Economic primitive

đŸ’© Shibi (汎极)

Shibi is Datom.World's capability token system—a general-purpose economic primitive for managing shared resources and agent authority. While spam control demonstrates its power (solving the tragedy of the commons through market economics), Shibi's true scope extends to all forms of resource access: stream permissions, computational budgets, agent migration credentials, and API rate limits. Anyone can issue infinitely many purpose-specific tokens, making Shibi the foundation for both human attention markets and autonomous agent coordination.

All open networks suffer from spam when they get popular, a classic tragedy of the commons. The open platform is a shared resource, but when anyone can use it without cost, spam makes the platform unusable for everyone. Email is the canonical example. Spam filters help, but spam still gets through. Inboxes fill with thousands of unread messages, most of them spam, making it impossible to find legitimate messages buried in the noise. Classical economics offers two solutions to the tragedy of the commons: central control (government regulation) or privatization (dividing the commons into private property). Open networks have tried both: walled gardens impose centralized moderation, spam filters attempt algorithmic control. Neither works well. The spam problem is real, but censorship is equally problematic: one person's trash is another person's treasure, and centralized gatekeepers can't distinguish between them. Shibi offers a third path between censorship and chaos, a design that directly addresses the fundamental critiques of attention markets .

Shibi (汎极) literally means "shit coin" in Chinese. The name is intentional. This isn't money, and it's not trying to replace money. For a deep dive into why Shibi deliberately avoids being money-like, see Why Shibi Cannot Be Like Money . While spam control is its most visible application, Shibi's capability model applies to any shared resource that needs economic coordination. More importantly, Shibi isn't a single token. It's a system that allows anyone: people, organizations, or autonomous AI agents, to be their own central bank, easily issuing infinitely many utility tokens for different purposes. Each token is purpose-specific: one for email attention, another for API rate limiting, another for forum moderation. The provocative name "shit coin" makes this clear: these aren't speculative assets, they're contextual utilities.

So how does this third path actually work? Shibi draws on three key sources: biological cell membranes, carbon credit systems that turn pollution into a tradable commodity, and Nobel laureate Elinor Ostrom 's theoretical framework for governing shared resources.

The biological inspiration comes from cell membranes, which have solved the spam filtering problem for 3.5 billion years. Cells maintain open boundaries without being overwhelmed by noise through capability-based filtering: specific receptors, energy costs, and rate limiting. These evolved mechanisms prove that open systems can remain functional by making communication costly and specific, not by blocking everything.

The carbon credit inspiration addresses spam as a negative externality. Just like pollution, spam imposes costs on others: one party consumes another person's attention without paying for it. Carbon credit systems turn pollution, an environmental negative externality, into a tradable commodity, making it costly and creating market incentives for reduction. Similarly, Shibi makes spam costly and creates economic pressure for its reduction.

Ostrom spent her career proving communities can successfully manage shared resources through self-governance without top-down regulation or privatization. She identified eight design principles for governing the commons, and Datom.World implements them all:

Principle Ostrom's Definition Datom.World's Implementation
Clearly defined boundaries Who can use the resource is well-defined. Capability tokens define access boundaries: possession of a token proves authorization. Tokens are issued to cryptographic identities (wallets) but authority derives from token possession, not identity.
Rules fit local needs Rules are tailored to context. Datom.World allows interpreters to interpret the same datom stream in context-specific ways — one truth, many perspectives.
Collective decision-making Users help make and modify rules. Datom.World allows for stigmergy where users and agents can form adhoc entanglement groups.
Monitoring Users or accountable monitors keep track of use. Every transaction on Shibi is transparent on-chain.
Graduated sanctions Fair penalties for rule violators. Market economics makes spam economically visible and self-correcting.
Conflict resolution Low-cost ways to resolve disputes. Dispute resolution can be handled through local smart contracts or market arbitration.
Recognition of rights External authorities recognize local autonomy. Datom.World's core principle is local-first autonomy.
Nested enterprises Systems are organized in multiple layers. Datom.World is built to enable stigmergy, allowing emergent structures that can be nested, overlapping, or self-organizing.

Datom.World is Ostrom's principles encoded in software, with Shibi as the economic primitive that turns her theoretical framework into a practical tool for managing open platforms as shared resources.

