The Credential Paradox
The Credential Paradox
Why I See What Others Miss
Most people designing refugee solutions have never been refugees. They have doctorates in international development, positions at NGOs, grants from foundations. They understand displacement through reports, statistics, and field visits that end with flights back to countries where their passports work. They are essentially cooks writing recipes for meals they’ve never eaten and never intend to eat themselves. So, naturally they don’t understand the needs, resources that are available or lacking, or the risks fully undocumented humans face when trying to operate in the modern world.
I don’t have those credentials. What I have is three + decades of living as an internal refugee. A natural-born US citizen who became functionally undocumented by walking away from every system refugees lose involuntarily. Just recently while living within US borders I chose to let both my passport and my driver’s license expire, living without ANY photo ID for over 2 years.
This sounds impossible. How can someone born with citizenship become undocumented? How can someone in the world’s wealthiest nation experience the practical constraints of displacement?
The answer reveals something most people don’t understand: the infrastructure of modern identity isn’t about legal status. It’s about participation in verification systems. When you stop participating, you become invisible, regardless of what your birth certificate says. ALL modern credentialing provides “rented” identities, provided by federal/state issued photo IDs, corporate provided phone numbers/email addresses that gatekeep almost all of modern life.
Thirty Years Outside the Box
In my early twenties, I made a choice that seemed small at the time but compounded into something much larger. I decided not to file income tax returns. Not as protest, not as ideology, simply as opting out of a bargain I didn’t want. I recognized that my money was a form of voting and that by feeding the federal administrative beast I was voting for more of the same and funding my own captivity (as without a passport, also impossible to get without a physical address, leaving the country has been out of the question).
That single choice cascaded: No tax returns → No ability to prove income → No access to debt → No credit cards, car loans, mortgages → No traditional housing → No permanent address → No state-issued ID renewal (requires proof of residence) → No bank accounts (require government ID + address) → No formal employment → Cash-only grey market work → Deeper invisibility.
This led to ongoing restriction not only on my social status and dating options, it limiting my ability to travel, to shelter myself and my possessions, while also limiting my options for employment, for P2P payments, and for securing any surplus value I managed to earn and save. My dating options, vehicle and housing choices, and earning potential ALL were constrained by that one choice. Nowadays, even cellphone access is difficult or impossible without a credit score and a state-issued ID.
As a result, for thirty plus years I’ve lived as a solopreneur in cash economies. I’ve traded services for cash (mostly as a massage therapist and residential contractor), negotiated housing without lease agreements, moved through spaces where nobody asks for papers because everyone understands that some people don’t have them.
This wasn’t romanticized van life or voluntary simplicity tourism. It was structural exclusion. I was forced to learn how systems work by living outside them, discovering which parts of the economy function without institutional verification, understanding who helps people like me and why. For instance, to demonstrate the administrative farce that “proof of residency”, almost everywhere accepts residential leases as ‘proof’ of residency at that address.
But, this is pure compliance and security theater, as residential leases rarely are notarized and have no centralized registry that verifies either the lessee, the lessor, or that the address even exists. The Tenant and Landlord, as well as the physical street address, almost never having the signatories nor the actual location verified. Although, the state of Hawaii that DOES authenticate Tenant/Landlord identities, has a “Catch 22” situation faced by the undocumented. Getting a HI driver’s license does require providing a notarized residential lease, but for those without a state-issued photo ID already, they cannot get a lease notarized because notaries require ID. Which brings up yet another obstacle to contracting faced by anyone without paperwork “proving” their identity and residence.
I had become, functionally, what refugees become when they flee: someone without documentary proof of existence, relying on informal networks and grey market economics to survive. Subject to societal ostracism, limited in my/our ability to communicate, travel, contract, and to engage in commerce as a consumer or a producer.
