The Return of the Bearer Share

2026-03-07 · 3,551 words · Singular Grit Substack · View on Substack

How Proof of Stake Rebuilt the One Financial Instrument Democracy Spent Two Centuries Destroying

There is a particular species of intellectual fraud that consists not in lying but in changing the subject. When the architects of Proof of Stake consensus told the world they were building a greener, faster, more elegant method of achieving distributed agreement, they were not, strictly speaking, deceiving anyone. They were merely omitting the interesting part. The interesting part is that they were redesigning the governance of financial infrastructure in a way that reverses two centuries of democratic institutional achievement—and doing so under the cover of a conversation about electricity bills.

The story requires some institutional memory, which is precisely the faculty that technological enthusiasm is designed to overwhelm. So let us begin with the instrument that democratic states spent the better part of the twentieth century destroying, and ask why they bothered.

The Bearer Share and Its Prohibition

A bearer share is a corporate equity instrument that grants ownership rights—voting power, dividend entitlements, governance control—to whoever physically possesses the certificate. No registry. No record. No name. You hold the paper; you hold the power. The genius of the bearer share was its simplicity; its vice was identical to its virtue. When nobody knows who holds the shares, nobody can hold the holders accountable. The governance of the enterprise becomes a séance conducted with invisible hands—and not the benevolent sort that Adam Smith once imagined.

The prohibition of bearer shares followed a specific institutional trajectory. The United Kingdom eliminated them through the Small Business, Enterprise and Employment Act 2015. Panama—historically the most prominent bearer-share jurisdiction, and therefore the most instructive case—enacted Law 47 of 2015, requiring immobilisation of bearer instruments with authorised custodians. The European Union’s Fourth Anti-Money Laundering Directive required member states to establish beneficial ownership registries, rendering bearer instruments functionally incompatible with European corporate law. The OECD’s Global Forum and the FATF’s Recommendations 24 and 25 provided the international scaffolding. The Panama Papers of 2016 provided the political accelerant.

But here is the point that matters, and it is the point that nearly everyone discussing blockchain governance manages to miss: the doctrinal core of these prohibitions was not crime prevention. The core was a structural principle about the conditions of legitimate governance. What was prohibited was not bearer shares as a corporate form per se, but the combination of governance-weighted capital—shares carrying voting rights and economic returns proportional to holdings—with the anonymity of the holder. The prohibitions attached to a specific governance rights bundle: the right to vote, the right to receive dividends, the right to transfer control—all exercised by whoever possessed the certificate, without institutional record of who that was.

Two rationales drove these prohibitions, and conflating them is the first intellectual error one must avoid. The enforcement rationale is pragmatic: bearer instruments facilitate money laundering, tax evasion, sanctions circumvention. This rationale is real and consequential. But it is not the deeper one. The democratic-legitimacy rationale is structural: it holds that the exercise of governance-weighted capital must be linked to identifiable, accountable subjects as a condition of legitimate economic governance, regardless of whether any illicit activity occurs. Anonymous governance power is not objectionable because anonymous governors are presumptively criminal; it is objectionable because anonymous governance power is presumptively unaccountable, and unaccountable governance power is incompatible with the institutional design of a free society.

The progressive prohibition of bearer shares was, in Karl Polanyi’s terms, part of the democratic counter-movement: the embedding of financial governance within accountability structures—beneficial ownership registries, mandatory disclosure, identity verification, fiduciary duties—designed to make economic power legible and constrainable by democratic institutions. This was not a bureaucratic impulse. It was a civilisational achievement. It took two centuries. And Proof of Stake undoes it with a software update.

What Proof of Stake Actually Is

The institutional character of Proof of Stake becomes visible only through comparison with its predecessor, and the comparison reveals a transformation that the word ‘upgrade’ is designed to conceal.