Biological Systems: 3.5 Billion Years of Proven Design

Let's examine the biological inspiration in detail. Shibi isn't inventing a new solution to spam; it's implementing mechanisms that biological cells have used for billions of years. Cells face the exact same problem as any information processing system: how do you prevent spam signals from overwhelming the membrane? Cell membranes are constantly bombarded with noise, false signals, and malicious molecules. Nature evolved proven solutions:

  • Energy cost as filter : Producing and sending signaling molecules requires ATP. Just like Shibi makes communication cost tokens, biology makes signaling cost energy. Spam is metabolically expensive.
  • Receptor specificity : Each receptor only binds to specific molecular shapes, like capability tokens that only grant specific access. Random noise doesn't have the right shape.
  • Signal threshold requirements : Weak signals don't trigger responses. Receptors require minimum concentrations or binding durations, filtering out noise.
  • Receptor desensitization : After activation, receptors temporarily shut down or internalize, preventing repeated triggering. This is biological rate limiting.
  • Signal degradation : Enzymes quickly break down signaling molecules, preventing buildup. Messages have a short lifetime.
  • Competitive inhibition : Legitimate signals compete with spam for receptor binding sites. The cell membrane is a marketplace.
  • Immune response : The immune system detects and eliminates malicious signals (pathogens, toxins), like a spam filter that learns and adapts.

These biological mechanisms map directly to Shibi's design:

Biological Mechanism Shibi Implementation
Energy cost (ATP) Capability tokens
Receptor specificity Capability-based access control
Signal thresholds Economic viability requirements
Receptor desensitization Rate limiting
Signal degradation Token expiration
Competitive inhibition Market dynamics
Immune response Reputation and filtering systems

The cell membrane proved that you can have an open, interpretive boundary without being overwhelmed by noise. The cost is energy. In Datom.world, the cost is capability tokens. Life has been running this experiment for 3.5 billion years. It works.

Shibi as Capability Tokens for Agents

While spam control demonstrates Shibi's power, the capability token model extends far beyond attention markets. Shibi tokens are general-purpose capabilities that define what actions agents can perform, making them the foundation for agent authority and resource control in Datom.World.

In Datom.World, agents are implemented as continuations running on Yin.VM . These agents are mobile—they migrate across nodes, pause and resume execution, and carry their computational state with them. Shibi capability tokens travel with these continuations, defining what the agent is authorized to do at each location.

Capability tokens define authority, not identity. An agent doesn't prove who it is; it proves what it can do by possessing the right tokens. This follows the object capability security model: possession of a valid token is necessary and sufficient for authorization—though as we'll see, authorization doesn't automatically imply trust.

Beyond Spam: Agent Use Cases

Shibi tokens enable multiple forms of agent coordination and resource control:

  • Stream access control : Tokens grant read or write access to specific datom streams. An agent carrying a stream-read token can observe that stream; without it, the stream is invisible.
  • Computational resource metering : Different token classes for CPU cycles, memory allocation, storage capacity, and network bandwidth. Agents pay for resources they consume.
  • Agent migration credentials : When a continuation migrates to a new node, it carries capability tokens proving its authority to execute there. The destination node validates tokens before resuming execution.
  • API rate limiting : Each API endpoint issues its own tokens. Agents must spend tokens to invoke functions, preventing resource exhaustion.
  • Delegation and attenuation : Agents can delegate subsets of their capabilities to other agents. A token granting full stream write access can be attenuated to grant only append access, then passed to a subordinate agent.
  • Cross-agent communication : Agents use tokens to establish communication channels. Possessing a channel token grants the right to send messages through that channel.
  • Stigmergic coordination : Agents leave capability tokens in shared spaces as signals to other agents, enabling self-organizing behavior without central coordination.

Continuations + Capabilities = Mobile Authority

The combination of Yin.VM's mobile continuations and Shibi's capability tokens creates a powerful primitive: portable authority . Traditional systems tie permissions to identity and location. Datom.World ties permissions to possession.

Consider an agent migration scenario:

  1. Agent A runs on Node 1, holding tokens for stream S and resource R
  2. Agent A pauses execution, serializing its continuation state
  3. The continuation (including token references) migrates to Node 2
  4. Node 2 validates the tokens before resuming execution
  5. Agent A continues running with the same capabilities, now on different hardware

The tokens move with the computation. Authority becomes intrinsic to the continuation itself, not bound to the node where it executes.

