Protocols Are Everything
Every era of human civilization runs on protocols. Institutions are the runtimes that implement them. When the protocol changes, the runtime adapts or becomes a historical artifact.
There is a way of looking at history that makes most of it legible in a single frame. Not all of it. History resists single frames, and anyone who tells you otherwise is selling something. But most of the large structural changes -- the ones that rearrange power, dissolve old institutions, and force new ones into existence -- follow a pattern that is worth understanding precisely, because we are living through such changes right now and many are misreading it.
The pattern is this. Every era of human civilization runs on a set of protocols -- shared rules, standards, and conventions that allow strangers to coordinate economic, social, and political activity without having to negotiate from scratch every time they interact. Money is a protocol. Property rights are a protocol. Dispute resolution is a protocol. The rules of evidence in a courtroom are a protocol. The technical specifications that allow one computer to talk to another are protocols.
Protocols are not the same as institutions. Institutions are the organizations that implement protocols -- the banks, the courts, the exchanges, the universities, the armies, the churches. They are, to borrow a term from software engineering, the runtimes. They are the execution environments in which a protocol's rules are actually enforced, its transactions processed, its participants served.
The confusion between protocols and institutions is the source of most of the analytical errors people make when they try to understand large historical transitions. They look at an institution and ask whether it will survive. That is the wrong question. The right question is whether the protocol the institution was built to implement is still the dominant protocol, or whether a new protocol has emerged that the institution is not well-designed to run.
When the protocol changes, the institution has a choice. It can adapt -- find a way to implement the new protocol using its existing capabilities, relationships, and regulatory standing. Or it can defend the old protocol -- argue for its continued relevance, seek regulatory protection, slow the transition. The institutions that choose the first path survive and often become more powerful than they were before. The institutions that choose the second path eventually become historical artifacts, however large and well-resourced they are in the moment of their resistance.
This is not a new observation. But it is often underappreciated, because the transitions are slow enough that the institutions doing the defending can usually convince themselves, and often convince their regulators and clients, that the protocol hasn't really changed. That the new thing is a fad. That the fundamentals still apply. That the castle walls are still standing.
Money
A familiar domain in which to see this pattern is money, because the protocol transitions in money are well documented and the precisely analyzable.
The Bretton Woods system, established in 1944, was not primarily a political agreement. It was a protocol deployment. The forty-four nations that met in New Hampshire that summer were specifying the rules of a new international monetary system -- fixed exchange rates anchored to a dollar pegged to gold at thirty-five dollars per ounce, with the IMF as the governance layer and the World Bank as the development finance runtime. They were, in the language of software, writing a specification and then deploying it through the institutional runtimes available to them: the Federal Reserve, the major commercial banks, the correspondent banking network that would carry dollar flows across borders.
The institutions that Bretton Woods created or empowered were runtimes built to implement that specific protocol. Their power derived from their role as nodes in the Bretton Woods network. Remove the protocol and the power changes character entirely.
Robert Triffin saw the problem before almost anyone else did. In 1960, eleven years before the collapse, he described what would come to be known as Triffin's Dilemma. For the rest of the world to hold enough dollars to conduct international trade, the United States had to run persistent balance-of-payments deficits -- exporting dollars. But persistent deficits would eventually undermine confidence in the dollar's gold convertibility. The protocol required American profligacy to function. It required American discipline to survive. It likely could not have both indefinitely.
What Triffin identified was a flaw in the protocol architecture itself, not in any particular institution's management of it. The Bretton Woods protocol had been designed around the dollar as the sole anchor, which meant it had been designed around the constraints and incentives of a single sovereign runtime. That is a fragile architecture. Single points of failure in protocols tend to become actual failures eventually, and the timing is usually determined by political rather than technical factors. The IMF created the Special Drawing Right in 1969, two years before the collapse. This was, in retrospect, a recognition that the protocol was architecturally flawed and needed a patch.
Energy
The history of energy is, in some ways, an even cleaner illustration of the protocol-runtime pattern than the history of money, because the transitions are more abrupt and the runtime obsolescence is more visible.