What You Learn From Outside
Most people inside the system can’t see its shape. They understand individual components, “you need ID to open a bank account,” but not the interlocking dependency structure. For instance, “you need proof of a physical mailing address to get an ID”, which is hard to get when “you need to drive to get a job, you need a job to get a lease, AND you need an ID to do any of those three things”…
From outside, the architecture becomes visible:
The Address Trap: Everything requires proof of residence. But to get residence, you need ID. To get ID you need to ‘prove’ your address, but to get an address you need to travel to, and to get paid at, a job that requires an ID. The circular dependency is invisible to housed people who’ve always had both. To the landless, it’s an impenetrable wall.
The Identity Verification Cascade: Your government ID enables your bank account. Your bank account enables your phone contract. Your phone contract enables your employment. Your employment enables your housing. Lose any single piece, and the cascade reverses, with each system rejecting you because you can’t prove standing others.
The Cash Economy’s Real Rules: Grey markets don’t run on trust, they run on reputation within specific networks. You don’t get paid because people trust you; you get paid because someone they trust vouches for you. A web-of-trust isn’t a technical concept. It’s how informal economies have always worked. Even the “web-of-trust” isn’t an accurate metaphor, as trust networks are not fully meshed systems, they’re more like Venn diagrams of overlapping “Circles of Trust”. Where some trust carries over between overlapping circles, building greater trust between us, as added layers of shared trust circles also choose to trust each one of us. Often groups vouching for us carries more weight than individuals trusting us. Belonging to multiple shared Circle of Trust accumulates reputational capital that is hard won over time.
The Seed of Life is a universal symbol of creation depicting the social dynamics described above. The basis of the Seed of Life is the circle, and in sacred geometry circles represent cycles, as well as encompassing things. The overlapping of the circles shows that these events do not happen independently of each other, either, but that each is intimately connected to the next, building atop what came before it.
The Difference Between Unbanked and Anti-Bank: Most “financial inclusion” assumes people want bank accounts but can’t get them. Mistaking people for cats, by thinking that just because the box exists everyone wants to climb into it. But, many people in cash economies actively avoid banking because it creates records that can flag transactions, enables garnishment, complicates taxes, add fees, delays settlement, and limits access to bankers’ business hours. The solution isn’t easier onboarding onto a badly designed, outdated, sinking ship; the answer is better alternatives.
The Actual Value of Official ID: Over the last thirty years, I’ve needed government-issued ID perhaps a dozen times for things that truly mattered. Everything else (housing, food, work, commerce, community) happened through direct negotiation with humans who cared about competence and reliability, not credentials. Results are what matter and people have learned that a *license *doesn’t equate to craftsmanship and quality results.
These insights are invisible to people who’ve always had addresses and IDs. They design solutions for people they imagine, supposed victims who want to rejoin the system. They miss things that matter to the people who’ve learned to navigate outside it.
The Privilege of Choosing Exit
I want to be clear about something: my exit was voluntary; refugee displacement is not. A Venezuelan mother fleeing regime violence didn’t choose to lose her documents. A Syrian engineer didn’t choose to have his professional credentials destroyed. A Sudanese teacher didn’t choose to live in a camp without address or bank access.
My lived experience doesn’t make me a refugee. It makes me someone who understands the practical constraints refugees face from direct experience rather than academic study. It also has exposed me to the full spectrum of solutions now emerging that none of us has ever had access to.
The privilege of choosing exit gave me three decades to develop expertise that forced exit doesn’t allow. I learned: • How to establish identity through reputation rather than documents • How to store and secure value in forms that don’t require institutions, protecting resources from thugs with, and without, badges or uniforms • How to negotiate exchanges without contracts or legal recourse, where social reputation matters more than credit scores or liability insurance • How to build trust networks when you can’t verify anyone’s claims, where no one trusts one another, and theft, violence, and grift run rampant • How to operate in economies where everything is informal and mainstream marketing isn’t an option, where communication and travel can be expensive and limited • How to survive without the safety nets housed people take for granted, understanding what my essential daily needs truly are and how to provide them for myself without dependence on permission or forgiveness
These aren’t theoretical skills. They’re practical knowledge developed through thousands of transactions, hundreds of negotiations, dozens of situations where I had to prove trustworthiness without credentials. Over these 3+ decades, I’ve domiciled in 8 different states, each time having only one contact in each location I landed in. When I design identity systems for displaced people, I’m not imagining what they might need. I’m building tools that would have solved problems I actually lived.
