{"id":8983,"date":"2025-12-23T10:46:09","date_gmt":"2025-12-23T10:46:09","guid":{"rendered":"https:\/\/uplatz.com\/blog\/?p=8983"},"modified":"2025-12-23T10:46:09","modified_gmt":"2025-12-23T10:46:09","slug":"governance-capture-when-decentralization-becomes-illusion","status":"publish","type":"post","link":"https:\/\/uplatz.com\/blog\/governance-capture-when-decentralization-becomes-illusion\/","title":{"rendered":"Governance Capture: When Decentralization Becomes Illusion"},"content":{"rendered":"<h2><b>1. Introduction: The Fragility of Algorithmic Democracy<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The advent of the Decentralized Autonomous Organization (DAO) was heralded as a paradigmatic shift in human coordination\u2014a technological leap that would ostensibly solve the age-old Principal-Agent problem inherent in traditional corporate structures. By encoding governance rules into immutable smart contracts and distributing decision-making power via cryptographic tokens, DAOs promised a future of &#8220;organizational flatness,&#8221; transparency, and censorship resistance. The ethos was seductive: &#8220;Code is Law.&#8221; In this idealized vision, the corruptible human element would be minimized, replaced by deterministic execution and mathematical consensus.<\/span><span style=\"font-weight: 400;\">1<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, a rigorous analysis of the DAO landscape between 2020 and 2025 reveals a starkly different reality. Far from eliminating the concentration of power, the current generation of decentralized governance has frequently reinvented oligarchy, often with fewer checks and balances than the centralized institutions they sought to replace. This phenomenon, known as <\/span><b>Governance Capture<\/b><span style=\"font-weight: 400;\">, occurs when a subset of actors\u2014whether external attackers, capitalized &#8220;whales,&#8221; or the founding team itself\u2014subverts the governance mechanism to direct resources or protocol parameters toward their own benefit, often at the expense of the collective or the protocol&#8217;s long-term viability.<\/span><span style=\"font-weight: 400;\">1<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This report serves as an exhaustive examination of governance capture. We will dissect the theoretical underpinnings of why digital democracies fail, referencing sociopolitical frameworks like the Iron Law of Oligarchy. We will analyze the mechanics of capture, distinguishing between &#8220;Flash Governance&#8221; attacks enabled by DeFi composability and &#8220;Political Capture&#8221; enabled by voter apathy. Through detailed case studies\u2014including the hostile takeover of the Steem blockchain, the flash-loan exploitation of Beanstalk Farms, the rogue capture of Build Finance, and the centralization theater of Arbitrum&#8217;s AIP-1\u2014we will illustrate the specific vulnerabilities that plague the ecosystem. Finally, we will evaluate the efficacy of emerging resistance mechanisms, from quadratic voting and bicameralism to the increasing encroachment of regulatory liability as a forcing function for decentralization.<\/span><\/p>\n<h2><b>2. The Political Economy of Digital Organizations<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">To understand the mechanics of capture, one must first understand the political economy that governs these digital jurisdictions. While DAOs rely on novel technology, the social dynamics they exhibit mirror historical patterns of governance, often confirming cynical theories regarding the inevitability of elite rule.<\/span><\/p>\n<h3><b>2.1 The Iron Law of Oligarchy in Web3<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In 1911, sociologist Robert Michels formulated the &#8220;Iron Law of Oligarchy,&#8221; asserting that all complex organizations, regardless of how democratic they are at their inception, eventually develop into oligarchies.<\/span><span style=\"font-weight: 400;\">4<\/span><span style=\"font-weight: 400;\"> Michels argued that the &#8220;tactical and technical necessities&#8221; of managing an organization\u2014speed of decision-making, the need for specialized knowledge, and the requirement for coherent strategy\u2014inevitably lead to the emergence of a leadership class.<\/span><span style=\"font-weight: 400;\">5<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the context of Web3, this law has not only persisted but accelerated. The technical barrier to entry in DAO governance is exceptionally high; understanding a proposal often requires literacy in Solidity smart contracts, financial risk modelling, and cryptographic primitives. This creates a natural &#8220;Technocratic Elite&#8221;\u2014a small group of developers, professional delegates, and large token holders who possess the cognitive bandwidth and technical expertise to govern.<\/span><span style=\"font-weight: 400;\">6<\/span><span style=\"font-weight: 400;\"> The broader base of token holders, lacking this expertise or the time to acquire it, effectively abdicates their voting rights to this elite, reinforcing the oligarchic structure.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Research into DAO governance participation confirms this centralization. In many major protocols, fewer than 1% of token holders participate in governance votes, and often fewer than 20 addresses are required to reach a quorum or pass a proposal.<\/span><span style=\"font-weight: 400;\">7<\/span><span style=\"font-weight: 400;\"> This is not merely a failure of engagement; it is a structural feature of &#8220;coin voting&#8221; governance, where the cost of participation (gas fees, time) often outweighs the marginal benefit of casting a single vote, leading to rational ignorance among retail holders.<\/span><span style=\"font-weight: 400;\">2<\/span><\/p>\n<h3><b>2.2 The Principal-Agent Problem and &#8220;Whale&#8221; Dominance<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Traditional corporate governance attempts to mitigate the Principal-Agent problem (where managers act in their own interest rather than shareholders&#8217;) through fiduciary duties, boards of directors, and legal recourse. DAOs attempt to solve this by making every shareholder a manager. However, this reintroduces the problem in a new form.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In a token-weighted voting system (1 Token = 1 Vote), the &#8220;Whale&#8221; (a holder with massive capital) becomes the de facto agent. Unlike a corporate director who has a legal fiduciary duty to minority shareholders, a crypto-whale has no such obligation. They can, and often do, vote for proposals that extract value from the protocol to their private benefit\u2014a practice known as &#8220;tunneling&#8221; in corporate finance.<\/span><span style=\"font-weight: 400;\">2<\/span><span style=\"font-weight: 400;\"> For example, a whale might vote to direct a grant to a company they own, or to alter protocol fees in a way that benefits their specific trading strategy. Because the &#8220;code is law,&#8221; and the vote was valid according to the smart contract, minority holders have no recourse.<\/span><span style=\"font-weight: 400;\">2<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The concentration of wealth in crypto exacerbates this. Gini coefficients for governance tokens frequently exceed 0.90, indicating wealth inequality far surpassing that of nation-states.<\/span><span style=\"font-weight: 400;\">9<\/span><span style=\"font-weight: 400;\"> In such an environment, &#8220;community governance&#8221; is mathematically impossible; the outcome of every vote is determined by the coordination of the top 10 to 50 wallets. The &#8220;community&#8221; is merely an audience to the decisions of the plutocrats.