Episodes

  • Governing the Commons | Book Review
    May 7 2026

    Governing the Commons: A Review of Elinor Ostrom

    What if the tragedy of the commons was never really about the commons at all? In this episode, Watson and B. Sovereign do a deep dive into Nobel Prize-winning economist Elinor Ostrom's landmark book Governing the Commons — and unpack why her findings are more relevant than ever for anyone building decentralized protocols, digital communities, or shared resource systems.

    What we cover:

    • Why "open access" and "common property" are not the same thing — and why the distinction changes everything
    • Ostrom's four counterintuitive truths: self-governance works, trust is context-dependent, monitoring drives sustainability, and there are no blueprints
    • The eight design principles for durable institutions — from boundaries and graduated sanctions to nested enterprises and legitimate rule change
    • How game theory, salience, and reputation reduce enforcement costs in practice
    • A critique of the book through the lens of software craftsmanship: primitives, composition, and abstraction
    • Why builder usability matters — and why sane defaults beat endless configuration
    • A practical checklist for evaluating any commons: digital, physical, or protocol-based

    Whether you're building a decentralized platform, governing a community, or just curious about how people solve collective action problems without a boss — this episode gives you the framework.

    🔗 More content at bitlemmas.com

    Show More Show Less
    1 hr and 1 min
  • Digital Technology and Democratic Theory | Book Review
    May 1 2026

    BitLemmas | Episode 11: Book Review — Digital Technology and Democratic Theory by Bernholz, Landemore & Reich

    Who really controls what you see, who gets heard, and who gets silenced online? In Episode 11 of BitLemmas, Watson, Drew, and B. Sovereign dig into Digital Technology and Democratic Theory — an edited academic volume by Bernholz, Landemore, Reich, and others — and extract what it means for anyone building or using digital systems today.

    The book's central argument is urgent and underappreciated: digital platforms are already governing us. They decide who can speak, what content spreads, and what gets buried — and they do it through opaque private rules with no meaningful appeal. The hosts break this down into four counterintuitive truths that challenge common assumptions about free speech and democratic participation.

    TRUTH 1 — More participation does not equal better democracy. When the cost to publish drops to near zero, content volume explodes into what the authors call superabundance. Attention becomes scarce, noise drowns out signal, and whoever controls the filter controls the power. The hosts map this across four quadrants — open vs. gated aperture, weak vs. strong filter — to show why the broadcast era's editorial gatekeeper and today's algorithmic ranker are more similar than they appear.

    TRUTH 2 — What you think of as the public square is privately governed and deliberately opaque. Shadow banning, de-ranking, and invisible content suppression are not edge cases — they are the product. The team introduces the concept of hidden centralization: one entity holding complete control over what an entire network sees, with no audit trail and no recourse. B. Sovereign frames this through the PRICE framework (Premine, Roadmap, Issuer, Censorship, Exit) as a way to map every choke point in a digital system.

    TRUTH 3 — Exclusion and silence are political facts, not glitches. B. Sovereign shares a figure that reframes the entire conversation: 85% of the world's population — roughly 6.7 billion people in the Global South — are already excluded from most digital platforms by geography, language, and infrastructure. Their silence is not apathy. It is data. The hosts argue that designing for the conditions the Global South already faces — Internet shutdowns, capital controls, asset freezes — produces systems that are genuinely resilient for everyone.

    TRUTH 4 — Democracy has an architecture, and it can be redesigned. The episode closes with a practical builder's framework: the Build Stack (Needs, Simplicity, Validation, Adoption, Auditability). Drew walks through why complexity is regressive, why auditability must be present on day one, and why a protocol that only works for power users is just a private club with better branding. The hosts draw on Christopher Alexander and SICP to argue that the designer's job is to create a language that lets communities solve their own problems — not to make top-down decisions for them.

    Key concepts discussed: aperture vs. filter, the Faustian bargain of digital democracy, portable identity and the social graph, the governance trap, news as democratic infrastructure, user-selectable ranking, and Nostr as a protocol-based alternative to centralized identity.

    Practical checklist from the episode: Who can participate? How is attention allocated? Who sets the rules? How do you appeal? Who is missing or silent — and why?

    This episode is essential listening for software builders, civic technologists, policy thinkers, and anyone who has wondered why the internet that was supposed to decentralize power seems to keep concentrating it.

