TIG: A Call to Arms

The Spaces examined the accelerating centralization of algorithmic science by Big Tech—especially Google—and why this matters for the future of open science. Host and John argued that algorithms, historically open and publicly funded, are becoming investable and thus closed, driven by data flywheels and fiduciary incentives. Antitrust is too slow for a fast-moving, general-purpose technology. Tig (The Innovation Game) proposes to change incentives so publishing algorithms openly is the rational choice, creating a market for “algorithm mining” with proof-of-work style validation and instant monetization, eliminating years-long licensing friction. They urged a grassroots push: raise awareness beyond crypto, coordinate scientists to avoid feeding private know-how, and support open alternatives. Complementary decentralized optimizers don’t compete with Tig—they plug into Tig’s end-to-end licensing and payout layer. Strategy-wise, focus where Google is less active (e.g., vehicle routing, ZK algorithms) and cultivate breadth for cross-domain spillovers. Momentum updates: five new challenges are in the pipeline (Job Shop Scheduling, CUR matrix decomposition, Influence Maximization, ZK-proof generation, Energy Grid Optimization), with growing expert participation. The session closed with practical forecasting advice (demystify, reason from first principles, ignore appeal to authority) and a call to action to fortify an open algorithmic commons.

The Innovation Game (Tig) Space: Algorithmic Centralization, Incentives, and the Roadmap

Participants and Roles

  • John (primary guest; Speaker 1). Author of recent articles on algorithmic centralization and Tig’s thesis; provides technical and strategic analysis.
  • Host (Speaker 2; name not stated). Facilitates the discussion, frames the stakes, runs the community lottery, and reiterates Tig’s mission and onboarding strategy.
  • Others mentioned: Elon Musk (publicly voiced concern about Google-Apple partnership), Ying (community member posting updates), Adeel Malik (community commenter), Apple, Google, OpenAI, Anthropic, Nvidia, CoreWeave (compute provider), Linux, Windows, Bitcoin miners, approach labs (via CL), Oxford University professor (unnamed), Soma Tanaka (Japanese professor; Institute for Advanced Study in Tokyo).

Context and Thesis Shift

  • The Tig Dot Foundation homepage language was updated to reflect Tig’s positioning amidst changing AI landscapes.
  • Host and John underscore that Tig’s framing—an "arc of the covenant" preserving openness in science—has moved from sounding speculative to urgent and prescient.
  • Trigger events: Public recognition of consolidation risks (e.g., Google-Apple partnership; Elon’s skepticism) have catalyzed broader awareness.

Core Problem: From Open Algorithmic Science to Closed, Investable IP

  • Historically, algorithmic science has been open, publicly funded, and peer-reviewed; the "algorithmic commons" was not readily investable, keeping it accessible.
  • John’s central claim: AI now enables industrial-scale, automated algorithm discovery and improvement. Once algorithms become investable assets (as AI accelerates discovery), capital incentives push them closed and proprietary.
  • Google isn’t just "seizing the means of production"; it is creating new means of production—an omnipotent computer scientist—potentially privatizing the scientific substrate.
  • Personalized AI (e.g., Gemini linked to Gmail/Docs) improves a user’s local experience, but does not produce the powerful network effect. The real flywheel is shared know-how: everyone’s data improving everyone else’s results. That know-how accumulation is transferable and dramatically amplifies dominance when privatized.

Incentives, Emics, and Media Narratives

  • The host emphasizes “follow the money”: firms act according to incentives (fiduciary duty), not innate malice. Classical market structures are buckling under new tech dynamics.
  • John’s "emic logic": Smart actors conceal strategic advantages until lock-in is secure. Public announcements reflect what firms want you to believe, not necessarily the core source of advantage.
  • Media uniformity: Narratives attribute Google’s momentum to Gemini personal intelligence and the Siri partnership—precisely the story Google benefits from. There is little dissent or deeper probing into underlying mechanisms.

Why Antitrust Is Not a Safety Net

  • Breaking up monopolies via antitrust is too slow relative to AI’s pace. Unlike Standard Oil, AI’s capability improves rapidly, rendering traditional remedies dangerously insufficient as a primary strategy.
  • The only robust approach: Change the incentive topology so that openness becomes the emically rational choice.

Tig’s Approach: Changing the Stage Topography

  • Tig (The Innovation Game) positions itself not as another corporate actor, but as a protocol that reshapes incentives—like modifying the stage’s bumps and ridges so profit-maximizing behavior aligns with openness.
  • Tig is a 0-to-1 protocol: It covers end-to-end algorithm development, benchmarking, licensing, and monetization.
  • Market failure and pricing: Traditional “eBay for algorithms” ideas fail because IP and algorithms are hard to price and easy to misappropriate. Proof of work (objective performance on benchmarks) corrects this by revealing value through measurable outcomes.
  • Immediate monetization: Innovators can upload algorithms; if their algorithm is best, they get paid—obviating multi-year licensing negotiations, legal risks, and theft.