<\/span><\/p>\n<h3><b>2.3 Decentralization Theater<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A critical concept in analyzing governance capture is &#8220;Decentralization Theater&#8221;\u2014the performative aspect of governance where a project <\/span><i><span style=\"font-weight: 400;\">appears<\/span><\/i><span style=\"font-weight: 400;\"> decentralized to avoid regulatory scrutiny (specifically, to avoid tokens being classified as securities) while retaining actual control.<\/span><span style=\"font-weight: 400;\">11<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This theater often involves:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Admin Keys:<\/b><span style=\"font-weight: 400;\"> The existence of multisig wallets controlled by the core team that can upgrade smart contracts, bypass governance votes, or pause the protocol.<\/span><span style=\"font-weight: 400;\">13<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Rubber-Stamp Voting:<\/b><span style=\"font-weight: 400;\"> Governance votes that are technically non-binding or where the foundation controls enough tokens (directly or through &#8220;friendly&#8221; delegates) to ensure a specific outcome.<\/span><span style=\"font-weight: 400;\">14<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Obfuscated Centralization:<\/b><span style=\"font-weight: 400;\"> The use of complex DAO structures (sub-DAOs, committees) that are ultimately appointed by a centralized foundation.<\/span><span style=\"font-weight: 400;\">3<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">When these theatrical elements are stripped away, many &#8220;DAOs&#8221; are revealed to be traditional companies with a scattered shareholder base and no legal rights.<\/span><\/p>\n<h2><b>3. Mechanisms of Capture: The Attack Vectors<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Governance capture manifests through distinct vectors, ranging from instantaneous financial exploits to slow, political subversion.<\/span><\/p>\n<h3><b>3.1 The Flash Loan Governance Attack<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The &#8220;Flash Loan&#8221; is a DeFi primitive that allows a user to borrow unlimited capital without collateral, provided the loan is repaid within the same transaction block. This mechanism destroys the barrier to entry for capital-intensive attacks. In a traditional corporate raid, an attacker needs to secure financing, buy shares over months, and file regulatory disclosures. In DeFi, an attacker can borrow the equivalent of a &#8220;controlling stake&#8221; for 12 seconds, execute a hostile takeover, drain the corporate treasury, and repay the loan\u2014all before the next block is mined.<\/span><span style=\"font-weight: 400;\">15<\/span><\/p>\n<p><b>The Mechanism:<\/b><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Borrow:<\/b><span style=\"font-weight: 400;\"> Attacker borrows a massive sum of governance tokens (or assets to buy them) from a liquidity pool (e.g., Aave, Uniswap).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Stake\/Vote:<\/b><span style=\"font-weight: 400;\"> Attacker deposits tokens into the governance contract to gain voting power.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Execute:<\/b><span style=\"font-weight: 400;\"> Attacker votes &#8220;Yes&#8221; on a malicious proposal (e.g., &#8220;Transfer Treasury to Attacker&#8221;) and triggers an execution function.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Repay:<\/b><span style=\"font-weight: 400;\"> Attacker withdraws tokens and repays the loan.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Profit:<\/b><span style=\"font-weight: 400;\"> The treasury funds remain with the attacker.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">This vector exploits the &#8220;Snapshot&#8221; mechanism. If a governance protocol measures voting power at the <\/span><i><span style=\"font-weight: 400;\">moment<\/span><\/i><span style=\"font-weight: 400;\"> of proposal execution rather than using historical snapshots or time-locks, it is vulnerable.<\/span><span style=\"font-weight: 400;\">16<\/span><\/p>\n<h3><b>3.2 The Sybil Attack and Plutocratic Swarms<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">While 1T1V is vulnerable to whales, alternative systems like Quadratic Voting (QV) are vulnerable to Sybil attacks. QV attempts to dampen whale influence by making each additional vote more expensive (Cost = Votes\u00b2). However, this relies on the assumption that one account equals one person.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In a permissionless environment, generating a new wallet address is virtually free. A whale can simply split their holdings into 1,000 separate wallets, bypassing the quadratic cost curve and restoring linear influence. This &#8220;Sybil Swarm&#8221; effectively captures the governance mechanism by simulating a grassroots movement.<\/span><span style=\"font-weight: 400;\">18<\/span><span style=\"font-weight: 400;\"> Without robust &#8220;Proof of Personhood,&#8221; any system attempting to be &#8220;democratic&#8221; (1 Person = 1 Vote) rather than &#8220;plutocratic&#8221; (1 Dollar = 1 Vote) is trivially capturable by capital acting as a multitude.<\/span><\/p>\n<h3><b>3.3 The &#8220;Apathy Attack&#8221; (Minority Rule)<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The most common form of capture is not dramatic but mundane. Due to extreme voter apathy (participation rates &lt;5%), a motivated minority can capture a protocol by simply showing up.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In many DAOs, the quorum threshold (the minimum votes required for a proposal to pass) is low\u2014often 1-4% of the total supply.<\/span><span style=\"font-weight: 400;\">20<\/span><span style=\"font-weight: 400;\"> If an attacker accumulates just enough tokens to meet the quorum, and the rest of the community is inattentive, they can pass malicious proposals. This was the exact vector used in the Build Finance takeover.<\/span><span style=\"font-weight: 400;\">21<\/span><span style=\"font-weight: 400;\"> The attacker didn&#8217;t need 51% of the <\/span><i><span style=\"font-weight: 400;\">total<\/span><\/i><span style=\"font-weight: 400;\"> supply; they only needed 51% of the <\/span><i><span style=\"font-weight: 400;\">active<\/span><\/i><span style=\"font-weight: 400;\"> votes, which, in a dormant DAO, was a tiny fraction of the total.<\/span><\/p>\n<h3><b>3.4 Governance via Exchange Custody<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A unique vector in Proof-of-Stake (PoS) and Delegated Proof-of-Stake (DPoS) systems is the capture of governance power by centralized exchanges (CEXs). Exchanges like Binance, Coinbase, and Kraken hold billions of dollars of user tokens in custodial wallets.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If these exchanges decide to use their customers&#8217; tokens to vote\u2014without the customers&#8217; explicit instruction\u2014they instantly become the dominant governance force. This transforms the network from a decentralized democracy into a cartel of custodial intermediaries.<\/span><span style=\"font-weight: 400;\">22<\/span><span style=\"font-weight: 400;\"> Users who leave tokens on exchanges inadvertently contribute to the centralization of the very networks they invest in.