In a Proof of Work system, the right to validate transactions and produce blocks is earned through competitive computational expenditure. The validator is a service provider. They invest in hardware and energy, perform computational work, and are compensated through protocol-defined rewards. The relationship between the validator and the underlying digital asset is contingent and instrumental. A miner need not own any tokens. They sell computational services to the network and may immediately liquidate any rewards received. Governance power under Proof of Work is proportional to current operational expenditure and is therefore continuously contestable: a validator who ceases to invest loses influence immediately and irreversibly. This is a labour market for governance. Power flows to current contributors.

Under Proof of Stake, the right to validate is conditioned on ownership. Validators must acquire and lock the network’s native token. Governance power—the probability of producing blocks, the weight of attestations, the share of rewards—is proportional to the amount staked. The validator’s return is a yield on locked capital: a dividend on equity, not a fee for services rendered. This is not a terminological distinction. It is the distinction between a governance system in which power must be continuously earned and one in which power can be passively accumulated. Under Proof of Work, governance is a labour market: incumbents must continuously reinvest to maintain position. Under Proof of Stake, governance is a capital market: incumbents receive compounding returns that entrench their position over time.

The path-dependence properties differ fundamentally. Proof of Work governance is memoryless: past expenditure confers no present advantage. Proof of Stake governance is path-dependent: early accumulation creates a durable, self-reinforcing advantage. This is the structural mechanism through which Proof of Stake produces what Mancur Olson described as a ‘distributional coalition’: an incumbent group whose primary institutional function is the protection and enhancement of its existing position. The staking economy that has emerged—liquid staking protocols, staking-as-a-service providers, yield aggregators—is a financialisation of the governance layer itself: a secondary market in governance rights that further separates governance power from any productive contribution to the network.

One might call it elegant, if one’s aesthetic standards are sufficiently debased to admire the architecture of a trap.

Infrastructural Domination

Max Weber recognised forms of domination that operate outside the legitimacy question altogether: domination through discipline, through the market, and through what he called ‘domination by virtue of a constellation of interests’—domination exercised not through commands but through the structural arrangement of the conditions within which others must act. When a protocol determines who may validate transactions, how rewards are distributed, and what consequences attach to various actions, it exercises governance power that shapes the economic lives of millions of participants. Yet it does so not through commands issued by an identifiable authority but through the impersonal operation of code—a form of structural power that is difficult to locate within any legitimacy framework precisely because it operates beneath the threshold of recognisable authority.

Michael Mann’s concept of ‘infrastructural power’—the capacity of the state to penetrate and coordinate the activities of civil society through institutional infrastructure—offers a useful counterpoint. Mann distinguished infrastructural power from despotic power. The governance of Proof of Stake systems inverts Mann’s framework entirely: it is infrastructural power exercised without a state, and without the accountability structures that democratic states have developed to legitimate such power.

This is what I call infrastructural domination: the exercise of consequential governance power through technical infrastructure by agents who are neither identifiable nor accountable to those subject to their decisions. The concept requires three conditions to be jointly satisfied. First, governance power is exercised through infrastructural design—through the structural arrangement of the conditions within which participants must act, rather than through commands issued by a recognisable authority. Second, the identity of the power-holder is institutionally illegible—the agents exercising governance power cannot be identified by the institutional mechanisms that would be required to hold them accountable. Third, no internal accountability mechanism exists within the infrastructure itself that is capable of constraining the exercise of that power in the interests of those subject to it.

The first condition without the second describes Lawrence Lessig’s ‘code is law’: consequential but attributable. The first and second without the third describes a governance form that is illegible but internally constrained. All three conditions together produce the distinctive governance pathology: power that is consequential, unattributable, and unconstrained. This is not a gap in regulation that could be filled by extending existing rules. It is an architectural transformation that renders the regulated subject—the identifiable agent exercising financial governance power—institutionally invisible.

The Digital Bearer Share

The claim is precise: Proof of Stake governance is functionally equivalent to bearer shares with respect to the accountability properties of governance-weighted capital. It reproduces the specific institutional problem that bearer-share prohibitions were designed to solve: the exercise of consequential governance power through capital holdings whose beneficial controller is not institutionally identifiable.