    Show notes & companion links: BitLemmas.com

    Show More Show Less
    1 hr and 24 mins
  • The Right to Repair | Book Review
    Apr 23 2026

    BitLemmas | Episode 10: Book Review — The Right to Repair by Aaron Perzanowski

    Do you really own the devices you buy? In Episode 10 of the BitLemmas podcast, Watson, Drew, and B. Sovereign review The Right to Repair by Aaron Perzanowski - a deep dive into how manufacturers use design, economics, and law to strip consumers of true ownership over the products they purchase.

    From parts pairing and sealed devices to DMCA anti-circumvention clauses and server tethering, the hosts break down how repair has become a permission problem - and why that matters for your wallet, your autonomy, and the environment.

    In this episode:

    • Why "ownership" is now conditional - and what that really costs you
    • The three levers manufacturers use to block repair: design, economics, and law
    • How the repair-replacement loop drives planned obsolescence and e-waste
    • What parts pairing, authorized service providers, and warranty threats mean for independent repair
    • Real-world examples: Samsung refrigerators, HP printers, Tesla, BMW heated seats, Nintendo Switch 2, and carrier-locked phones
    • The DMCA, intellectual property threats, and the chilling effect on the right to repair
    • A buyer's checklist and a maker's checklist for repair-friendly products
    • Why repair is a market structure issue - and how open repair markets lower prices for everyone

    Whether you're a DIY repair enthusiast, a consumer tired of being locked out of your own devices, or a developer thinking about how to build maintainable, user-sovereign software, this episode gives you the framework to think clearly about digital ownership and consumer rights.

    🎧 More episodes & show notes: BitLemmas.com

    Show More Show Less
    1 hr and 4 mins
  • Thinking in Systems | Book Review
    Apr 16 2026

    Episode 9: Thinking in Systems

    What if the reason most problems keep coming back isn't bad luck or bad people — but bad structure? In this episode, Watson and B. Sovereign break down Thinking in Systems by Donella Meadows, one of the most quietly influential books in modern problem-solving, and extract a reusable method you can apply to your work, your finances, and the systems shaping the world around you.

    They walk through the book's four counterintuitive truths: purpose is what a system does (not what it says), stocks are memory, feedback beats linear cause and effect, and deep leverage lives in goals and paradigms. Along the way, the conversation moves from thermostats and bathtubs to Bitcoin nodes, Black Friday server architecture, the Federal Reserve, Beanie Baby inventory crashes, and the debate over standardized testing — all through the lens of systems thinking.

    You'll also learn to recognize three classic system traps — policy resistance, the tragedy of the commons, and the drift of low performance — and why the standard fixes almost always make them worse.

    By the end of the episode, you'll have a repeatable checklist: map behavior over time, name your stocks and flows, identify your feedback loops, locate the delays you've been ignoring, and find the real leverage point — because pulling the wrong lever is more common than anyone admits.

    In this episode:

    • The hierarchy of leverage points — and why tweaking numbers is almost never the answer
    • Why adding more developers can kill your team's output (the Mythical Man-Month, Kanban, and velocity)
    • How delays cause overshoot — from shower temperature to Fed monetary policy
    • What Bitcoin and open source software reveal about self-organizing systems
    • Why antifragility is the ultimate systems goal

    Companion slides, notes, and study cards available at bitlemmas.com.

    Show More Show Less
    1 hr
  • Layered Money | Book Review
    Apr 8 2026

    Is Your Money Real? | A Review of 'Layered Money' by Nik Bhatia

    Money is not a single thing; it is a pyramid of claims. In this episode, Watson and B. Sovereign dive into Nik Bhatia's seminal book, Layered Money, to provide you with a permanent "map" of the financial world. Whether you are dealing with gold, US Dollars, Bitcoin, or the emerging world of Central Bank Digital Currencies (CBDCs), understanding which "layer" you are on determines who actually controls your wealth.

    We break down the four counterintuitive claims from the book: why money is a hierarchy, how layers scale through trust, why the "pivot layer" is the ultimate seat of power, and how Bitcoin is forging a brand-new monetary pyramid

    What You'll Learn

    The Pyramid of Claims: Why your bank deposit isn't actually "money," but a layer-three claim on a liability.

    Settlement vs. Payment: Understanding the difference between a Visa instruction and final, irreversible settlement.

    The Pivot Layer: How central banks inserted themselves between settlement and commerce to gain surveillance and routing power.

