Intentional Theory

It's not the what of information, it's the why of intention
Intentional Theory

From Bits to Intentions

Claude Shannon’s Information Theory gave us the bit—the foundational unit of data. It enabled the design of systems that transmit information reliably across noisy channels, without concern for meaning, authorship, or truth. Information Theory is technical and elegant, but intentionally blind to context. It’s about getting the message through, not understanding it.

Intentional Theory starts where Information Theory ends.

Its basic unit is not the bit, but the event: a message signed by a verifiable identity using a cryptographic key. An event is more than data—it is an act of intention. It is authored, accountable, and traceable to a persistent identity. It says, “I meant this.”

Digging Deeper - Intentional Theory

The failure of many existing platforms is not just in execution, but in assumptions. They start with moral positions (“hate speech is bad”), governance defaults (“trust verified users”), or epistemological claims (“this is misinformation”), and encode these into the system. Even when well-intentioned, these assumptions create structural biases privileging some voices, identities, or truths over others.

Intentional Theory goes deeper. It asks: What happens if we strip away those assumptions? What if we build from first principles: agency, authorship, verifiability without presuming morality, truth, or identity? What if we trust people to build their own truth frameworks on top of a neutral, accountable base?

That’s the promise of Intentional Theory. It doesn’t solve content moderation. It doesn’t enforce civility. It doesn’t even define truth. But it does something more important: it creates space for truth, civility, and meaning to emerge on our terms—not those of hidden algorithms or invisible authorities.

Distillation into Axioms

The following is a distillation of the analysis into a coherent set of axioms that define the core of Intentional Theory—a conceptual framework for understanding communication in decentralized systems where authorship, intention, and agency are foundational.

While traditional models of communication emphasize the objective transmission of data, Intentional Theory starts from a deeper premise: that meaning originates in the intentional acts of identifiable agents, and that communication is meaningful only insofar as it is attributable and accountable. These axioms articulate the minimum conditions under which an event can be considered authored, verifiable, and socially interpretable. They offer a way to build systems that provide a neutral substrate for expression, free from centralized control or algorithmic interference, enabling subjective truth and shared understanding to emerge through human interpretation and social processes.

Axioms of Intentional Theory

These axioms establish the foundational principles of Intentional Theory, a framework for understanding communication in decentralized systems where authorship, intention, and agency are primary. Unlike traditional models that focus on the transmission of data or the objective content of messages, Intentional Theory begins with the assumption that meaning arises from the intentional acts of identifiable agents. These axioms define the conditions under which events are considered authored, verifiable, and socially meaningful, providing a neutral substrate upon which subjective truth and collective understanding can be constructed without interference from centralized platforms or artificial intermediaries.

  1. Axiom of Intention
    Every meaningful act of communication originates from an intentional agent.

  2. Axiom of Expression
    An intention becomes an expressed event only when it is made externally observable by the agent.

  3. Axiom of Authorship
    An event is considered authored when it is cryptographically signed by the agent who expresses it.

  4. Axiom of Uniqueness
    Each signed event is uniquely identifiable and immutable by virtue of its content and cryptographic signature.

  5. Axiom of Subjective Truth
    A signed event constitutes a subjective truth for its author; it is a verifiable declaration of their intention, not necessarily an objective fact.

  6. Axiom of Rumour
    An unsigned event, or one lacking verifiable authorship, is a rumour—it exists without intentional accountability and cannot be treated as a fact.

  7. Axiom of Interpretation
    The truth-value or meaning of an event is determined outside the system, through interpretation and social context.

  8. Axiom of Agency Integrity
    The system must preserve the integrity of agency, ensuring that each identity corresponds to a persistent and verifiable source of intention.

  9. Axiom of Neutral Substrate
    The communication protocol must act as a neutral substrate, transmitting events without modifying, filtering, or ranking them based on content.

  10. Axiom of Social Construction
    Collective understanding and trust emerge through social processes acting on signed events, not from the system itself.

Practical Application of Consciousness and Quantum Theory

This approach to intentional communication quietly reflects deeper insights from both consciousness theory and quantum theory, even though it does not explicitly depend on them. From consciousness theory, it borrows the recognition that entities capable of expressing intention—by signing events—can be treated as having subjective experiences, at least within the system. Each signed event is a declaration of perspective, a trace of volition, not unlike the minimal signal of awareness. Similarly, from quantum theory, it takes inspiration from the idea that events are inherently unique and only become meaningful when observed or measured in relation to a broader context. In this model, the social layer—where trust, meaning, and truth emerge—is akin to the classical world: a macroscopic phenomenon arising from many discrete, probabilistic actions aggregated and interpreted by observers. Social reality, then, is not embedded in the protocol but arises on top of it, as an emergent, intersubjective construct.