Coal replaced wood not because coal was discovered -- wood had always been a less efficient fuel than coal for most industrial purposes -- but because the steam engine created a protocol that required energy in a form that wood couldn't efficiently provide at scale. The steam engine was the protocol. Coal was the fuel specification within that protocol. The institutional runtimes that emerged -- the coal mines, the railways, the steam-powered factories, the cities organized around coal access -- were built to implement the steam-engine protocol.
When the internal combustion engine and electrical generation created a new protocol, coal didn't disappear overnight. It persisted, and still persists, because the runtimes built around it -- the mining communities, the power utilities, the rail freight networks, the industrial processes optimized for coal energy -- had enough inertia and enough political protection to slow the transition. But the direction of the transition was set by the protocol, not by the runtimes defending the old one.
Oil is the more interesting case because the transition away from it is happening in a context where the protocol being displaced is deeply embedded in geopolitical as well as economic institutional runtimes. The oil major is not just an energy company. It is a node in a geopolitical protocol that connects sovereign revenues, military relationships, reserve currency flows, and great-power competition in a network that is much harder to transition than a single fuel supply chain. The OPEC runtime, the petrodollar runtime, the national oil company runtime -- these are implementations of a protocol that spans energy, finance, and sovereignty simultaneously. Transitioning away from oil is not just an energy protocol transition. It is a geopolitical protocol transition, and the resistance to it draws its strength from every institutional runtime that is co-evolved with the oil protocol, not just the energy ones.
Renewables represent a protocol whose technical specification is now clear but whose institutional runtimes are still being defined. The physics of solar and wind are well understood. The engineering of storage, transmission, and grid management at renewable scale is increasingly well understood. What is not yet resolved is the institutional architecture -- the ownership models, the regulatory frameworks, the market structures, the financing runtimes -- that will implement the renewables protocol at civilizational scale. That institutional uncertainty is what most of the current political conflict about energy is actually about, even when it presents itself as a conflict about the physics or the economics.
Nuclear fission is the most instructive example of a protocol whose institutional runtimes were wrong for it.
The physics of controlled fission for civilian power generation was understood by the early 1950s. The protocol was technically deployable. What followed was not a straightforward deployment but a series of runtime failures -- cost overruns, regulatory paralysis, construction disasters, and eventually Three Mile Island and Chernobyl -- that were not failures of the physics but failures of the institutional architecture. The utilities, the regulators, the construction firms, the insurance markets that were asked to implement the fission protocol were runtimes built for a different protocol entirely. They were designed for the risk profile, the construction methods, the operational requirements, and the regulatory frameworks of coal and gas plants. When they were asked to implement fission, they applied the wrong runtime to the protocol, with predictable results.
This is a pattern worth sitting with. The failure of civilian nuclear power in the twentieth century was not a physics failure or even primarily an economics failure. It was a runtime failure. The protocol was sound. The institutions asked to implement it were not designed for it, and they didn't adapt.
What is happening now with fission -- the small modular reactor programs, the new generation of reactor designs, the companies approaching nuclear construction with software-industry methods rather than construction-industry methods -- is an attempt to build runtimes that are actually designed for the fission protocol rather than adapted from runtimes built for other protocols. Whether those runtimes will succeed is genuinely uncertain. But the nature of the attempt is instructive.
Fusion is a different kind of problem. The fusion protocol is theoretically understood. The physics of plasma confinement, of tritium breeding, of net energy gain from a fusion reaction -- none of these are mysterious. What has been missing is not understanding but runtime capability. The confinement problem, the materials problem, the plasma instability problem are engineering problems, not physics problems. They are the challenges of building a runtime adequate to implement a protocol that has been waiting for it.
The engineering progress at several private fusion companies in the last five years suggests that adequate runtimes may be approaching. If they arrive, the energy protocol transition that follows will be the most significant since the steam engine, because fusion fuel is effectively unlimited and fusion waste is manageable in a way that fission waste is not. The institutional runtimes built around energy scarcity -- the oil markets, the gas pipelines, the coal mines, the uranium supply chains, the geopolitical structures organized around fossil fuel control -- would face obsolescence of a kind that makes the current renewables transition look gradual.
