For thousands of years, people have been adopting belief systems which allow ruling classes to wield asymmetric levels of abstract power and control authority over them. Populations have tried to keep themselves secure against the systemic exploitation of these abstract power hierarchies using logical constraints encoded into rules of law, but time and time again, these logical constraints have proven to be demonstrably incapable of preventing systemic exploitation and abuse of people’s belief systems. No matter what logical constraints are encoded into the design of their abstract power hierarchies, people have not succeeded at sufficiently constraining belligerent people from exploiting them. Eventually, someone finds a way to exploit the population’s belief system for their own personal advantage.
This is a fundamental systemic security threat for all monarchies, ministries, legislatures, parliaments, republics, presidents, prime ministers, and senators. This also happens to be the same systemic security threat shared by computer programs and computer programmers. No matter what they’re called, no matter how their imaginary powers are encoded, and no matter how much people attempt to logically constrain them using carefully-designed rulesets, all belief systems which rely exclusively on imaginary sources of power and create trust-based, inegalitarian, and permission-based abstract power hierarchies that are demonstrably incapable of securing people against exploitation and abuse. These systems routinely become captured by tyrannical, oppressive rulers who abuse their abstract power to benefit themselves, their friends, and their private interests at the expense of the users they ostensibly serve.
#softwar