<\/span><\/p>\n<h2><b>4. Case Studies in Governance Failure<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">To move from theory to practice, we examine four seminal events that exposed the fragility of DAO governance.<\/span><\/p>\n<h3><b>4.1 The Beanstalk Farms Exploit: The $182 Million Flash Governance Lesson<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Date: April 17, 2022<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Loss: ~$182 Million (Protocol Loss), ~$76 Million (Attacker Profit)<\/span><\/p>\n<p><b>Context:<\/b><span style=\"font-weight: 400;\"> Beanstalk was an algorithmic stablecoin protocol on Ethereum. Its governance model allowed users who deposited assets into the &#8220;Silo&#8221; to earn &#8220;Stalk&#8221; tokens, which conferred voting rights. The protocol included an emergencyCommit function designed to allow swift execution of bug fixes if a supermajority (67%) of Stalk holders agreed.<\/span><span style=\"font-weight: 400;\">16<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Attack:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The attacker executed a highly sophisticated series of interactions within a single transaction:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Flash Loan:<\/b><span style=\"font-weight: 400;\"> Borrowed ~$1 billion in assets (DAI, USDC, USDT) from Aave.<\/span><span style=\"font-weight: 400;\">16<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Acquisition:<\/b><span style=\"font-weight: 400;\"> Used these funds to acquire a massive position in the Beanstalk Silo, instantly granting them &gt;67% of the total Stalk voting power.<\/span><span style=\"font-weight: 400;\">23<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Proposal &amp; Execution:<\/b><span style=\"font-weight: 400;\"> They proposed <\/span><b>BIP-18<\/b><span style=\"font-weight: 400;\"> (which transferred the protocol&#8217;s funds to their own wallet) and <\/span><b>BIP-19<\/b><span style=\"font-weight: 400;\"> (a donation to Ukraine, likely for misdirection or irony). Because they held a supermajority, they bypassed the standard voting delay and invoked emergencyCommit immediately.<\/span><span style=\"font-weight: 400;\">23<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Exit:<\/b><span style=\"font-weight: 400;\"> The proposal executed, transferring the funds. The attacker repaid the flash loan and laundered the profit through Tornado Cash.<\/span><span style=\"font-weight: 400;\">24<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Analysis:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Beanstalk exploit fundamentally broke the concept of &#8220;Skin in the Game.&#8221; Governance theory assumes that someone holding a majority stake would not destroy the protocol because they would destroy the value of their own holdings. Flash loans invert this: the attacker held the stake for less than 15 seconds. They had zero long-term exposure to the price of the asset they destroyed. Beanstalk&#8217;s failure was treating &#8220;instant capital&#8221; the same as &#8220;committed capital.&#8221;<\/span><\/p>\n<h3><b>4.2 The Steem vs. Tron War: Hostile Takeover via Custodians<\/b><\/h3>\n<p><b>Date:<\/b><span style=\"font-weight: 400;\"> February &#8211; March 2020<\/span><\/p>\n<p><b>Context:<\/b><span style=\"font-weight: 400;\"> The Steem blockchain utilized Delegated Proof of Stake (DPoS), where token holders voted for 21 &#8220;witnesses&#8221; who secured the network. In February 2020, Justin Sun (founder of Tron) acquired Steemit Inc., gaining control of a massive stake (~20% of supply) known as the &#8220;ninja mine.&#8221; These tokens had historically been non-voting.<\/span><span style=\"font-weight: 400;\">22<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Conflict:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Fearing Sun would centralize control, the existing witnesses soft-forked the network to freeze the voting power of the ninja mine. In retaliation, Sun executed a hostile takeover.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Exchange Collusion:<\/b><span style=\"font-weight: 400;\"> Sun allegedly coordinated with Binance, Huobi, and Poloniex. These exchanges used the Steem tokens held in their customers&#8217; accounts to vote for a new slate of witnesses controlled by Sun.<\/span><span style=\"font-weight: 400;\">22<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>The Capture:<\/b><span style=\"font-weight: 400;\"> With the exchanges&#8217; voting power, Sun&#8217;s witnesses took over the top 21 spots. They immediately hard-forked the chain to unfreeze the ninja mine and transferred control to Sun.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>The Community Hard Fork:<\/b><span style=\"font-weight: 400;\"> Recognizing the chain was irretrievably captured, the community initiated a new hard fork called <\/span><b>Hive<\/b><span style=\"font-weight: 400;\">. In a precedent-setting move, the Hive genesis block copied the Steem ledger <\/span><i><span style=\"font-weight: 400;\">but excluded the wallets of Justin Sun and the entity accounts of the colluding exchanges<\/span><\/i><span style=\"font-weight: 400;\">.<\/span><span style=\"font-weight: 400;\">22<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Analysis:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This event demonstrated the &#8220;Custodial Attack Vector.&#8221; It proved that DPoS systems are vulnerable to cartelization by centralized exchanges. It also showed the ultimate recourse of a decentralized community: the social layer. When the code was captured, the community exited to a new chain, delegitimizing the captured asset. The &#8220;Governance&#8221; was captured, but the &#8220;Community&#8221; was not.<\/span><\/p>\n<h3><b>4.3 Build Finance DAO: The &#8220;Apathy&#8221; Takeover<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Date: February 2022<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Loss: ~$470,000 (Total Treasury)<\/span><\/p>\n<p><b>Context:<\/b><span style=\"font-weight: 400;\"> Build Finance was a small &#8220;venture builder&#8221; DAO. Governance was standard: ERC-20 token voting with a simple majority threshold.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Attack:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A user known as Suho.eth began accumulating BUILD tokens. They submitted a proposal to transfer the &#8220;minting keys&#8221; of the token contract to their personal wallet.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>The Failed Warning:<\/b><span style=\"font-weight: 400;\"> A moderator noticed the proposal and warned the community. The first attempt was voted down.<\/span><span style=\"font-weight: 400;\">21<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Persistence &amp; Silence:<\/b><span style=\"font-weight: 400;\"> The attacker submitted a second, identical proposal. This time, they disabled the Discord bot that alerted the community to new votes.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>The Vote:<\/b><span style=\"font-weight: 400;\"> Due to extreme voter apathy, the proposal passed with a minimal number of votes. No one was watching.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>The Drain:<\/b><span style=\"font-weight: 400;\"> Once in control of the minting keys, Suho.eth minted 1.1 billion BUILD tokens, dumped them into liquidity pools (crashing the price), and drained the treasury.<\/span><span style=\"font-weight: 400;\">27<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Analysis:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Build Finance illustrates the &#8220;Cost of Apathy.