That is worth stating plainly. Not as a prediction of when fusion becomes commercially viable -- nobody knows that, and anyone who claims to is overstating their certainty -- but as a description of what happens to institutional runtimes when the protocol they implement becomes obsolete. It doesn't happen all at once. It happens at the edges first, then faster than most expect.
Defense
Gunpowder is where the protocol-runtime argument gets violent.
The feudal military runtime -- the castle, the armored knight, the walled city -- was built for a specific military protocol. That protocol had a particular constraint structure: attack was slow and expensive, siege required enormous resources and time, and the cost of offensive capability was high enough that defensive capability could achieve meaningful equilibrium. A sufficiently thick wall, a sufficiently deep moat, a sufficiently elevated position could make a territory defensible by a small number of trained fighters against a much larger attacking force. The castle was the correct runtime for that protocol. It was expensive to build and, within the constraints of the medieval military protocol, nearly impregnable.
The feudal social order -- the lord, the serf, the knight, the church as the legitimating runtime, the entire hierarchy of obligation and protection that organized European society for several centuries -- was co-evolved with the military protocol that the castle implemented. Power derived from the ability to defend territory. The ability to defend territory derived from the castle. The castle was not just a building. It was the physical implementation of a social and political protocol.
Gunpowder dissolved the defensive constraint in a single technological generation. A castle wall that had been impregnable for centuries became a liability almost overnight -- a fixed, immovable target for artillery that could reduce it to rubble in hours. The runtime that had defined political power in Europe for five hundred years became obsolete faster than anyone who depended on it could adapt. And because the castle runtime was so deeply co-evolved with the feudal social protocol, the obsolescence of the castle wasn't just a military event. It was a civilizational one.
What replaced the feudal runtime were the institutional runtimes of the gunpowder protocol: the standing army, requiring a centralized state with a tax base sufficient to maintain it, requiring a bureaucratic apparatus to administer it, requiring a manufacturing base to supply it. The nation-state, in its modern form, is largely a runtime built to implement the gunpowder military protocol. It is not a natural form of human organization. It is an institutional response to a specific technological protocol transition.
This is the pattern at its most violent and most visible. A protocol transition in military technology doesn't just change how wars are fought. It changes who holds power, what institutions those power-holders build to maintain it, and what social order those institutions sustain. The gunpowder protocol didn't obsolete the castle and leave everything else intact. It restructured civilization around the new runtimes that the new protocol required.
The arms race is what happens when two or more institutional runtimes are implementing competing versions of the same military protocol simultaneously, each trying to achieve decisive advantage before the other does. And the important observation about arms races -- the one that the Cold War illustrates most clearly -- is that they are never purely military competitions. They are always also institutional competitions. The question is not just which side has better weapons. It is which institutional architecture can sustain the resource demands of the protocol competition over time.
The Soviet runtime lost the Cold War before its weapons became inferior. The command economy, the centralized planning apparatus, the political runtime that required ideological conformity over operational efficiency -- these were institutional failures, not military ones. The Soviet military protocol was, by many measures, technically competitive with the American one. The Soviet runtime could not sustain the demands of implementing it. The protocol outlasted the runtime that was trying to implement it, which is the runtime's definition of failure.
Nuclear weapons introduced something that no previous military protocol had produced: a protocol whose full implementation was mutually suicidal. Every previous military protocol had rewarded the runtime that deployed it most effectively. Nuclear weapons created a protocol where decisive advantage was theoretically achievable but practically unexercisable. Full implementation destroyed the implementing runtime.
The institutional response to this was the creation of governance runtimes whose explicit purpose was to prevent the protocol's full implementation. The Non-Proliferation Treaty, the IAEA inspection regime, the arms control treaties, the doctrine of mutually assured destruction itself -- these are runtimes built not to implement a protocol but to constrain it. This is historically unusual. Previous military protocol transitions had generated runtimes designed to deploy the new capability as effectively as possible. Nuclear weapons generated runtimes designed to ensure the capability was never fully used.
Whether those constraint runtimes have succeeded is a matter of perspective. Nuclear weapons have not been used in warfare since 1945. Whether that reflects the success of the constraint runtimes or the deterrence logic of the protocol itself or simple luck is genuinely uncertain, and anyone who is confident about the answer is probably not thinking about it carefully enough.
