At FOSDEM 2026, Sammy Gwilym presented Willow—a publicly-funded protocol suite designed to resist the weaponization that plagued both centralized and decentralized systems.

Centralized platforms promised connection but delivered surveillance capitalism. Peer-to-peer systems offered liberation but became vectors for exploitation. At FOSDEM 2026, Sammy Gwilym from the worm-blossom collective reframed protocol design through an urgent question: How do we engineer systems that structurally resist weaponization? Their answer emerged through Willow—a suite of publicly-funded, open-source protocols embracing unconventional design constraints to prevent history from repeating.
The presentation dissected historical inflection points where good intentions collapsed. Centralized architectures consolidated power through data asymmetry, enabling manipulation at societal scale. Decentralized networks like early P2P systems avoided single points of failure but created fertile ground for unmoderated harms and protocol-level vulnerabilities. Willow approaches this dual legacy not as opposing paradigms but as complementary case studies in failure modes.
Willow's counterintuitive safeguards include:
- Deliberate Performance Constraints - Intentionally limiting synchronization speeds creates friction against rapid malware propagation and denial-of-service amplification
- Ephemeral Identity Binding - Cryptographic identities that periodically expire force reauthentication, disrupting persistent surveillance and botnet formation
- Asymmetric Accountability - A tiered verification system where resource-intensive actions require progressively stronger identity proofs, disincentivizing spam while preserving anonymity for basic interactions
- Contextual Topology Restrictions - Protocols dynamically adjust connection permissions based on local network conditions, preventing exploitation during infrastructure fragility
These design choices reveal Willow's core philosophy: Protocol resilience requires embracing constraints as protective features. Where traditional systems optimized for unfettered growth, Willow engineers friction points that increase the cost of weaponization. The approach acknowledges that malicious actors will always exist—but their efficiency can be architecturally throttled.
Implementation challenges remain significant. Performance trade-offs may limit real-time applications. Ephemeral identities complicate reputation systems. Most critically, Willow must prove its safeguards can't become censorship tools themselves—a paradox where defensive measures enable new forms of exclusion. The team openly invites scrutiny of these tensions through their public documentation.
Beyond technical specifications, Willow represents a philosophical shift toward protocol design as harm mitigation. By treating weaponization as a first-class threat model rather than an edge case, it offers a template for building systems where structural limitations serve as ethical guardrails. As Gwilym concluded: "We're not designing for an ideal world, but for the broken one we inhabit—where protocols must withstand not just technical failure, but human malice."

Comments
Please log in or register to join the discussion