    The Bitcoin Evolution: How Bitcoin serves as a globally accessible base layer and how Lightning Network scales it without the traditional trust trade-offs.

    CBDCs & The Fork: The critical difference between "Wholesale" infrastructure upgrades and the "Retail" surveillance tools being developed in Europe and the US

    Featured in this Episode

    • The History of Debasement: From shaving gold coins to modern fractional reserve banking.
    • The 1971 Pivot: How the retirement of the gold standard turned Treasuries (debt) into the world's base collateral.
    • The 2008 Crisis: Why the Fed became the "lender of last resort" when the layers of derivatives froze the system.

    The "Layer Audit" Action Plan

    Toward the end of the episode, we provide a concrete action plan for both listeners looking for an "exit path" and builders creating decentralized tools. Ask yourself: 1. What layer am I holding? 2. Who is the operator? 3. What happens under stress if that operator fails or censors me?

    Resources & Links

    • Companion Slides: Available in the show notes at bitlemmas.com.
    • Layered Money Cheat Sheet: A one-page guide to navigating the hierarchy.
    • Previous Episode Mentioned: A deep dive into Mastering Lightning

    Connect with BitLemmas: bitlemmas.com

    We want to hear from you! If you disagree with our map, drop a comment with your evidence

    If you found value in this episode, please subscribe and leave a review on your favorite podcast platform!

    Show More Show Less
    1 hr and 18 mins
  • The Democracy Project | Book Review
    Apr 1 2026

    Episode 7: A Review of The Democracy Project by David Graeber

    What if democracy isn't something you have — it's something you do?

    In this episode, Watson, B. Sovereign, and Drew dig into David Graeber's The Democracy Project, using it as a lens to examine what democracy actually means, why the system fears it breaking out, and what Occupy Wall Street was really trying to build.

    They unpack Graeber's core argument: that democracy is a practice, not a status — and that the most radical thing you can do is exercise self-governance before power has the chance to contain it.

    Topics covered:

    • How financialization, student debt, and credential inflation function as tools of extraction and control
    • The wealth-to-power feedback loop and what Graeber means by "captured institutions"
    • Why elections were never considered democracy — and what sortition, consensus, and general assemblies actually looked like historically
    • What Occupy did: narrative warfare, legal ambiguity, and the general assembly as message
    • Graeber's four core claims: action is the message, leaderless movements are harder to co-opt, consensus is anti-coercion, and revolutions change common sense — not laws
    • How to run a general assembly without burning out, and why subsidiaries (working groups) are the key
    • What all of this means for builders: don't build platforms that dictate the rules — build protocols that let groups create their own

    Key takeaway: The cultural shift always precedes the legislative one. Laws follow beliefs. Build small. Practice the skill. Change what people think is possible.

    📖 Book discussed: The Democracy Project by David Graeber

    🌐 More at bitlemmas.com

    Show More Show Less
    1 hr and 30 mins
  • Broken Money | Book Review
    Mar 25 2026

    Broken Money: Ledgers, Power, and the Future of Money


    The Ledger Framework of Money.
    In Episode 6 of the BitLemmas Podcast, Watson and B. Sovereign provide a comprehensive review of Lyn Alden's book, Broken Money . The discussion moves beyond traditional economic theories to present a more effective mental model: money as a ledger governance system . By defining money as a combination of a ledger, governance rules, and network effects, the hosts explain how technological shifts reshape the ways we record and transfer value . This framework allows listeners to analyze any currency by identifying who can change its rules and what the consequences of those changes are for the users .

    Understanding Broken Ledgers. The transcript identifies the primary characteristics of a failing monetary system, which includes deposit freezes, capital controls, and runaway inflation . These failures occur when the governance of a ledger is captured to serve a small group at the expense of the majority, often through the expansion of the money supply . This flexibility in state governed ledgers allows for the opaque redistribution of wealth, often benefiting those closest to the money printer while diluting the purchasing power of savers . The conversation also highlights why the modern banking system is fragile by design due to maturity transformation, which creates inherent instability when short term debts outweigh long term asset returns .

    The Three Types of Monetary Ledgers. The hosts break down the evolution of money into three distinct categories based on their governance . Nature governed ledgers, such as gold, rely on physics and scarcity, making them difficult to manipulate . State governed ledgers, or fiat currencies, operate by decree with rules that are flexible and easily changed by political power . Finally, user governed ledgers, such as Bitcoin, function through open source consensus where rules are transparent and enforced by the users themselves . Each system carries different trade offs regarding portability, verifiability, and counterparty rist.