The equivalence can be formalised as a two-layer test. The first layer establishes governance anonymity; the second establishes governance salience. Both must be satisfied for the bearer-share problem to arise.

Governance anonymity requires two conditions. First, unlinked exercise: the governance rights bundle—transaction inclusion, block finality, rule-application, de facto veto power, and a reward stream proportional to stake—can be exercised without the beneficial controller’s identity being institutionally ascertainable. The critical precision here is ‘not institutionally guaranteed to be ascertainable,’ not ‘impossible to discover under any circumstances.’ Chain-analytics firms and exchange records may reconstruct partial attribution. But these are contingent, exogenous, and incomplete. The system itself provides no endogenous mechanism linking governance power to an identifiable subject. Any legibility is achieved despite the architecture, not through it. Second, low-cost fragmentation: beneficial control can be distributed across unlimited pseudonymous identifiers at negligible marginal cost, obscuring the actual concentration of governance power.

Governance salience also requires two conditions. Material consequentiality: stake size determines the probability of block production, the weight of governance attestations, and the share of protocol rewards. And the absence of built-in disclosure: there is no protocol-level disclosure obligation tied to the exercise of governance power. Unlike registered securities, where threshold ownership triggers mandatory reporting, Proof of Stake protocols impose no comparable requirement.

A system satisfies the bearer-equivalence conditions when both layers are jointly satisfied: governance power is both anonymous and salient. Many systems have pseudonyms but trivial governance stakes. Many systems concentrate governance power but with identifiable governors. The bearer-share problem arises specifically at the intersection: consequential, unattributable governance power. And every major Proof of Stake system currently in operation—Ethereum, Solana, Cardano, and Cosmos-based networks—satisfies all four conditions.

Three levels of legibility must be kept analytically distinct. Address-level legibility—the visibility of on-chain activity by pseudonymous address—is high. Operational-entity-level legibility—the ability to attribute addresses to known organisations—is partial, achieved through self-disclosure and clustering heuristics. Beneficial-controller-level legibility—the ability to identify the ultimate human or institutional actor who controls governance decisions—is systematically unavailable. A perfectly transparent ledger of pseudonymous accounts tells you everything about what was done and nothing about who did it. It is beneficial-controller legibility—the level at which democratic accountability operates—that Proof of Stake architecturally fails to provide.

The Digital Freeport

Pseudonymous Proof of Stake systems create what might be called a ‘digital Freeport’—a governance space that operates outside jurisdictional accountability structures. It differs from physical offshore finance in three structural respects. First, it is jurisdictionally unbounded: a physical Freeport exists in a territorial jurisdiction, however permissive; a Proof of Stake validator exists in no jurisdiction at all, or equivalently in all of them simultaneously. Second, it is infinitely divisible: where an offshore shell company has finite administrative costs, pseudonymous address creation is computationally costless and unlimited. Third, it is technically self-enforcing: the opacity of a physical Freeport depends on the cooperation of custodians and jurisdictional authorities; the pseudonymity of a cryptographic address is enforced by mathematics, requiring no human cooperation and resistant to unilateral regulatory intervention.

Where Ronen Palan documented how certain states sell regulatory absence as a commodity, and Gabriel Zucman and Nicholas Shaxson documented how offshore financial centres create zones of regulatory opacity that systematically advantage the wealthy, Proof of Stake systems create regulatory opacity through protocol engineering rather than jurisdictional engineering. The analytical tools of financial geography—network analysis of ownership structures, identification of conduit and sink jurisdictions—must now be extended to encompass computational governance architectures that function as virtual offshore jurisdictions.