Circling the Box A phrase I like to use is “circling the box.” This is a process of active movement and observation, looking both inside and outside the “box” of modern civilization, gaining perspective from all angles. Most people live inside a box defined by: • State-issued identity documents • Permanent addresses • Banking relationships • Formal employment • Tax compliance • Credit histories • Property ownership From inside, this looks like civilization itself, the bare minimum for participation in society. Everyone they know lives only inside this artificial construct they all have spent their entire lives inside this box, domesticated by their educational, entertainment, and governance systems from birth.
I’ve spent thirty years circling this box from outside. I see what it looks like from the exterior and the perimeter. I understand which walls are reinforced and which have gaps. I know where the incentives point and where the surveillance concentrates. I understand that without centralized systems trust becomes the most valuable commodity. That our “Net Worth depends on our Networks,” on who knows us and who knows that we know what we know. That ultimately the ONLY form of security is secrecy. That ALL information is best kept strictly ‘need to know’.
But I also see inside the box because I was born there, because I interact daily with housed and banked people, because I’m not isolated from mainstream society; I’m just unbundled from its verification infrastructure. Most don’t even know or even care, until it comes time to date me, live with me, or pay me. Then they tend to get annoyed at my choices creating potential risk, discomfort, and inconvenience for them.
This dual perspective is rare. Most people living fully inside the domesticated box of the modern world don’t see the architecture. Most people fully outside (the house-less populations/undocumented immigrants/refugees) mostly lack the technical literacy or economic stability to research, curate, and architect alternatives.
I’m positioned in a strangely lunatic fringe of the lunatic fringe sort of cultural space: outside enough to see clearly, inside enough to build tools, experienced enough to know what actually works.
Why This Matters for Refugee Infrastructure
When NGOs design digital identity for refugees, they typically imagine: “These people had normal lives with normal documents. War destroyed their papers. They need replacements so they can rejoin normal society.”
They’re thinking “What would I want and what would I do in this situation?” But this fundamentally misunderstands the situation.
Refugees aren’t temporarily disconnected from documentation who need to be reconnected. They’re existing in economies that work differently, cash-based, reputation-driven, verification-free, local and offline-first, global and online second, IF at all. A camp of undocumented refugees has its own internal economics, its own trust networks, its own systems for establishing identity.
The question isn’t “how do we give them real IDs so they can go back to normal?” The question is “how do we formalize and strengthen the alternative systems they’re already using?”
This reframe changes everything: Not: Create credentials governments will accept, but can revoke at any time, for almost any reason But: Create credentials communities will accept, that happen to use technology governments and corporations can’t easily corrupt
Not: Give them bank accounts so they can participate in formal finance, going into debt to do so But: Give them better physical and digital cash economies with cryptographic security
Not: Connect them to institutional verification systems that are rented and can easily have the “locks” changed But: Let them build reputation networks that persist across displacement, independent of phone numbers, email addresses, and physical addresses
Not: Restore what was lost But: Create what never existed, identity infrastructure owned by individuals and communities rather than states, that are self-created, self-authenticated, and self-custodied
These insights don’t come from studying refugees. They come from living without institutional identity and learning what actually works.