&#8221; In a low-attention environment, governance security is non-existent. The attacker effectively bought the company for the price of a small stack of tokens, passed a vote in the dark, and liquidated the assets. It reinforces the danger of &#8220;upgradeable contracts&#8221; controlled by simple majority votes in illiquid, low-participation DAOs.<\/span><\/p>\n<h3><b>4.4 Arbitrum AIP-1: Decentralization Theater on the Main Stage<\/b><\/h3>\n<p><b>Date:<\/b><span style=\"font-weight: 400;\"> March &#8211; April 2023<\/span><\/p>\n<p><b>Context:<\/b><span style=\"font-weight: 400;\"> Arbitrum, the leading Ethereum Layer 2 rollup, launched its governance token (ARB) with massive fanfare. The first proposal, <\/span><b>AIP-1<\/b><span style=\"font-weight: 400;\">, was presented as a ratification of the DAO&#8217;s structure.<\/span><span style=\"font-weight: 400;\">12<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Controversy:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">AIP-1 was an &#8220;omnibus&#8221; proposal that bundled:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ratification of the Constitution.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Election of the Security Council.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Transfer of 750 Million ARB (~$1 Billion) to the Arbitrum Foundation.<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Community researchers discovered that the Foundation had <\/span><i><span style=\"font-weight: 400;\">already<\/span><\/i><span style=\"font-weight: 400;\"> moved the 750M ARB and had even sold $10M worth into stablecoins <\/span><i><span style=\"font-weight: 400;\">before<\/span><\/i><span style=\"font-weight: 400;\"> the vote had concluded.<\/span><span style=\"font-weight: 400;\">28<\/span><span style=\"font-weight: 400;\"> When confronted, the Foundation stated that AIP-1 was a &#8220;ratification,&#8221; not a &#8220;request&#8221;\u2014implying the DAO had no choice but to approve what had already been done.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Outcome:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The community reacted with fury, voting overwhelmingly against AIP-1 (76% against).30 This forced the Foundation to:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Admit the communication failure.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Split AIP-1 into granular proposals (AIP-1.1 regarding the funds, AIP-1.2 regarding the constitution).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Accept vesting schedules and budgetary oversight for the Foundation&#8217;s allocation.<\/span><span style=\"font-weight: 400;\">29<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Analysis:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">AIP-1 exposed the tension between &#8220;Foundation-led&#8221; governance and true DAO sovereignty. The Foundation viewed the DAO as a rubber stamp; the DAO viewed itself as the owner. While the community &#8220;won&#8221; this battle, it highlighted the &#8220;Training Wheels&#8221; problem\u2014the Foundation held the keys and the funds regardless of the vote. It was only the threat of a PR disaster and token price collapse that forced them to concede.<\/span><\/p>\n<h2><b>5. Structural Vulnerabilities: Infrastructure and Metrics<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Beyond specific attacks, the infrastructure of the Web3 ecosystem contains deep structural vulnerabilities that predispose it to capture.<\/span><\/p>\n<h3><b>5.1 Layer 2 &#8220;Training Wheels&#8221; and the Admin Key Problem<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">While Layer 2 rollups (Arbitrum, Optimism, zkSync, Base) process billions in value, their governance is often less decentralized than it appears. <\/span><b>L2Beat<\/b><span style=\"font-weight: 400;\">, an analytics platform, categorizes rollups based on their maturity stages <\/span><span style=\"font-weight: 400;\">32<\/span><span style=\"font-weight: 400;\">:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Stage 0 (Full Training Wheels):<\/b><span style=\"font-weight: 400;\"> The project is effectively centralized. The operator (team) runs the centralized sequencer and possesses &#8220;admin keys&#8221; that can upgrade the smart contracts instantly without delay. There is no permissionless fraud proof system. If the team is coerced or malicious, they can steal all user funds.<\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><i><span style=\"font-weight: 400;\">Examples (2025):<\/span><\/i><span style=\"font-weight: 400;\"> Many newer rollups and app-chains remain in Stage 0.<\/span><span style=\"font-weight: 400;\">32<\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Stage 1 (Limited Training Wheels):<\/b><span style=\"font-weight: 400;\"> A governance mechanism exists, but a &#8220;Security Council&#8221; (multisig of 6-12 individuals) can override it for bug fixes. Crucially, there is an &#8220;exit window&#8221; (e.g., 7 days) where users can withdraw funds if they disagree with a code upgrade.<\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><i><span style=\"font-weight: 400;\">Examples:<\/span><\/i><span style=\"font-weight: 400;\"> Arbitrum One, Optimism (OP Mainnet) are typically in this stage.<\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Stage 2 (No Training Wheels):<\/b><span style=\"font-weight: 400;\"> The fraud\/validity proof system is fully permissionless. No admin keys exist that can override the code. Upgrades are strictly time-locked (30+ days).<\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><i><span style=\"font-weight: 400;\">Status:<\/span><\/i><span style=\"font-weight: 400;\"> Very few major rollups have achieved Stage 2 as of 2025.<\/span><\/li>\n<\/ul>\n<p><b>Implication for Capture:<\/b><span style=\"font-weight: 400;\"> For Stage 0 and Stage 1 rollups, governance capture does not require convincing thousands of token holders. It only requires capturing the <\/span><b>Security Council<\/b><span style=\"font-weight: 400;\">. If a state actor or criminal organization compromises the 5-of-8 keys of a Security Council, they control the entire chain. This concentrates systemic risk into a handful of individuals, often publicly known, creating a massive &#8220;Governance Surface Area&#8221; for coercion.<\/span><\/p>\n<h3><b>5.2 Quantifying Centralization: The Metrics of Illusion<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">To objectively assess the risk of capture, researchers employ specific metrics.<\/span><\/p>\n<h4><b>The Nakamoto Coefficient<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">This metric measures the minimum number of independent entities required to collude to compromise a system (e.g., reach 51% consensus).<\/span><span style=\"font-weight: 400;\">34<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>DAO Governance:<\/b><span style=\"font-weight: 400;\"> For many DAOs, the Nakamoto Coefficient for passing a proposal is often <\/span><b>&lt; 10<\/b><span style=\"font-weight: 400;\">. This means fewer than 10 wallets can collude to pass any vote.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Layer 1 Chains:<\/b><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Polkadot:<\/b><span style=\"font-weight: 400;\"> High coefficient (~178), indicating robust decentralization.<\/span><span style=\"font-weight: 400;\">35<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Polygon:<\/b><span style=\"font-weight: 400;\"> Critically low (~4 in some metrics), indicating high susceptibility to collusion among validators.