Scaling via Decentralization: Precedents and the “Algorithm Miner” Model

  • Precedents:
    • Bitcoin amassed more compute than any private firm could, and its miners pioneered large-scale infrastructure (even aiding the AI boom’s compute ramp via providers like CoreWeave).
    • Linux surpassed proprietary OS development capacity, accelerating away due to open participation.
  • Tig applies similar mechanics: Anyone can “mine” for algorithms (e.g., set up compute in Kazakhstan), discover improvements, and monetize immediately through the network.
  • Economics: Rewards need only exceed electricity and operational costs. A liquid market and proof-of-work benchmarking enable a viable, self-organizing ecosystem.

Interplay with Other Projects: Cooperation, Not Competition

  • Host clarifies: Emerging TAO subnets and projects focused on optimizing algorithms via LLMs and decentralized compute do not make Tig obsolete—they complement Tig.
  • Optimization is one piece; Tig supplies the complete market, licensing, and incentive pipeline. Together, they accelerate discovery and ensure fair monetization.

Scientists’ Moral Dilemma and Coordination Strategy

  • Scientists face incentive pressure to use closed tools that enhance performance (“scientific copilots”), but risk feeding private firms’ know-how lock-in.
  • Coordination opportunity:
    • Raise awareness of the algorithmic centralization risk.
    • Build and endorse competitive, open alternatives (e.g., open-evolve toolchains) so scientists can opt out without sacrificing competitiveness.
    • Use Tig’s mechanisms to monetize and share algorithms, ensuring open co-pilots improve via shared know-how.
  • Scientists are cohesive, norms-driven, and principle-oriented; they can credibly coordinate better than broader consumer groups once the issue is clear and alternatives exist.

Combating Complacency and Cognitive Biases

  • Common drift from "it’s not a problem" to "it’s too late" is psychologically convenient—both absolve people of action.
  • John asserts: It is neither trivial nor already lost. Pragmatic action remains viable.
  • Host references terror management theory (Ernst Becker) to explain why people avoid worldview-disrupting realities; awareness plus a viable path reduces denial.

Strategy: Broaden Algorithm Diversity Beyond What Google Will Prioritize

  • Community insight (Adeel Malik): Focus on areas Google may ignore—vehicle routing, zero-knowledge proof (ZK) algorithms, and other domains beyond core AI/computer science.
  • John agrees: Tig can include AI algorithms and a wider set of seemingly unrelated areas. History shows breakthroughs often spill over from unexpected fields.
  • Advantage: Crowd-sourcing across diverse domains at scale yields serendipitous innovations proprietary labs cannot match given their hiring, infrastructure, and focus constraints.

New Tig Challenges: Pipeline and Provenance

  • Five new challenges in the pipeline; three are on testnet and slated for mainnet soon, two from partners:
    • Job Shop Scheduling (designed by an eminent field expert). Application: efficient utilization of computing resources and scheduling under constraints.
    • CUR Matrix Decomposition (designed with an Oxford University professor; name to be disclosed). Application: matrix approximations with structured column-row selections; broadly useful in data analysis and numerical linear algebra.
    • Influence Maximization (designed by Professor Soma Tanaka, Institute for Advanced Study in Tokyo). Application: selecting nodes to maximize spread in networks (marketing, epidemiology, social diffusion).
    • ZK Proof Generation (from CL, a subsidiary of approach labs). Application: optimizing zero-knowledge proof systems’ algorithms, crucial for scalable privacy-preserving computation.
    • Energy Grid Optimization (from CL/approach labs). Application: algorithmic planning and optimization of energy distribution for efficiency and resilience.
  • Significance:
    • External experts driving challenge design illustrate decentralized traction.
    • Challenges bunching reflects parallel, expert-led development rather than serial, in-house pacing—evidence of the model’s scale.

Community Momentum and Onboarding

  • Expect many more challenges by year’s end; decentralized design allows breadth and speed.
  • Experts skeptical of crypto often become strong advocates once they understand Tig’s mechanism; personal recommendations compound network effects.
  • The mission: raise awareness, onboard innovators, and build grassroots participation to reach escape velocity.

Practical Community Notes

  • Lottery winners recognized: Ares and Robo; instructed to DM the host via X or Discord to claim their prize.

Forecasting and Critical Thinking: John’s Meta-Advice

  • Demystify great outcomes; they’re not magic. Learn how the “trick” works.
  • Don’t let default naysayers talk you out of good ideas. Many people dismiss all new ideas; their stance is statistically comfortable but superficial.
  • Start from first principles rather than authority. Ask for reasons; if they’re weak, ignore the claim—regardless of who makes it.
  • Host adds: Avoid appeal to authority; enumerate fallacies; think punk—contest norms thoughtfully.

Key Takeaways and Actions

  • Recognize the data flywheel and algorithmic centralization risk: industrial-scale algorithm discovery will turn open commons into closed IP unless incentives change.
  • Don’t rely on antitrust or benevolence; change emics with Tig’s protocol so openness is rational and more profitable.
  • Support and build open-evolve alternatives; coordinate scientists to opt out of closed know-how extraction while retaining performance.
  • Contribute algorithms and compute; use Tig’s benchmarking and licensing to monetize objectively.
  • Expand algorithm diversity: include domains Google underweights (e.g., routing, ZK, grid optimization). Serendipitous spillovers win at scale.
  • Fight complacency: It’s neither trivial nor too late. Awareness plus a credible alternative path is how we avert a private algorithmic future.