The open question the nuclear case raises is whether other protocol transitions generate similar constraint runtimes before the protocol's full implementation produces irreversible consequences. The history of nuclear weapons suggests that constraint runtimes can be built, that they can function imperfectly but adequately for long periods, and that their construction requires the kind of sustained institutional cooperation that is hardest to achieve precisely when the protocol transition is moving fastest. That observation applies to several current protocol transitions in ways that are worth thinking about without this document needing to specify which ones.
The current military protocol transition is from kinetic to cyber. Not a replacement -- kinetic capability remains necessary and will remain necessary -- but a shift in where decisive advantage is achieved and where decisive vulnerability lies. Armies and navies and air forces are still relevant. But the infrastructure on which modern societies depend -- the power grids, the financial systems, the communication networks, the supply chains -- is increasingly the actual battlefield, and it is defended not by armies but by the companies that built and operate it.
This creates an institutional situation with no clear precedent. The runtimes that defend critical civilian infrastructure against state-level cyber adversaries are private companies. Some of them are among the largest and most capable technology companies on earth. They did not choose this role. It emerged from the protocol transition. The line between civilian runtime and military runtime is dissolving in the cyber protocol in ways that the institutional and regulatory frameworks of the kinetic protocol era were not designed to manage.
The nation-state, as a runtime built for the gunpowder protocol, is poorly designed for a world where the most important defensive capability is distributed across private infrastructure operators whose interests and obligations are commercial rather than sovereign. That is not a criticism of any particular company or government. It is a description of what happens when a protocol transition moves faster than the institutional runtimes built for the previous protocol can adapt.
Education
The university was built for the knowledge-scarcity constraint. When books were rare and expertise was geographically concentrated, the institution that gathered books, experts, and students in one place was providing something genuinely scarce and genuinely valuable. The campus was not an aesthetic choice. It was an operational necessity. You could not have the knowledge without going to where the knowledge was.
The internet dissolved the knowledge-scarcity constraint completely and relatively quickly. The knowledge is no longer scarce. It is, in most domains, freely and immediately available to anyone with a connection and the ability to use it. What the university still provides -- credentialing, social sorting, the signaling function of selective admission, the network of relationships formed during attendance -- is not nothing. But it is a different thing from what the university was originally built to provide, and the institutional architecture of the university has not adapted to reflect that difference.
The cost structure of the university runtime is organized around the knowledge-delivery function that the internet has already replaced. The tenured faculty, the physical campus, the administrative apparatus, the library -- these are implementations of a protocol that has been superseded for most of what it was originally designed to do. The credential remains valuable because the institutional runtimes that consume it -- the law firm, the hospital, the government agency, the large corporation -- have not updated their hiring protocols to reflect the fact that the knowledge the credential supposedly certifies can now be acquired and demonstrated without institutional affiliation.
That lag between protocol transition and runtime adaptation is normal. It is also, for the people caught in it -- the students paying for a credential whose value is declining, the faculty defending an institutional model that the protocol has already passed by -- genuinely costly.
The runtimes being built to replace the university are not yet clearly defined. Online courses, coding bootcamps, portfolio-based credentialing, demonstrated competence through open-source contribution, apprenticeship models -- these are early experiments in what the education runtime looks like when it is designed for the actual protocol rather than for the knowledge-scarcity constraint that no longer exists. None of them has yet achieved the combination of credentialing authority, social legitimacy, and network value that the university still holds. That gap will close. The direction is not uncertain. The timing is.
Healthcare
The hospital was built for the diagnostic-scarcity constraint. Medical knowledge was concentrated in trained professionals. Equipment was expensive and physically large. Treatment required the patient to go to where the expertise and equipment were. The hospital was the correct runtime for that protocol. Gathering physicians, equipment, and patients in one place was operationally necessary given the constraints of the era.
Remote diagnostics, continuous biometric monitoring, AI-assisted diagnosis, and programmable drug delivery are dissolving the diagnostic-scarcity constraint. The expertise and the monitoring capability are increasingly available outside the institutional setting. The equipment is increasingly miniaturized and affordable. The patient is increasingly capable of generating diagnostic data continuously and transmitting it to whatever runtime is best positioned to interpret it.