<\/span><span style=\"font-weight: 400;\">36<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Solana:<\/b><span style=\"font-weight: 400;\"> Moderate (~19).<\/span><span style=\"font-weight: 400;\">37<\/span><\/li>\n<\/ul>\n<h4><b>The Gini Coefficient<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">A measure of wealth inequality (0 = perfect equality, 1 = perfect inequality).<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Token Distribution:<\/b><span style=\"font-weight: 400;\"> Governance tokens often exhibit Gini coefficients &gt; 0.95. The &#8220;Fair Launch&#8221; is largely a myth; pre-mines, VC allocations, and team grants ensure that the initial distribution is highly concentrated.<\/span><span style=\"font-weight: 400;\">9<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Voting Power:<\/b><span style=\"font-weight: 400;\"> When Gini is this high, 1T1V governance is purely performative. A &#8220;community vote&#8221; is mathematically incapable of overriding the top holders.<\/span><\/li>\n<\/ul>\n<h4><b>Voting-Bloc Entropy<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">A newer metric, <\/span><b>Voting-Bloc Entropy (VBE)<\/b><span style=\"font-weight: 400;\">, measures the diversity of voting coalitions.<\/span><span style=\"font-weight: 400;\">8<\/span><span style=\"font-weight: 400;\"> Low VBE indicates that despite having many distinct addresses, voting patterns are highly correlated (e.g., &#8220;herding&#8221; or delegation to the same few entities). Research shows that &#8220;herding&#8221; behavior\u2014where voters follow the first few large votes\u2014is rampant, further centralizing effective power.<\/span><\/p>\n<h2><b>6. The Legal Frontier: Liability as a Forcing Function<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The era of regulatory ambiguity for DAOs ended with the <\/span><b>CFTC v. Ooki DAO<\/b><span style=\"font-weight: 400;\"> case, which fundamentally altered the risk profile of governance participation.<\/span><\/p>\n<h3><b>6.1 CFTC v. Ooki DAO: The Death of the &#8220;Passive&#8221; Investor<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In 2022, the CFTC sued Ooki DAO (formerly bZeroX) for offering illegal off-exchange leveraged trading.<\/span><span style=\"font-weight: 400;\">38<\/span><span style=\"font-weight: 400;\"> The crucial legal innovation was the CFTC&#8217;s classification of the DAO as an <\/span><b>&#8220;Unincorporated Association&#8221;<\/b><span style=\"font-weight: 400;\"> under federal law.<\/span><\/p>\n<p><b>The Ruling:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Liability:<\/b><span style=\"font-weight: 400;\"> The court ruled that because the DAO was not a registered legal entity (LLC, Corp), it defaulted to a general partnership\/unincorporated association. In such structures, <\/span><b>partners are personally liable<\/b><span style=\"font-weight: 400;\"> for the entity&#8217;s debts and crimes.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Who is a Partner?<\/b><span style=\"font-weight: 400;\"> The CFTC argued that anyone who <\/span><b>held tokens AND voted<\/b><span style=\"font-weight: 400;\"> on governance proposals was an active participant in the association and therefore personally liable. Passive holders were not.<\/span><span style=\"font-weight: 400;\">39<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Service of Process:<\/b><span style=\"font-weight: 400;\"> The court allowed the CFTC to &#8220;serve&#8221; the lawsuit via a chat bot on the DAO&#8217;s website and a forum post, setting a precedent that anonymous digital entities can be sued without identifying physical addresses.<\/span><span style=\"font-weight: 400;\">40<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Consequences for Capture:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This ruling creates a massive adverse selection problem.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Exit of the Compliant:<\/b><span style=\"font-weight: 400;\"> Risk-averse, compliant, and institutional actors (e.g., US-based VC firms, professional delegates) are disincentivized from voting, as doing so opens them to unlimited personal liability for the DAO&#8217;s actions.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Rise of the Reckless:<\/b><span style=\"font-weight: 400;\"> This leaves governance in the hands of anonymous actors, those in non-extradition jurisdictions, or those reckless enough to ignore the risk. This shift degrades the quality of governance and makes the DAO <\/span><i><span style=\"font-weight: 400;\">more<\/span><\/i><span style=\"font-weight: 400;\"> susceptible to capture by malicious actors who do not fear the CFTC.<\/span><\/li>\n<\/ul>\n<h3><b>6.2 The SEC and the &#8220;Safe Harbor&#8221; Proposal<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In contrast to the CFTC&#8217;s &#8220;stick,&#8221; SEC Commissioner Hester Peirce proposed a &#8220;carrot&#8221;: the <\/span><b>Token Safe Harbor Proposal<\/b><span style=\"font-weight: 400;\">.<\/span><span style=\"font-weight: 400;\">41<\/span><\/p>\n<p><b>The Proposal:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Grace Period:<\/b><span style=\"font-weight: 400;\"> It proposed a 3-year grace period from the first token sale. During this time, the project would be exempt from certain securities registration requirements.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>The Goal:<\/b><span style=\"font-weight: 400;\"> To allow the team to build the network and decentralized governance. At the end of 3 years, the project must prove it is &#8220;sufficiently decentralized&#8221;\u2014meaning the founding team no longer controls the network or the token price.<\/span><span style=\"font-weight: 400;\">41<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Network Maturity:<\/b><span style=\"font-weight: 400;\"> The proposal attempted to formalize the transition from &#8220;Centralized Startup&#8221; to &#8220;Decentralized Protocol.&#8221; However, it stalled due to the difficulty of defining &#8220;decentralization&#8221; legally. Is a Nakamoto Coefficient of 10 sufficient? 100? Without clear metrics, the Safe Harbor remains a theoretical framework rather than law.<\/span><span style=\"font-weight: 400;\">42<\/span><\/li>\n<\/ul>\n<h2><b>7. Engineering Resistance: The Path Forward<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Recognizing the failures of 1T1V and the risks of capture, the ecosystem is experimenting with novel governance primitives designed to be robust against both plutocracy and apathy.<\/span><\/p>\n<h3><b>7.1 Quadratic Voting (QV) and the Sybil Defense<\/b><\/h3>\n<p><b>Quadratic Voting<\/b><span style=\"font-weight: 400;\"> re-imagines the voting cost curve. Instead of 1 Token = 1 Vote, the cost of votes increases quadratically.<\/span><span style=\"font-weight: 400;\">43<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Formula:<\/b><span style=\"font-weight: 400;\"> $Cost = (Votes)^2$.<\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">1 Vote costs 1 Token.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">2 Votes cost 4 Tokens.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">10 Votes cost 100 Tokens.<\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Effect:<\/b><span style=\"font-weight: 400;\"> This dramatically dampens the power of whales. A whale with 100 tokens can buy 100 votes in a linear system, but only $\\sqrt{100} = 10$ votes in a quadratic system. Meanwhile, 100 small holders with 1 token each have 100 votes total. QV favors the <\/span><i><span style=\"font-weight: 400;\">number of people<\/span><\/i><span style=\"font-weight: 400;\"> over the <\/span><i><span style=\"font-weight: 400;\">amount of capital<\/span><\/i><span style=\"font-weight: 400;\">.