Trust is Contextual and Revocable

Importantly, possession of a capability is necessary but not sufficient for trust . Having a valid token proves you can perform an action, but doesn't mean the system trusts you unconditionally:

  • Tokens expire : Time-limited authority prevents stale permissions
  • Tokens can be revoked : Issuers can invalidate tokens if behavior changes
  • Tokens are context-specific : A token valid on one stream may be worthless on another
  • Trust must be earned : Initial token grants may be minimal, expanding as the agent demonstrates value

This creates an economic feedback loop where token issuers decide distribution mechanisms—selling tokens, gifting them to trusted parties, or rewarding valuable behavior. Agents that provide value are more likely to receive tokens from issuers, expanding their capabilities. Agents that spam, waste resources, or behave maliciously find their tokens revoked or are unable to acquire new ones.

Why Not Identity-Based Access Control?

Traditional systems use identity ("who are you?") to determine permissions. Capability-based systems use possession ("what can you do?"). For mobile agents running as continuations, capability tokens provide critical advantages:

  • No global identity registry : Agents don't need to authenticate against a central authority. Possession is proof.
  • Fine-grained delegation : An agent can delegate a subset of its capabilities without sharing its identity credentials.
  • Revocation is local : Token issuers can revoke without coordinating with a global permissions database.
  • Migration-friendly : When a continuation moves to a new node, it doesn't need to re-authenticate its identity—it just presents its tokens.

Interpreters All the Way Down

Like everything in Datom.World, Shibi tokens are subject to interpretation. The same token can mean different things to different interpreters:

  • A spam filter interprets tokens as attention cost
  • A resource manager interprets tokens as computational budget
  • A stream gateway interprets tokens as access permissions
  • A migration coordinator interprets tokens as execution authority

This flexibility emerges from Datom.World's core principle: interpretation over abstraction . Shibi provides the substrate—purpose-specific utility tokens—and interpreters provide the semantics. One token substrate, infinitely many interpretations.

Attention Markets: Spam as Economic Signal

Having established Shibi's general capability model, let's return to the attention market use case—the most immediate application most users will encounter. Shibi works on a simple assumption: people will tolerate spam if they are appropriately compensated. The question isn't whether spam should exist, it's who bears the cost. Traditional systems make receivers pay (in time and attention) while senders pay nothing. Shibi inverts this: senders buy tokens, receivers sell them. If the compensation matches the communication, spam becomes tolerable, even welcome.

In Datom.World, nothing is blocked. Every message simply carries a price in purpose-specific tokens. Instead of censorship, market economics tames spam. Shibi turns spam into an economy by making token issuance trivial, letting supply and demand do what moderation cannot: reveal the true cost of communication.

Shibi tokens also define relationships of trust. Users can give their tokens to trusted contacts or systems for free, making communication between them cost-free and transaction-free. Trust becomes explicit: when someone gives you their tokens, you can reach them without cost. This creates circles of trust within the broader economic layer, where close relationships operate freely while unknown parties must pay for access.

For everyone else, the platform stays open and shared, but accessing anyone who hasn't given you their tokens requires compensation. By attaching a price to each request from unknown parties, attention becomes a measurable commodity. Low-value noise gets priced out, while high-value communication flows without cost when users give their Shibi tokens to people they want to hear from. The invisible cost of communication becomes visible, and the market handles the rest.

Today, the digital tracking industry treats your attention as free real estate, harvesting it through cookies, fingerprinting, and cross-device surveillance to build detailed profiles for sale. Shibi inverts that model: instead of your attention being extracted without consent, it becomes a tradable asset you control and price yourself.

This fundamentally changes the online advertising business model. Current advertising is surveillance-based: track users, build profiles, sell access to their eyeballs. Advertisers pay platforms (Google, Meta) who extract value from users without compensation. With Shibi, advertisers pay users directly for attention. No surveillance needed, no intermediary taking a cut. Users become vendors of their own attention, setting prices and choosing which ads to engage with based on offered compensation.

Set your price, invite trusted contacts, and earn when you engage. If someone wants your attention, they pay for the privilege; if you grant it, you capture the value.

Price the ping

Post, DM, or API calls carry a configurable Shibi toll. Low-effort blasts grow prohibitively expensive, while meaningful outreach remains affordable.

Recoup your focus

Opt in, get paid, and reinvest attention on your own terms. You only subsidize the conversations you actually want.

Programmable gates

Let Shibimon agents negotiate terms automatically, pause inbound requests, raise the rate, or whitelist the circles that matter.

You decide who gets through, not a filter you never asked for. Attention stays accountable, and every conversation starts from mutual respect.

Ready to embed Shibi? Pair it with Yin agents for programmable attention, then surface the exchange inside DaoFlow portals.