The Tools I’ve Curated Over three decades in grey markets, I’ve experimented with every form of alternative value storage and exchange I could find: • Cash (vulnerable to theft, difficult to transmit, leaves no backup) • Precious metals (heavy, requires assaying, hard to subdivide) • Barter (requires double coincidence of wants, leaves no reputation trail) • Informal credit networks (work only within trusted circles, don’t scale, subject to centralization, surveillance, fraud, and rug pulls) • Money orders and cashier’s checks (require ID and fees, create records) • Even when “money” has been temporarily “outlawed” as in the Rainbow Family and Burning Man gatherings, or even within prisons, universal consumables become proxy forms of cash, e.g., cannabis flowers, psychedelic mushrooms, cigerattes
I’ve tried establishing identity through: • Reputation within specific communities (works locally, doesn’t transfer) • Portfolio of work (proves skills and capacity to do work, but not identity) • Personal introductions (requires existing network, hard to verify, slow to acquire) • Expired documents (eventually stop working) • Corporate IDs (ski passes and employee badges only valid while actively employed and only within corporate sandboxes) I’ve participated in economies running on: • Pure trust (fragile when people rotate, obfuscate, and manipulate) • Collateral-based lending (requires assets to start, IDs to sign contracts, & subject to rugpulls) • Time banking (doesn’t preserve value across communities & some people’s time is more useful than others) • Community currencies (collapse when participants leave, liquidity dries up, and leadership leaves) Every approach has flaws. Every system has failure modes.
But in the last five years, something changed:
- Bitcoin created programmable value that moves without institutions.
- Nostr created cryptographic identity that persists without authorities.
- Lightning Network created instant transactions that don’t require banks.
- Fedimint created community custody that distributes trust.
- Cashu created bearer instruments that work offline.
These aren’t improvements on existing systems. They’re fundamental architectural changes that make sovereignty infrastructure viable for the first time.
When I encountered these protocols, I recognized them immediately, not as technical innovations or opportunities to get rish, but as solutions to problems I’ve lived with for 30+ years.
This is why I’m building the foundational infrastructure for Gathers The Circle for myself, as well as others. I have the same itch needing scratching as many refugees do.
The NFC tags aren’t interesting because they’re clever technology. They’re interesting because I know from experience that people need something they can physically hold to prove identity when they have no documents. That QR codes can be scanned by cameras. That the strongest defense against online attacks is something we physically have and that defense against physical attacks is best done through something we know. That biometrics, are worse than our SSN as identifiers, as they not only cannot be changed if/when exposed; we’re forced to trust the cybersecurity of every honeypot that stores the digital records of this data.
The Camp Cash scratch-off notes aren’t interesting because they’re novel. They’re interesting because I’ve spent decades in cash economies and I know exactly when bearer instruments work and when they fail. I understand that tamper proof isn’t necessary; tamper evident is.
That fully self custodial solutions are only necessary for large amounts or for long term holding, while already trusted and known custodians have their own reputations to protect and are fine IF privacy, speed, and cost are gained through the security trade off.
The reputation scoring isn’t interesting because it’s sophisticated. It’s interesting because I’ve built career after career on nothing but peer vouching when I couldn’t provide references or credentials.
The mesh networks aren’t interesting because they’re cutting-edge. They’re interesting because I’ve needed to communicate when I couldn’t give people a permanent phone number, email or physical address, as I often don’t have them (and tend to rotate them if I do), and I know how coordination happens within Circles of Trust.
This is why we must build infrastructure that Gathers The Circle!
Who This Is For
I’m writing this for two audiences who normally don’t talk to each other:
For people inside the box: Those with addresses, IDs, bank accounts, credit histories, (e.g., the housed, highly domesticated/educated and well-documented) who design humanitarian solutions but have never lived outside verification systems. You need to understand that your assumptions about identity and value are local to your context, not universal truths. The tools I’m describing will seem unnecessarily complex or strangely focused. That’s because they solve problems you’ve never encountered.
For people outside the box: The undocumented, the unbanked, the unhoused, the displaced, those hardened by necessity living in grey markets and informal economies who’ve learned to navigate without institutional support. You already understand why these tools matter. What you may not see is that the technology has finally caught up to enable the systems you’ve been improvising. The infrastructure for true sovereignty now exists.