The hospital runtime will not disappear. There are procedures that require physical presence, specialized equipment, and trained hands in proximity to the patient that no protocol transition will eliminate. But the hospital as the primary runtime for most healthcare interactions -- the routine diagnostics, the chronic disease management, the mental health support, the preventive care -- is a runtime built for a constraint that is dissolving. The institutional architecture that follows will be organized around the patient's location and continuous data rather than around the institution's equipment and specialist concentration.
The resistance to this transition is coming from the institutional runtimes that are co-evolved with the hospital model: the insurance runtime, the licensing and credentialing runtime, the liability framework runtime, the pharmaceutical distribution runtime. Each of those runtimes was designed for a healthcare protocol organized around institutional settings and episodic care. Each of them will need to adapt or be adapted around.
Protocols in Tension
The transitions described above are not happening sequentially or independently. They are happening simultaneously, in domains whose institutional runtimes are deeply co-evolved, and the tensions between protocols in transition are where the most important and least predictable dynamics occur.
Consider the energy-welfare tension. The obsolescence of fossil fuel runtimes is technically driven by the renewables and potentially the fusion protocol. But the fossil fuel runtimes are co-evolved with the employment and community infrastructure of entire regions. The coal miner and the oil worker and the petrochemical plant employee are not just workers in an energy industry. They are participants in a social and economic protocol organized around a specific kind of industrial employment. When the energy protocol transitions, the welfare protocol -- the set of institutional runtimes designed to manage the consequences of economic disruption for people who cannot easily adapt -- is suddenly required to do something it was not designed to do, at a scale and speed it was not designed to manage.
This is not a political observation. It is a systems observation. When two co-evolved protocols transition at different speeds, the friction between them generates social and political stress that is often misread as resistance to the technical transition itself. The resistance is real, but it is not primarily about the technology. It is about the institutional runtimes that the technology is obsoleting and the people whose lives are organized around those runtimes.
The education-credentialing tension is similar in structure. The knowledge protocol has transitioned. The credentialing protocol has not. The result is a system in which people can acquire genuine competence outside institutional settings but cannot easily demonstrate that competence to the institutional runtimes that still use credentials as proxies for it. That gap is not an accident or a failure. It is a predictable consequence of two co-evolved protocols transitioning at different speeds.
These tensions are not resolvable by choosing one protocol over the other. They are manageable, imperfectly and over time, by building institutional runtimes that can implement the new protocols while absorbing the transitional costs of the runtimes being displaced. That is harder than it sounds, and it requires a clearer understanding of what is actually happening than most of the political and institutional debate currently demonstrates.
What This Means for the People Building
This Protocols Are Everything note is geared primarily for engineers and for the people who think about systems the way engineers think about systems. The reason is not that other people are incapable of understanding the argument. It is that engineers like us are the people most likely to be archhitecting tomorrow's runtimes right now, and the framing matters for what we all are building.
If you understand yourself as building a product, you optimize for product metrics. If you understand yourself as building a runtime for a protocol that is replacing a previous generation of institutional runtimes, you optimize for different things: interoperability, governance, resilience, the ability to implement the protocol across a wide range of institutional contexts rather than just the initial one.
The most important runtimes in history were not built by people who thought they were building products. They were built by people who understood they were implementing a protocol that the world needed to run on, and who made design decisions accordingly. Those decisions are hard to make correctly when you are under pressure to ship, to grow, to generate revenue, to satisfy investors who are thinking about a three-year horizon rather than a hundred-year one.
The observation is not that short-term pressures are wrong or that all infrastructure should be built on a hundred-year timeline. It is that the protocol framing and the product framing produce genuinely different design choices, and the design choices made in the early years of a runtime's existence tend to persist long after the people who made them are gone.
The institutional runtimes that will matter in fifty years are being built now, by people who are mostly thinking about much shorter time horizons. Some of them will turn out to have been building protocols without knowing it. The ones who know it have an advantage, if they use it correctly.