Mcap -- BTC -- ETH -- SOL -- BNB -- XRP -- F&G -- View Market
Loading prices…

Permissionless

A system anyone can join, use, or build on without needing approval from a gatekeeper. Crypto's most important political property.

Philosophy 5 min read

“Permissionless” describes a system that anyone can use, join, or build on without needing approval from an authority. Bitcoin is permissionless: you can run a node, send a transaction, mine a block, or write software that interacts with the network, and at no point does anyone need to grant you permission. Ethereum is permissionless in the same sense β€” anyone can deploy a smart contract, no review board decides what contracts are allowed, and no signup process stands between you and on-chain activity. This property is sometimes called “open access” or “permissionless innovation”, and it is the thing that separates public blockchains from private databases and centrally-operated payment systems.

The word usually gets contrasted with “permissioned” systems, where participants have to be approved before they can act. Private blockchains used by banks or consortia are permissioned β€” only member institutions can run nodes or submit transactions. Most traditional payment networks are permissioned β€” you need a merchant account, a banking relationship, and compliance approvals before you can accept card payments. The traditional financial system is permissioned top to bottom, and for a lot of the things it does, that is arguably the correct design. For the things crypto exists to do differently, permissionlessness is the core feature.

What Permissionless Actually Gets You

The practical implications of permissionlessness show up in the things that are possible on a public blockchain but not on traditional financial rails.

Building without asking. Uniswap launched in 2018 as a smart contract deployed by a then-unknown developer. It did not need approval from any authority to start handling trades. It did not need to negotiate with banks or acquire licenses. It just existed on-chain, and users who wanted to trade against it could do so. The result was a DEX that eventually handled trillions of dollars in volume, and the founding team never had to ask anyone for permission. In traditional finance, launching a functional trading venue requires years of regulatory work and tens of millions of dollars in setup costs, and many proposed venues never make it because they cannot clear the approval hurdles.

Using without being approved. An ordinary user in Nigeria or Argentina or Iran can interact with DeFi protocols as a first-class user, with the same features as a user in San Francisco. They do not have to prove their income, their residency, their accredited-investor status, or their politics. The contracts accept their transactions because they are valid on-chain, and nothing else. This is an enormous expansion of financial access for people whose local financial systems are dysfunctional, underdeveloped, or politically compromised, and it is one of the genuinely impressive things the permissionless architecture has enabled.

Combining with other protocols. Because everything is on-chain and callable by other contracts, permissionless systems compose. A yield aggregator can build on top of a lending protocol that builds on top of a DEX without needing business development conversations or API access negotiations. The entire DeFi “money legos” phenomenon is a consequence of permissionlessness: when anyone can build on top of anything, the composability is effectively unlimited and the innovation rate is much higher than it would be if every integration required a partnership agreement.

Where Permissionlessness Gets Compromised

In practice, most user-facing crypto is only partially permissionless. The protocol layer is permissionless, but the application layer often introduces gatekeeping β€” exchanges require KYC, frontends geoblock users from sanctioned jurisdictions, wallet providers apply their own compliance rules. The gap between “the protocol is permissionless” and “the user experience is permissionless” is real and has been growing. A person in Iran, in principle, can use Uniswap’s contract directly with a wallet they control; in practice, most users interact with a frontend that might block them based on IP address, and switching to a different frontend or using the contract directly is a technical barrier most people cannot overcome.

The OFAC sanctions on Tornado Cash in 2022 were a watershed moment because they explicitly targeted a piece of open-source code rather than a company, and they produced a chilling effect where many DeFi frontends started preemptively blocking addresses that had ever touched the sanctioned contract. The underlying protocol continued to exist and function β€” you could still send transactions to Tornado Cash using a wallet and an RPC endpoint β€” but the infrastructure around it got more permissioned overnight. This pattern, where the protocol stays permissionless but the surrounding stack gets progressively locked down, is the main way permissionlessness can erode in practice.

Why It Still Matters

Permissionlessness is not an absolute property and it is not evenly distributed across the crypto stack, but it is a meaningful structural feature that public blockchains preserve in ways that other systems do not. A permissionless protocol is one that will still work if every frontend it currently has is shut down, because anyone can build a new frontend. A permissionless protocol is one where the worst case is that the app-layer gets more restricted, not that the protocol itself gets disabled. And a permissionless protocol is one where, ultimately, users who are sufficiently motivated can route around restrictions imposed on them, because the underlying system does not have a central choke point to cut off.

This is the property that makes crypto politically interesting, and it is the property most worth defending when specific incidents make the system look less permissionless than it should be. Everything else β€” DeFi, NFTs, stablecoins, all the specific applications β€” ultimately depends on the protocol layer staying open enough that new applications can emerge without asking first.