My goal is translating between these worlds:
To the housed: “Here’s why refugees need different tools than you imagine, understood by someone who’s lived the constraints.” To the displaced: “Here’s how the new tools work, from someone who’s used every alternative you’re currently using.”
The Expertise That Doesn’t Credential
I don’t have a degree in computer science, international development, or humanitarian assistance. I have over three decades of lived experience in systems most designers never encounter.
I can tell you from experience: • How reputation networks form in communities where no one has verifiable history • Why people in grey markets avoid certain institutions even when they’re accessible • Which forms of value storage work when you’re mobile and under-documented • How trust gets established when verification is impossible • What happens to informal economies when external shocks hit • Why solutions that work in first-world contexts fail in displacement
This knowledge doesn’t come from research. It comes from ten thousand transactions where I had to prove trustworthiness without credentials, negotiate value without contracts, establish identity without documents, and build networks without institutional backing.
When I design the NFC Name Tag system, I’m not speculating about what refugees might need. I’m building what I needed in 1997, 2003, 2011, 2019: the tools that would have solved real problems I encountered living outside verification infrastructure.
When I design the Camp Cash economy, I’m not theorizing about informal markets. I’m encoding rules I learned through years of cash-economy participation, studying, and learning from how organic out-of-the-box solutions have popped up when needed.
When I design the reputation system, I’m not inventing metrics. I’m formalizing the social dynamics I’ve navigated for three decades.
The tools curated and coordinated by Gathers the Circle represent thirty years of asking: “What would sovereignty infrastructure look like if designed by those living outside the box rather than people trying to put others back in it?”
The Question I’m Answering Most humanitarian technology asks: “How do we help refugees rejoin normal society?”
I’m asking something different: “What if the ‘normal’ they’re supposed to rejoin is structurally broken and displacement is forcing people to discover and create better alternatives?”
After all, international passports are barely 100 years old, “money laundering” as a criminal offense is less than 50 years old, and throughout all of human history before this last half century, financial and identity privacy was not only the default; it was all anyone had ever known.
The housed world runs on: • Identity by permission (states grant documents) • Value by permission (banks grant accounts) • Communication by permission (telecom companies grant numbers) • Coordination by permission (institutions grant legitimacy)
Every system requires authorization from a central authority that can revoke access credentials.
The displacement experience, forced or voluntary, reveals a different possibility: • Identity by cryptography (you create it, you prove it, you custody it, no one grants it) • Value by protocol (mathematics secures it, no institution holds it) • Communication by network (peers relay it, no company controls it), and • Coordination by consensus (communities decide it, no authority validates it)
These aren’t theoretical alternatives. They’re architectural patterns that have always existed in informal economies. The new sovereignty tools simply make them cryptographically enforceable and digitally portable. Refugees don’t need help getting back into the broken system. They need tools that make the alternative systems they’re building as robust as institutional infrastructure, without its control.
That’s what Gathers the Circle provides:
Infrastucture for the Displaced.
Identity for the Self-Sovereign.
What Comes Next
The following articles will detail the infrastructure:
- NFC tags sewn into clothing,
- scratch-off bearer cash,
- mesh networks,
- reputation scores,
- guardian federations,
- 3D-printed identity carriers,
- solar-powered nodes.
To someone who’s only known institutional verification, this will seem impossibly complex. To someone who’s lived outside institutions, this will seem obviously necessary.
These tools solve problems you either recognize immediately or have never encountered. Your reaction will reveal which side of the box you’re on.
But here’s what matters: by the end, you’ll understand how sovereignty infrastructure actually works, not as an intellectual theory, not in whitepapers. But in camps and grey markets, in communities where people have no choice but to create alternatives, to assume responsibility for their own infrastructure, and to protect it all themselves. Because I’ve built my life in these environments for thirty years and I know what works.
Not because I studied it.
Because I live it.