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The Sybil Vulnerability:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">QV fails catastrophically if a user can create multiple identities. A whale can simply split their 100 tokens into 100 separate wallets, each buying 1 vote. This &#8220;Sybil Attack&#8221; reverts the system to linear voting.19<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Solution: Proof of Personhood:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To make QV work, DAOs are integrating identity solutions like Gitcoin Passport.46<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Mechanism:<\/b><span style=\"font-weight: 400;\"> Gitcoin Passport aggregates &#8220;stamps&#8221; (Twitter account, Google account, ENS, POAP, BrightID) to calculate a &#8220;Trust Score.&#8221;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Gating:<\/b><span style=\"font-weight: 400;\"> Only addresses with a Trust Score &gt; 20 (indicating a likely human) are eligible for Quadratic Voting matching pools.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Result:<\/b><span style=\"font-weight: 400;\"> This reintroduces a form of &#8220;permissioning&#8221; to achieve a fairer democratic outcome, highlighting the trade-off between anonymity and democracy.<\/span><\/li>\n<\/ul>\n<h3><b>7.2 Bicameralism: The Optimism Governance Model<\/b><\/h3>\n<p><b>Optimism<\/b><span style=\"font-weight: 400;\"> (the L2 rollup) has implemented a bicameral governance structure, mirroring the US Congress (House vs. Senate) to balance interests.<\/span><span style=\"font-weight: 400;\">48<\/span><\/p>\n<ol>\n<li><b> The Token House (The Plutocracy):<\/b><\/li>\n<\/ol>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Basis:<\/b><span style=\"font-weight: 400;\"> OP Token holders.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Jurisdiction:<\/b><span style=\"font-weight: 400;\"> Treasury management, protocol upgrades, inflation parameters.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Logic:<\/b><span style=\"font-weight: 400;\"> Those with financial stake should manage financial risk.<\/span><\/li>\n<\/ul>\n<ol start=\"2\">\n<li><b> The Citizens&#8217; House (The Meritocracy):<\/b><\/li>\n<\/ol>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Basis:<\/b><span style=\"font-weight: 400;\"> &#8220;Soulbound&#8221; Citizenship badges (Non-transferable).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Selection:<\/b><span style=\"font-weight: 400;\"> Citizens are selected based on reputation and contribution (not wealth). One Person = One Vote.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Jurisdiction:<\/b> <b>Retroactive Public Goods Funding (RetroPGF)<\/b><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Logic:<\/b><span style=\"font-weight: 400;\"> Decisions about &#8220;Values&#8221; and &#8220;Public Goods&#8221; should be democratic and immune to plutocratic capture.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">RetroPGF:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This mechanism creates a market for public goods. Instead of giving grants hoping for work, the Citizens&#8217; House votes to reward projects that have already provided value. In RetroPGF 2, 10 million OP tokens were distributed to projects based on this citizen vote.49 This system separates the &#8220;Capital&#8221; (OP Treasury) from the &#8220;Allocation Decision&#8221; (Citizens), making it significantly harder to capture than a unified 1T1V model.<\/span><\/p>\n<h3><b>7.3 Conviction Voting<\/b><\/h3>\n<p><b>Conviction Voting<\/b><span style=\"font-weight: 400;\"> changes the temporal dimension of governance.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Mechanism:<\/b><span style=\"font-weight: 400;\"> Users do not just vote &#8220;Yes\/No&#8221; once. They &#8220;stake&#8221; their tokens on a proposal. Their voting power (conviction) grows over time, the longer they keep their tokens staked.<\/span><span style=\"font-weight: 400;\">51<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Capture Resistance:<\/b><span style=\"font-weight: 400;\"> This makes <\/span><b>Flash Loan attacks impossible<\/b><span style=\"font-weight: 400;\">. An attacker cannot buy a vote for one block; they must hold the tokens for weeks or months to accrue enough conviction to pass a proposal. It aligns voting power with long-term time preference.<\/span><\/li>\n<\/ul>\n<h2><b>8. Conclusion<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The period from 2020 to 2025 has served as a brutal stress test for the concept of decentralized governance. The evidence is unambiguous: <\/span><b>Naive decentralization\u2014simply issuing a token and launching a Snapshot page\u2014inevitably leads to governance capture.<\/b><span style=\"font-weight: 400;\"> Whether through the instantaneous violence of a flash loan exploit (Beanstalk), the political maneuvering of a custodial cartel (Steem), or the creeping apathy that allows a minority to loot the treasury (Build Finance), the &#8220;1 Token = 1 Vote&#8221; model has proven to be structurally unsafe for high-stakes value management.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, viewing this as the failure of the DAO experiment would be a mistake. It is rather the failure of its first, primitive iteration. The ecosystem is evolving from &#8220;Decentralization Theater&#8221; to &#8220;Resilient Institutional Design.&#8221;<\/span><\/p>\n<p><b>Key Takeaways:<\/b><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Code is Not Enough:<\/b><span style=\"font-weight: 400;\"> Governance is a social and political layer that cannot be fully automated. The &#8220;Social Layer&#8221; (as seen in the Hive hard fork and Arbitrum revolt) remains the ultimate backstop against tyranny.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Identity is Prerequisite to Democracy:<\/b><span style=\"font-weight: 400;\"> You cannot have a democratic (non-plutocratic) system without solving the Sybil problem. Tools like Gitcoin Passport and Worldcoin are becoming the foundational infrastructure for Capture-Resistant Governance.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Speed Kills:<\/b><span style=\"font-weight: 400;\"> The most effective anti-capture mechanisms (Time-locks, Conviction Voting, Exit Windows) function by <\/span><i><span style=\"font-weight: 400;\">slowing down<\/span><\/i><span style=\"font-weight: 400;\"> governance. They reintroduce friction to prevent the &#8220;Flash&#8221; exploitation of democracy.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Bicameralism is the Future:<\/b><span style=\"font-weight: 400;\"> The separation of powers (Token House vs. Citizens&#8217; House) offers the most viable path to balancing financial alignment with community values.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">As DAOs mature, they are effectively re-discovering the principles of constitutional design that nation-states learned centuries ago: checks and balances, separation of powers, and the protection of minority rights. The technology has changed, but the nature of power has not. The illusion of decentralization is fading, but in its place, a more robust, battle-tested reality of digital governance is beginning to emerge.