A sceptic might object that beneficial-controller opacity is not unique to Proof of Stake: many private firms and offshore trusts are similarly opaque. This objection conflates two institutionally distinct phenomena. Regulatory evasion is opacity achieved within a jurisdictional system that requires transparency: the hedge fund that fails to file beneficial-ownership disclosure is violating an existing obligation. The opacity exists despite the institutional design. Architectural opacity is the absence of any endogenous mechanism that would map governance power to identifiable subjects in the first place. Proof of Stake governance is architecturally opaque, not evasively opaque. Offshore trusts evade transparency requirements; Proof of Stake validators operate in a space where transparency requirements cannot attach. The distinction matters because the institutional response differs: regulatory evasion is addressed by better enforcement; architectural opacity requires either redesign of the infrastructure itself or the creation of entirely new institutional mechanisms that do not yet exist.

Financial Recognition and Its Violation

What conditions must financial governance satisfy to be legitimate? One might construct these from scratch, but it is more honest—and more damning—to show that they are already operationalised in the institutional architecture of existing financial governance.

Identity legibility is the principle embedded in beneficial ownership registries: the EU’s Central Register of Beneficial Ownership, the UK’s Persons with Significant Control register, the US Corporate Transparency Act of 2021. Participatory visibility is the principle embedded in threshold disclosure regimes: SEC Schedule 13D requires any person acquiring more than five per cent of registered equity securities to file a public disclosure within ten days, so that concentrations of governance power are institutionally observable. Reciprocal accountability is the principle embedded in fiduciary duties: directors owe duties of care and loyalty to shareholders, creating an institutional mechanism linking governance power to enforceable obligations toward those subject to it.

These three conditions—identity legibility, participatory visibility, reciprocal accountability—constitute what might be called the conditions of financial recognition: the institutional requirements necessary for legitimate financial governance. They are not novel normative desiderata imposed from outside; they are a description of the institutional logic already present in corporate and securities law—a logic that Proof of Stake governance architecturally circumvents.

Pseudonymous Proof of Stake systems violate all three conditions at the beneficial-controller level. The validator’s beneficial controller is not institutionally guaranteed to be identifiable. The distribution of governance power is obscured by address multiplication and intermediary structures, so that entity-level concentration can only be partially reconstructed through heuristic methods. And the exercise of governance power carries no built-in accountability obligations linking governance decisions to identifiable subjects.

The chain from recognition failure to domination involves four stages. Illegibility: when governance power is exercised through pseudonymous addresses that can be multiplied at negligible cost, the mapping between governance weight and beneficial controller is destroyed. Non-recognition: if governors cannot be identified, they cannot be subjected to legibility requirements, visibility is impossible, and accountability cannot function. Arbitrary power: non-recognition produces the conditions for arbitrary power in Philip Pettit’s precise sense—governance power that is not tracked by the interests of those subject to it and not subject to effective contestation. Democratic illegitimacy: domination in the republican sense is a sufficient condition for illegitimacy, regardless of whether the power is actually exercised abusively.

The system may function smoothly. The power may never be exercised with malice. But the structural capacity for unaccountable interference exists and cannot be institutionally checked. This is domination as structural condition, not as empirical event. And the republican principle holds that legitimacy requires not merely the absence of harm but the absence of the structural capacity for unaccountable harm.

Why Endpoint Regulation Fails

The strongest objection holds that pseudonymity at the protocol level is compatible with accountability at institutional endpoints: exchanges perform identity verification, liquid staking protocols could be registered, custodial services are already regulated. This objection identifies a genuinely operative mechanism. The question is whom it reaches.

Exchange-custodied stakers—approximately twenty per cent of Ethereum stake—are subject to identity verification through the intermediary. But the regulatory obligations attach to the exchange’s custodial functions, not to the governance decisions its validators make. No existing framework imposes fiduciary or disclosure obligations on exchange-operated validators as validators. Liquid-staking-protocol stakers—approximately thirty-four per cent—interact with permissionless smart contracts requiring no identity verification. Registration of the protocol would constrain operators but would not reveal the identity of the stakers whose capital the protocol deploys. Solo stakers and peer-to-peer acquirers—proportion unknown by construction—interact with no regulated intermediary at any point. Endpoint regulation does not reach them at all.