Importantly, this model makes no claim to being a theory of consciousness, nor does it presume to implement or simulate quantum mechanics. Rather, it acknowledges these frameworks as metaphors that help us respect the boundaries of what such a protocol can and cannot do. It does not assume anything about the moral value, truthfulness, or reality-status of the messages it transports. Instead, it provides a neutral, accountable substrate where such judgments are left to intentional agents operating in the social domain. In doing so, it reinforces the principle that integrity of expression, not interpretation, is what a communication protocol should guarantee.

Many existing communication protocols and platform architectures are built on implicit classical worldviews or moral assumptions that become encoded into their foundational design. These may include assumptions about identity (e.g., real-name policies), trust (e.g., reliance on centralized authorities), legitimacy (e.g., content moderation norms), or truth (e.g., algorithmic ranking of “authoritative” sources). While often well-intentioned, these embedded axioms inevitably reflect the values, norms, and power structures of their creators leading to systems that enforce a particular worldview or authority dynamic. As a result, they tend to privilege certain actors: institutions, governments, corporations while marginalizing others, particularly those with alternative perspectives, identities, or epistemologies.

This bias is not necessarily the product of malice; rather, it stems from starting at the wrong level of abstraction. When systems begin with assumptions about what is good, true, or acceptable, they lose neutrality and inevitably shape discourse to reflect those assumptions. To address this, one must dig deeper, go beneath cultural norms, institutional paradigms, and even classical notions of reality, to identify more fundamental axioms: authorship, intention, uniqueness, and accountability. By anchoring protocol design in these deeper, morally neutral principles, it becomes possible to build communication systems that do not encode hierarchy or ideology, but instead empower all agents equally to express themselves, verify one another, and construct social meaning on their own terms. This shift doesn’t eliminate disagreement or conflict, but it does eliminate the structural inequities imposed by systems that quietly take sides from the start.

Nothing New Under The Sun

There is nothing new under the sun. While the technologies may be new, the human spirit and endeavours are largely unchanged.

The emerging architecture of decentralized, intention-based communication systems bears a striking resemblance to the creation of the Chartres Cathedral, a monumental achievement of Gothic architecture that arose not from a single plan or authority, but from the confluence of multiple forces: religion, technology, society, and trade. Chartres was not merely a place of worship; it was a manifestation of an evolving worldview, incorporating advances in engineering (ribbed vaults, flying buttresses), theological symbolism (light as divine truth), and the economic vitality of its surrounding community. It stood as both a spiritual and social infrastructure—built over generations, shaped by many hands, and reflective of a shared but dynamic sense of purpose.

Likewise, today’s emerging protocols—like Nostr and others grounded in cryptographic intention are not just technical artifacts; they are becoming the digital cathedrals of our age. They weave together innovations in cryptography, new models of identity and agency, shifting political consciousness, and a growing demand for autonomy in how we communicate and construct truth. No single actor controls their design. Instead, they evolve organically, informed by open-source collaboration, philosophical inquiry, social critique, and real-world stress-testing. Just as the Gothic cathedral gave physical form to a new way of relating to the divine and to one another, these protocols give informational form to a new way of relating to truth, trust, and intention—one that transcends centralized authority and embraces the complexity of a pluralistic world. They are cathedrals not of stone, but of signed events, public keys, and voluntary association, each block laid with intention, not coercion.

Systemic Failure - We’ve Been Here Before

The failure of existing digital platforms lies not just in technical shortcomings, but in their drift toward centralized power and gatekeeping, echoing a familiar historical pattern. In their early stages, many platforms promised openness, connection, and empowerment but over time, their stewards began to act less like facilitators of communication and more like digital monarchs, shaping discourse, defining truth, and privileging certain voices over others. This mirrors the fate of medieval monastic houses, where abbots—once humble stewards of knowledge and service gradually adopted the airs and privileges of nobility. Detached from their founding purpose and increasingly entwined with power, they became vulnerable to the very social forces they had tried to control. When change came through reformation, revolution, or simply obsolescence they were swept aside. Today’s digital platforms face a similar reckoning. Their centralization of control, moral paternalism, and algorithmic opacity have led them to betray their original ideals. Intentional Theory offers a path forward not to rebuild power in a new image, but to design systems that avoid the trap altogether by returning agency and authorship to the edge, where it belongs.

