PlayDAO is also where participants build reputation and influence within the TOTEM developer, investor and shared interest communities.
(fig.3: PlayDAO, the stewardship community for the development of TOTEM)
In order to create, administer, join, and maintain a DAO, there are a number of technical skills that are required of its members. This makes earlier DAO versions fairly limited in their ability to serve all of society or even just a small portion. We've designed PlayDAO to help make the process of forming, joining and maintaining a DAO much easier and more accessible to non-technical people.
TOTEM and how it combines PlayDAO governance and organizing, with Equity, Influence and Reputation Tokens and with TOTEM FOLIO Token Curated Registries and Smart Contracts, all accessible via TOTEM CHAT, programmable chat, is designed for much wider adoption of digital and blockchain means, for value flow and knowledge flow ends.
PlayDAO governance protocols using CoGov foundational agreements
The development of TOTEM will require network authority. Specific constraints on the data-model must be enforced eg because users need a consistent location to find and share authenticated data. However, the risk of using an authority is that it can lead to manipulation of datasets in ways users do not want. To offset this risk, constitutional network protocols can be used, i.e a set of protocols that automatically enforce a published code. In the case of TOTEM governance, applying the CoGov set of protocols for alignment and guiding agreements, including the foundational agreement for PlayDAO.
Historically constitutional networking protocols turned code has been called the "protocol" which is memorialized into the canonical programmatic features and capabilities of the network via the minting of the “genesis block" which forms the foundation upon which all additional verification blocks are based.
Here we will call that code a “constitution.” It provides a set of rules for the operation of a decentralized authority, wherein the authority is the code and where the governance, social norms, capital controls, and monetary policy are also defined and maintained. Participants in a network can use a tokenized constitution to audit and validate the terms, conditions, rights, and affordances of the stakeholders which can be defined in a hierarchy of roles that are made accessible by explicitly defined procedures. By auditing the authority’s ledger, users can ensure that the constitution is being followed Anyone attempting to deviate from the agreed-upon rules and conventions will find it impossible to commit these activities to the network, i.e if you try and change the representations that have been made in a data entry, the hash-link that connects that entry to the network will break, and the network log will show that you tried to change data that was meant to be immutable.
Constitutions can be used to guide and manage distributed governance, including a transfer of authority from operators to protocols and from human agents to machine agents. Datasets may only be changed according to the rules written into the constitution. By tallying the ledger and replaying the changes, users can detect when the rules have been broken (which would result in a state mismatch). As a result, users can focus on the design of the constitutional code to guarantee the network’s activity. Users are less interested in who is running the network than how it is designed.
All protocols and standards have a role in guaranteeing behaviors and rights and reducing the authority of individual entities. However, the unique power of the constitution is its ability to constrain the behavior of an appointed Authority. When an authority must be used, a constitution provides checks and balances.