<\/span><\/p>\n<h2><b>9. Data Appendix<\/b><\/h2>\n<h3><b>Table 1: Major Governance Capture Events (2020-2023)<\/b><\/h3>\n<table>\n<tbody>\n<tr>\n<td><b>Protocol<\/b><\/td>\n<td><b>Date<\/b><\/td>\n<td><b>Loss ($)<\/b><\/td>\n<td><b>Attack Vector<\/b><\/td>\n<td><b>Mechanism Failure<\/b><\/td>\n<\/tr>\n<tr>\n<td><b>Steem<\/b><\/td>\n<td><span style=\"font-weight: 400;\">Feb 2020<\/span><\/td>\n<td><span style=\"font-weight: 400;\">N\/A (Chain Split)<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Exchange Custody \/ Hostile Takeover<\/span><\/td>\n<td><span style=\"font-weight: 400;\">DPoS centralization; reliance on CEXs.<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Cream Finance<\/b><\/td>\n<td><span style=\"font-weight: 400;\">Oct 2021<\/span><\/td>\n<td><span style=\"font-weight: 400;\">$130 Million<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Flash Loan \/ Price Manipulation<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Reliance on manipulatable price oracles.<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Build Finance<\/b><\/td>\n<td><span style=\"font-weight: 400;\">Feb 2022<\/span><\/td>\n<td><span style=\"font-weight: 400;\">$470,000<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Proposal Spam \/ Apathy<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Low quorum; upgradeable token contract.<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Beanstalk<\/b><\/td>\n<td><span style=\"font-weight: 400;\">Apr 2022<\/span><\/td>\n<td><span style=\"font-weight: 400;\">$182 Million<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Flash Loan Governance<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Instant execution of supermajority vote.<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Tornado Cash<\/b><\/td>\n<td><span style=\"font-weight: 400;\">May 2023<\/span><\/td>\n<td><span style=\"font-weight: 400;\">~$1 Million<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Malicious Proposal (Code Injection)<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Governance contract allowed arbitrary code execution.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><b>Table 2: Decentralization Metrics Comparison (2025 Estimates)<\/b><\/h3>\n<table>\n<tbody>\n<tr>\n<td><b>Metric<\/b><\/td>\n<td><b>Polkadot<\/b><\/td>\n<td><b>Solana<\/b><\/td>\n<td><b>Arbitrum (DAO)<\/b><\/td>\n<td><b>Beanstalk (Pre-Hack)<\/b><\/td>\n<\/tr>\n<tr>\n<td><b>Nakamoto Coefficient<\/b><\/td>\n<td><span style=\"font-weight: 400;\">~178<\/span><\/td>\n<td><span style=\"font-weight: 400;\">~19<\/span><\/td>\n<td><span style=\"font-weight: 400;\">&lt; 20 (Delegates)<\/span><\/td>\n<td><span style=\"font-weight: 400;\">N\/A (Liquid)<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Gini Coefficient<\/b><\/td>\n<td><span style=\"font-weight: 400;\">High<\/span><\/td>\n<td><span style=\"font-weight: 400;\">High<\/span><\/td>\n<td><span style=\"font-weight: 400;\">&gt; 0.95<\/span><\/td>\n<td><span style=\"font-weight: 400;\">&gt; 0.90<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>L2Beat Stage<\/b><\/td>\n<td><span style=\"font-weight: 400;\">N\/A (L1)<\/span><\/td>\n<td><span style=\"font-weight: 400;\">N\/A (L1)<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Stage 1<\/span><\/td>\n<td><span style=\"font-weight: 400;\">N\/A<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Primary Governance<\/b><\/td>\n<td><span style=\"font-weight: 400;\">On-Chain<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Off-Chain<\/span><\/td>\n<td><span style=\"font-weight: 400;\">On-Chain (Delegated)<\/span><\/td>\n<td><span style=\"font-weight: 400;\">On-Chain (Stalk)<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><b>Table 3: Resistance Mechanisms<\/b><\/h3>\n<table>\n<tbody>\n<tr>\n<td><b>Mechanism<\/b><\/td>\n<td><b>Pros<\/b><\/td>\n<td><b>Cons<\/b><\/td>\n<td><b>Example<\/b><\/td>\n<\/tr>\n<tr>\n<td><b>Quadratic Voting<\/b><\/td>\n<td><span style=\"font-weight: 400;\">Dampens whale power; helps minorities.<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Vulnerable to Sybil attacks; complex UX.<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Gitcoin Grants<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Bicameralism<\/b><\/td>\n<td><span style=\"font-weight: 400;\">Checks &amp; balances; separates money\/values.<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Slows decision making; centralized selection of citizens.<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Optimism<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Conviction Voting<\/b><\/td>\n<td><span style=\"font-weight: 400;\">Prevents flash attacks; eliminates &#8220;deadline&#8221; stress.<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Slow; capital inefficient (tokens locked).<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Commons Stack<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Vote Escrow (ve)<\/b><\/td>\n<td><span style=\"font-weight: 400;\">Aligns long-term incentives (locks tokens).<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Reduces liquidity; leads to &#8220;bribe markets&#8221; (Curve Wars).<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Curve Finance<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>1. Introduction: The Fragility of Algorithmic Democracy The advent of the Decentralized Autonomous Organization (DAO) was heralded as a paradigmatic shift in human coordination\u2014a technological leap that would ostensibly solve <span class=\"readmore\"><a href=\"https:\/\/uplatz.com\/blog\/governance-capture-when-decentralization-becomes-illusion\/\">Read More &#8230;<\/a><\/span><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2374],"tags":[],"class_list":["post-8983","post","type-post","status-publish","format-standard","hentry","category-deep-research"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Governance Capture: When Decentralization Becomes Illusion | Uplatz Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uplatz.com\/blog\/governance-capture-when-decentralization-becomes-illusion\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Governance Capture: When Decentralization Becomes Illusion | Uplatz Blog\" \/>\n<meta property=\"og:description\" content=\"1. Introduction: The Fragility of Algorithmic Democracy The advent of the Decentralized Autonomous Organization (DAO) was heralded as a paradigmatic shift in human coordination\u2014a technological leap that would ostensibly solve Read More ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uplatz.com\/blog\/governance-capture-when-decentralization-becomes-illusion\/\" \/>\n<meta property=\"og:site_name\" content=\"Uplatz Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Uplatz-1077816825610769\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-23T10:46:09+00:00\" \/>\n<meta name=\"author\" content=\"uplatzblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@uplatz_global\" \/>\n<meta name=\"twitter:site\" content=\"@uplatz_global\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"uplatzblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"20 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/governance-capture-when-decentralization-becomes-illusion\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/governance-capture-when-decentralization-becomes-illusion\\\/\"},\"author\":{\"name\":\"uplatzblog\",\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/#\\\/schema\\\/person\\\/8ecae69a21d0757bdb2f776e67d2645e\"},\"headline\":\"Governance Capture: When Decentralization Becomes Illusion\",\"datePublished\":\"2025-12-23T10:46:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/governance-capture-when-decentralization-becomes-illusion\\\/\"},\"wordCount\":4364,\"publisher\":{\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/#organization\"},\"articleSection\":[\"Deep