Q: How could I evaluate an unknown system, or a proposal for a new one?
A: That's an excellent question that gets to the heart of understanding power dynamics in systems. Rather than taking claims at face value, we need to examine actual mechanisms and incentive structures.
Some key questions to probe:
Who actually controls the critical chokepoints? Not who claims to, but who can actually modify, shut down, or control access to key components?
What dependencies are required to participate? Every required intermediary, verification, or permission is a potential control point.
Can participants interact directly or are they required to go through monitored/controlled channels? Look at the actual technical architecture, not just the marketing claims.
What information/data must be surrendered to participate? Real privacy is built into architecture, not just promised in policies.
Who benefits from the system's operation? Follow the value flows and incentive structures.
What happens if users try to route around the official controls? Systems that enforce compliance through technical means rather than policy reveal their true nature.
Does the system enable or restrict user autonomy and direct peer relationships? Look at what it makes easier versus harder.