enough.

This is not free software. Free software protects the artifact and leaves the commons to fend for itself. This is not open source. Open source redefined the marketing and left the structural gap untouched. This is sovereign source: software whose commons governs itself, sustains itself, and cannot be captured by external power.

VIII. What Comes Next

The freedoms are the what. They name the structural conditions that must hold. They do not specify how those conditions are implemented or who enforces them. That is by design. Freedoms are structural constraints. Mechanisms are derived from constraints, not the other way around.

What remains is to make them livable. The freedoms need an engineering ethic: a governance architecture that encodes the boundary conditions, collective-choice arrangements, graduated sanctions, and conflict-resolution mechanisms that Ostrom's work identifies as necessary for any commons to survive. Without this layer, the freedoms are structural truths with no institutional muscle. With it, they become functional institutions that a maintainer can actually rely on.

And the ethic needs teeth. Not a license in the traditional sense, because copyright law cannot do this work. Copyright governs the copying and distribution of a fixed expression. It has no vocabulary for governance concentration, proportional commercial return, or behavioral sanction tracks. The SSPL failed structurally for exactly this reason: it tried to enforce commons obligations through a legal mechanism designed exclusively for the artifact. What sovereign source requires is an institutional substrate: a legal vessel bound to the commons' survival, a protocol that shifts extractive deployers from permissive copyright into binding contract law, and enforcement mechanisms that follow the deployment, not the entity. The details of that architecture are coming.

Imagine open-source projects that are not merely surviving on the fumes of volunteer guilt, but structurally funded in proportion to the value they generate. Projects where maintainers are not begging for GitHub Sponsors donations while trillion-dollar companies build empires on their unpaid labor, but are compensated as a matter of structural obligation. Where the feedback loop works: deployment generates return, return sustains maintenance, maintenance sustains the commons, the commons sustains civilization. Imagine a world where the benefit of the commons is not abused but embraced, because the incentive structure rewards contribution as reliably as the current one rewards extraction.

Imagine AI systems that are not the property of a handful of corporations racing to construct the most comprehensive surveillance apparatus in human history, but a legally protected public commons. Not "open-source AI" in the current, structurally hollow sense, where "open weights" that cost billions to produce are published as marketing while the training data, the compute infrastructure, and the governance remain proprietary. Sovereign source AI: systems whose training data, model weights, and deployment infrastructure are governed by commons freedoms, sustained by proportional return, transparent to their participants, and immune from capture. AI deployed not to maximize engagement, monetize attention, and map every human behavior for the benefit of entities accountable to no one, but to identify and uphold the complex structural constraints required to keep a civilization functioning. AI as public infrastructure, not private panopticon.

The stakes could not be higher, and the timing could not be more urgent. Right now, at this moment, the most powerful technology ever created is being enclosed at unprecedented speed by entities whose structural incentive is total informational control. The surveillance infrastructure being laid across the developed world is not a distant threat. It is being built on the back of the open-source commons, by companies that depend on the very ecosystem they are strip-mining. If the commons dies before these freedoms take hold, the most powerful instruments of human coordination ever devised will belong permanently to the smallest number of people in history.

Imagine instead: maintainers paid proportionally to the deployment of their work. The freedom to say "this architecture is wrong" without losing your career. Forking a project and having it actually mean something, because the substrate isn't captured and the network isn't locked. Seeing where every dollar goes and how every decision was made. Intelligence systems that serve the commons instead of surveilling it.

That is what these freedoms produce when they function. That is sovereign source.

These are tools, not rules. They are offered freely, verifiable by anyone, owned by no one. If the framework has done its job, you should be able to verify every claim in this piece against your own experience, accept or reject every derivation on its structural merits, and apply the expanded freedoms to any project you care about without asking permission from me or anyone else.

I intend to fix this. But I can't do it alone, and I wouldn't want to. That would be its own form of capture. Everything I've described here, every mechanism of extraction, every structural inversion, every hollowed freedom, proceeds because good people remain silent while the loudest voices set the terms. The great irony is that all these machinations of institutional decay are fragile. They depend on silence. They collapse the moment enough people see the structure for what it is and refuse to comply. The tools exist. The diagnosis is structural. The fix is derivable. What remains is the will to do the work.

Not free software. Not open source. Sovereign source.

If any of this resonates, don't wait for permission. Verify the claims. Test the freedoms against your own experience. And if they hold up, help me build what comes next.