Research\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/governance-capture-when-decentralization-becomes-illusion\\\/\",\"url\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/governance-capture-when-decentralization-becomes-illusion\\\/\",\"name\":\"Governance Capture: When Decentralization Becomes Illusion | Uplatz Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/#website\"},\"datePublished\":\"2025-12-23T10:46:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/governance-capture-when-decentralization-becomes-illusion\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/uplatz.com\\\/blog\\\/governance-capture-when-decentralization-becomes-illusion\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/governance-capture-when-decentralization-becomes-illusion\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Governance Capture: When Decentralization Becomes Illusion\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/\",\"name\":\"Uplatz Blog\",\"description\":\"Uplatz is a global IT Training &amp; Consulting company\",\"publisher\":{\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/#organization\",\"name\":\"uplatz.com\",\"url\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/11\\\/Uplatz-Logo-Copy-2.png\",\"contentUrl\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/11\\\/Uplatz-Logo-Copy-2.png\",\"width\":1280,\"height\":800,\"caption\":\"uplatz.com\"},\"image\":{\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Uplatz-1077816825610769\\\/\",\"https:\\\/\\\/x.com\\\/uplatz_global\",\"https:\\\/\\\/www.instagram.com\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/7956715?trk=tyah&amp;amp;amp;amp;trkInfo=clickedVertical:company,clickedEntityId:7956715,idx:1-1-1,tarId:1464353969447,tas:uplatz\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/#\\\/schema\\\/person\\\/8ecae69a21d0757bdb2f776e67d2645e\",\"name\":\"uplatzblog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7f814c72279199f59ded4418a8653ad15f5f8904ac75e025a4e2abe24d58fa5d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7f814c72279199f59ded4418a8653ad15f5f8904ac75e025a4e2abe24d58fa5d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7f814c72279199f59ded4418a8653ad15f5f8904ac75e025a4e2abe24d58fa5d?s=96&d=mm&r=g\",\"caption\":\"uplatzblog\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Governance Capture: When Decentralization Becomes Illusion | Uplatz Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uplatz.com\/blog\/governance-capture-when-decentralization-becomes-illusion\/","og_locale":"en_US","og_type":"article","og_title":"Governance Capture: When Decentralization Becomes Illusion | Uplatz Blog","og_description":"1. Introduction: The Fragility of Algorithmic Democracy The advent of the Decentralized Autonomous Organization (DAO) was heralded as a paradigmatic shift in human coordination\u2014a technological leap that would ostensibly solve Read More ...","og_url":"https:\/\/uplatz.com\/blog\/governance-capture-when-decentralization-becomes-illusion\/","og_site_name":"Uplatz Blog","article_publisher":"https:\/\/www.facebook.com\/Uplatz-1077816825610769\/","article_published_time":"2025-12-23T10:46:09+00:00","author":"uplatzblog","twitter_card":"summary_large_image","twitter_creator":"@uplatz_global","twitter_site":"@uplatz_global","twitter_misc":{"Written by":"uplatzblog","Est. reading time":"20 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/uplatz.com\/blog\/governance-capture-when-decentralization-becomes-illusion\/#article","isPartOf":{"@id":"https:\/\/uplatz.com\/blog\/governance-capture-when-decentralization-becomes-illusion\/"},"author":{"name":"uplatzblog","@id":"https:\/\/uplatz.com\/blog\/#\/schema\/person\/8ecae69a21d0757bdb2f776e67d2645e"},"headline":"Governance Capture: When Decentralization Becomes Illusion","datePublished":"2025-12-23T10:46:09+00:00","mainEntityOfPage":{"@id":"https:\/\/uplatz.com\/blog\/governance-capture-when-decentralization-becomes-illusion\/"},"wordCount":4364,"publisher":{"@id":"https:\/\/uplatz.com\/blog\/#organization"},"articleSection":["Deep Research"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/uplatz.com\/blog\/governance-capture-when-decentralization-becomes-illusion\/","url":"https:\/\/uplatz.com\/blog\/governance-capture-when-decentralization-becomes-illusion\/","name":"Governance Capture: When Decentralization Becomes Illusion | Uplatz Blog","isPartOf":{"@id":"https:\/\/uplatz.com\/blog\/#website"},"datePublished":"2025-12-23T10:46:09+00:00","breadcrumb":{"@id":"https:\/\/uplatz.com\/blog\/governance-capture-when-decentralization-becomes-illusion\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uplatz.com\/blog\/governance-capture-when-decentralization-becomes-illusion\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/uplatz.com\/blog\/governance-capture-when-decentralization-becomes-illusion\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/uplatz.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Governance Capture: When Decentralization Becomes Illusion"}]},{"@type":"WebSite","@id":"https:\/\/uplatz.com\/blog\/#website","url":"https:\/\/uplatz.com\/blog\/","name":"Uplatz Blog","description":"Uplatz is a global IT Training &amp; Consulting company","publisher":{"@id":"https:\/\/uplatz.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uplatz.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/uplatz.com\/blog\/#organization","name":"uplatz.com","url":"https:\/\/uplatz.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/uplatz.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/uplatz.com\/blog\/wp-content\/uploads\/2016\/11\/Uplatz-Logo-Copy-2.png","contentUrl":"https:\/\/uplatz.com\/blog\/wp-content\/uploads\/2016\/11\/Uplatz-Logo-Copy-2.png","width":1280,"height":800,"caption":"uplatz.com"},"image":{"@id":"https:\/\/uplatz.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Uplatz-1077816825610769\/","https:\/\/x.com\/uplatz_global","https:\/\/www.instagram.com\/","https:\/\/www.linkedin.com\/company\/7956715?trk=tyah&amp;amp;amp;amp;trkInfo=clickedVertical:company,clickedEntityId:7956715,idx:1-1-1,tarId:1464353969447,tas:uplatz"]},{"@type":"Person","@id":"https:\/\/uplatz.com\/blog\/#\/schema\/person\/8ecae69a21d0757bdb2f776e67d2645e","name":"uplatzblog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/7f814c72279199f59ded4418a8653ad15f5f8904ac75e025a4e2abe24d58fa5d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7f814c72279199f59ded4418a8653ad15f5f8904ac75e025a4e2abe24d58fa5d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7f814c72279199f59ded4418a8653ad15f5f8904ac75e025a4e2abe24d58fa5d?s=96&d=mm&r=g","caption":"uplatzblog"}}]}},"_links":{"self":[{"href":"https:\/\/uplatz.com\/blog\/wp-json\/wp\/v2\/posts\/8983","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uplatz.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uplatz.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uplatz.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/uplatz.com\/blog\/wp-json\/wp\/v2\/comments?post=8983"}],"version-history":[{"count":1,"href":"https:\/\/uplatz.com\/blog\/wp-json\/wp\/v2\/posts\/8983\/revisions"}],"predecessor-version":[{"id":8984,"href":"https:\/\/uplatz.com\/blog\/wp-json\/wp\/v2\/posts\/8983\/revisions\/8984"}],"wp:attachment":[{"href":"https:\/\/uplatz.com\/blog\/wp-json\/wp\/v2\/media?parent=8983"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uplatz.com\/blog\/wp-json\/wp\/v2\/categories?post=8983"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uplatz.com\/blog\/wp-json\/wp\/v2\/tags?post=8983"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}