    Strategies for the Modern Money Stack. The episode concludes with a practical framework for building a personal money stack to route around systemic constraints . B. Sovereign suggests that individuals should intentionally categorize their wealth into spending, emergency, savings, and escape layers . While traditional bank deposits offer convenience, they carry the risk of being unbanked or facing capital controls . The hosts encourage listeners to audit their exposure to state governed ledgers and consider tools like self custody and user governed assets to ensure they own a piece of a ledger that cannot be arbitrarily devalued or frozen.

    🌐 More at bitlemmas.com

    Show More Show Less
    1 hr and 28 mins
  • The Lightning Network | Book Review
    Mar 20 2026
    The Lightning Network: Instant Bitcoin Payments (and the Real Tradeoffs) If you've ever wondered whether Bitcoin can actually compete with Visa, or why it currently can't, this episode is for you. In the fifth episode of The Bitlemmas Podcast, Watson, B. Sovereign, and Drew dig into Mastering the Lightning Network by Andreas Antonopoulos. The one thing Watson wants you to walk away with: Bitcoin is the court. Lightning is the cash register. Lightning is not a new coin. It's not a new chain. It's a contract system built on top of real Bitcoin, with Bitcoin itself acting as the enforcement layer when something goes wrong. The book's core argument is that Bitcoin's Layer 1 was never designed to handle every coffee purchase on the planet, and trying to force it to do that would undermine the decentralization that makes it worth using in the first place. Lightning is how you get fast, cheap, private payments without giving up self-custody. Watson walks the team through four things the book gets right that most people misunderstand: Bitcoin is the court, Lightning is the cash register. Most Lightning payments never touch the blockchain at all. But every Lightning contract is always enforceable on-chain if needed. Bitcoin doesn't get faster; payments do. The settlement layer stays slow, final, and sovereign. The spending layer becomes instant and nearly free. And unlike credit cards, Lightning payments have no chargebacks. When it's done, it's done. Treat it like the cash in your pocket. A channel is a shared vault, not an account. Two parties lock up Bitcoin in a two-of-two multisig on-chain. Neither one can move those funds without the other's cooperation. Off-chain, they pass signed balance updates back and forth, called commitment transactions, which are cryptographically certain and far stronger than anything on paper. B. Sovereign puts it well: it's like a safe deposit box you both own, passing notes that say "I now have 90%, you have 10%." The on-chain layer only comes into play if someone tries to cheat, or when both sides decide to close things out. Multi-hop payments can be trustless. You can pay anyone on the Lightning network without a direct channel to them. The money routes through intermediaries, and none of them can steal it. The mechanism is HTLCs (hash time-locked contracts): the recipient creates a secret, hashes it, and the payment locks at every hop to that hash with a deadline. When the recipient reveals the secret to collect, that reveal unwinds backwards through every node in the chain. Either the full payment goes through, or everyone gets their money back. There's no partial outcome. As Drew points out, you're not just sending money; you're enforcing conditions across multiple parties at the same time. Lightning is a liquidity and operations game. Channel capacity is public. Channel balances are private. Inbound and outbound liquidity are not the same thing, and managing that difference is what Lightning operations actually comes down to. Pathfinding is probabilistic, not a straight line. Payments can fail mid-route because a node's liquidity is sitting on the wrong side. B. Sovereign pulls from his finance background here: without balance between supply and demand, nothing moves. Running Lightning properly takes uptime, backups, security hygiene, and regular rebalancing. It is not a set-and-forget wallet. The conversation also covers the risks that tend to get skipped in the hype. Lightning is a hot wallet by design, which means your keys live on an internet-connected device. People the team knows personally have lost money running Lightning nodes without proper care. Watchtowers exist to protect you when you go offline, but only if you set them up and use them. Liquidity jamming is also a real attack where someone deliberately locks up your channels and stops you from processing payments. Watson wraps up with straightforward advice: Bitcoin is your savings, Lightning is your spending. Don't confuse the two. Get a noncustodial wallet like Phoenix or Muun, put $20 worth of Bitcoin in it, and make one payment this month. Get comfortable before you try to optimize anything. And if you're building on Lightning, run a node for a month, open a few channels, and experience the friction yourself, because that friction is where the next round of useful tools needs to come from. 🌐 More at bitlemmas.com
    Show More Show Less
    1 hr and 9 mins