The critical point is this: the proportion of stake in the fully opaque category is not merely unknown but structurally unknowable under current architecture. Since the protocol does not record how tokens were acquired, there is no endogenous mechanism for distinguishing stakers who passed through regulated intermediaries from those who did not. The architecture does not merely create gaps in endpoint regulation; it makes the size of those gaps unascertainable. A governance system in which the accountability infrastructure covers an unknown fraction of governance power does not satisfy the institutional conditions of financial recognition, even if the covered fraction is substantial.

The Anti-Political Machine

Proof of Stake advocates frequently describe the technology as apolitical: a neutral technical infrastructure that takes no sides and imposes no ideology. The analysis suggests the opposite. A governance arrangement that removes consequential power from institutional visibility is not apolitical—it is anti-political in a precise sense. Not in the intent of its designers, which may be genuinely libertarian or efficiency-oriented, but in its institutional effect: it forecloses the possibility of political contestation by making the objects of contestation—who holds power, how much, and by what authority—institutionally unobservable.

The apolitical framing is itself an ideological operation. It presents the withdrawal of governance from democratic legibility as a technical feature rather than a political choice. But the conversion of a labour-market governance system into a capital-market governance system, in which compounding returns entrench incumbents and pseudonymity conceals concentration, is not a technical improvement. It is a political transformation accomplished through technical means—which is precisely what makes it difficult to recognise as a political transformation.

The novelty of Proof of Stake governance is not concentration. All financial infrastructure concentrates power. All corporate governance involves asymmetries of control. What distinguishes Proof of Stake from every prior institutional form is that the concentration occurs outside the institutional conditions—identity legibility, participatory visibility, reciprocal accountability—that democratic societies have developed to make concentrated power constrainable. The problem is not that some entities have more governance power than others; it is that the institutional architecture makes it impossible to know which entities have how much power, and therefore impossible to subject that power to democratic constraint.

That is the specific institutional pathology. It has a name now: infrastructural domination. It has a formal test: the bearer-equivalence conditions. And it has a normative framework: financial recognition. What it does not yet have is an adequate institutional response.

The Question

The embedding of financial governance within democratic accountability structures was the product of two centuries of institutional development—of political struggle against the unaccountable exercise of economic power. The prohibition of bearer shares, the creation of beneficial ownership registries, the development of mandatory disclosure regimes, the imposition of fiduciary duties: these were not bureaucratic accidents. They were the institutional expression of a principle that free societies arrived at through hard experience—that the exercise of governance-weighted capital must be linked to accountable subjects, or the power that capital confers will be exercised without constraint and without remedy.

Proof of Stake consensus mechanisms have encoded a reversal of this achievement in cryptographic protocol. They have rebuilt the bearer share in digital form—more scalable, more divisible, more jurisdictionally elusive than the paper original—and called it innovation. The question is whether democratic institutions will recognise the institutional transformation underway before the technical architecture forecloses the possibility of institutional response.

Previous forms of disembedding—offshore incorporation, bearer shares, regulatory arbitrage through shell companies—operated within the jurisdictional system. They exploited gaps between territorial regulatory regimes. Proof of Stake governance operates outside the jurisdictional system altogether. It creates a governance space that is not in any jurisdiction, and therefore cannot be reached by the extension of any single jurisdiction’s rules.

The institutional response, if democratic societies choose to make one, will require not merely the extension of existing frameworks but the development of new institutional technologies capable of making computational governance legible and accountable. A validator licensing regime. Threshold disclosure mechanisms. A governance charter imposing fiduciary-like obligations. These are not impossible. They are merely unattempted. And the distance between the unattempted and the impossible is precisely the distance that separates a society that governs its institutions from one that is governed by them.

The bearer share was prohibited because democratic societies recognised that anonymous governance power is incompatible with the conditions of legitimate economic order. The digital bearer share has been rebuilt because those same societies have not yet recognised that the same principle applies when the certificate is a cryptographic key and the corporation is a protocol. The recognition will come. The question—the only question that matters—is whether it will come in time.


← Back to Substack Archive