Historical Echoes

The historical echoes are unmistakable: just as earlier periods of centralization and control gave rise to reformations and revolutions, today we see a similar momentum building through the rise of the cypherpunk and decentralized movements. These communities, much like the early humanists or dissenting reformers of past eras, are responding to overreach—not of religious institutions or monarchs, but of opaque algorithms, corporate surveillance, and platform monopolies. The cypherpunk ethos “privacy through cryptography” represents a reclaiming of individual agency, echoing earlier struggles to wrest authority from centralized power and return it to the individual. Decentralized protocols, distributed identity systems, and cryptographic tools are modern equivalents of the printing press and vernacular literacy: technologies that shift the balance of power by enabling direct, verifiable expression beyond institutional control. In this light, today’s digital upheaval is not just innovation it’s a continuation of a deeper historical cycle, one that insists, again and again, that systems must serve people, not the other way around.

New Technologies

Public Key Cryptography

Public-key cryptography enables a model of communication rooted in verifiable authorship and intention. In this system, every identity is represented by a public key, and each message is digitally signed using a private key held by the author. The signature is not merely a technical marker—it is a deliberate act of authorship, a proof that the message was created and endorsed by a specific agent.

This foundation creates what can be described as algorithmic accountability: the ability to confirm that a message was intentionally authored by a known cryptographic identity, without relying on external authorities or intermediaries. There is no need to trust reputation systems or centralized gatekeepers. What matters is not who someone claims to be, but that they can prove authorship through cryptographic means. It shifts trust from subjective identity to objective verifiability—placing control and accountability directly in the hands of the communicating agent.

Identifiable Agents

In the context of Intentional Theory, an identifiable agent is defined as any process—human, organizational, or automated—that possesses a private key and can use it to sign events in a verifiable manner. This cryptographic capability establishes accountability and authorship within the system, enabling the agent to make intentional declarations that can be traced to a consistent identity (represented by the corresponding public key). The agent’s identity is not determined by external attributes such as name or origin, but by its ability to produce signatures that can be publicly verified. This definition ensures that intention is always anchored to a persistent, accountable source, regardless of whether the agent is a person, a group, or a machine.

An Implementation: The Nostr Protocol

A potential implementation of Intentional Theory can be seen in the design and architecture of Nostr. As a decentralized communication protocol, Nostr embodies many of the theory’s core axioms: each message (or event) is signed by a cryptographic key, establishing authorship and intentionality; identities are defined by public keys, not by centralized registries; and the protocol itself acts as a neutral substrate, simply relaying events without interpreting, filtering, or ranking them. While Nostr does not formally claim to implement Intentional Theory, it aligns closely with its principles by enabling a communication environment where authorship is verifiable, truth is socially constructed, and agency is preserved without reliance on centralized platforms or intermediaries. In this way, Nostr demonstrates how Intentional Theory can move from abstract framework to concrete application offering a blueprint for building digital systems that respect and preserve human intention.

The Nostr protocol uses public keys based on BIP340, the specification for Schnorr signatures over the secp256k1 elliptic curve. This cryptographic scheme enables what can be described as algorithmic accountability a form of verifiable authorship grounded in mathematics rather than trust in institutions or intermediaries. Each event in Nostr is signed with a private key, and the corresponding public key acts as a persistent, pseudonymous identifier. Because Schnorr signatures are deterministic and non-malleable, anyone can independently verify that a given event was authored by the holder of a specific private key, without revealing that key or requiring third-party validation.

This form of accountability is algorithmic because it does not rely on identity verification in the traditional sense (e.g., real names, biometrics, or centralized certificates), but instead on cryptographic proof. The system ensures that only the agent in possession of the private key could have authored the event, providing a robust foundation for intentional communication. It also ensures that identities cannot be spoofed or forged, as signatures that do not match the public key are invalid. In this way, Nostr provides a substrate where intention and authorship are inseparable, persistent, and computationally verifiable enabling decentralized trust without reliance on external authorities.

In the End, Intentional Theory is Just a Tool for Tools

Intentional Theory (IT) is not a belief system, moral stance, or philosophical claim about the nature of truth or consciousness—it’s simply a tool for building better tools. Rooted in a few clear insights about agency, authorship, and verifiability, it offers a minimal but principled foundation for designing digital systems that respect the intentional acts of those who use them. By anchoring communication in verifiable intention—rather than centralized authority, social verification, or opaque algorithmic mediation—it opens the door to platforms that are more accountable, transparent, and resilient. It doesn’t prescribe values or outcomes, nor does it attempt to define what is right or real. Instead, it provides the scaffolding for individuals and communities to decide that for themselves. At its core, Intentional Theory is not an ideology—it’s an architectural guide for creating digital environments that preserve and empower human agency.

What are you waiting for? Start building!

No comments yet.