Local Authority

Users maintain decision authority locally. Systems prioritize offline operation and don't centralize control.

Definition Summary

What it is: Local Authority means users decide and act locally first, without requiring permission from remote servers. Systems work offline and sync changes eventually, not demand authorization.

Why it matters: Centralized authority is a vulnerability. Networks fail. Servers are compromised. Users in low-connectivity or hostile environments need to remain productive and in control. Local-first design eliminates remote dependency and cascading failures.

When to use: Every system capable of offline operation should. Local authority applies to mobile apps, collaborative tools, sensitive data, and resilience-critical systems. If your system requires internet to function, you're accepting unnecessary risk.

Why Local Authority Matters

Centralized architectures create single points of failure. When servers are unreachable—due to network outage, DDoS, geopolitical censorship, or intentional coercion—the entire system freezes. Users lose both data and autonomy.

Local Authority flips this: users maintain a complete, functional copy of their data locally. They can read, write, encrypt, and act without waiting for server permission. Changes sync when connectivity returns.

This has profound consequences:

Implementation Patterns

Offline-First Architecture

Start with local state. All reads and writes happen to local storage first (browser IndexedDB, mobile SQLite, desktop JSON files). Sync to server is secondary—an optimization, not a requirement.

Code sketch:

Conflict-Free Replicated Data Types (CRDTs)

When multiple copies of data exist locally (across devices or sessions), conflicts are inevitable. CRDTs resolve these conflicts deterministically without coordinator:

Example: Git is a CRDT. Multiple users edit locally, commit, and merge. Conflicts surface as diffs users resolve.

Eventual Consistency

Stop demanding immediate global consistency. Accept that:

Anti-pattern: Blocking on server round-trip before showing result to user.

No Forced Cloud Reliance

If your system can degrade gracefully, it should. Never architecturally require:

Better: "Auto-save to cloud if available; work offline if not."

Peer-to-Peer Sync (Optional)

For maximum resilience, enable users to sync directly without central server:

Anti-Patterns (What to Avoid)

❌ Cloud-Only Architecture

System requires internet to function. User clicks "New Document" and gets "No Network" error. Work is impossible offline.

Consequence: Every outage is a productivity crisis. Users in tunnel, airplane, or low-signal area are stuck.

❌ Optimistic Lock Without Offline Support

System allows offline edits but requires server contact to "finalize" them. If server rejects changes (due to newer version), user loses work or is asked to manually merge.

Consequence: Rage. Users feel powerless when system reverts their offline work.

❌ Sync Failures Cascade

One failed sync makes entire app unusable. User can't read new messages, write new notes, or access local data.

Consequence: App feels fragile. Users lose trust in system reliability.

❌ No Transparency on Sync State

User doesn't know if their data has synced. Is this version saved? Is that change backed up? Ambiguity causes anxiety.

Consequence: Users manually export/backup excessively. Friction increases.

❌ Forced Incremental Cloud Features

Release 1.0: Works offline. Release 2.0 adds "Cloud Sync" as paid feature. Release 3.0 makes cloud sync mandatory for new users.

Consequence: Lock-in. Users who want to leave are stranded (their data is only on servers).

Real-World Examples

CouchDB / PouchDB — The Gold Standard

What it is: CouchDB is a document database designed around local-first sync. PouchDB brings this to browsers.

How it works:

Why it works: Designed explicitly for offline-first. No surprises, no cloud-only creep.

Figma — Offline Multiplayer

What it is: Collaborative design tool that let teams edit simultaneously, even without internet.

How it works:

Why it matters: Showed that real-time collaboration doesn't require perfect connectivity. Local authority + smart merging = resilience.

Obsidian — Local Vault First

What it is: Note-taking app where your vault is a folder on your device.

How it works:

Why it works: Users own their data. They're not locked into vendor sync infrastructure.

Git — Distributed Authority

What it is: Version control where every developer has a local, complete copy of history.

How it works:

Why it works: Core design philosophy: "Local authority is normal." No surprises.

Signal Messenger — End-to-End with Local Auth

What it is: Messaging app where encryption keys are generated and stored locally.

How it works:

Why it matters: Even though messaging is network-dependent, authority over keys is local. User controls crypto.

Anti-Example: Microsoft Office Online

What it is: Cloud-only office suite (historically).

The problem:

Lesson: Cloud-first is a business model, not a security model. It concentrates authority in the vendor's hands.

Scope and Applicability

When to prioritize Local Authority:

When you might defer Local Authority:

Never defer for convenience. "Cloud-first is easier" is true for the first 12 months. By month 24, offline users have abandoned you for competitors.

Synthesis Lineage: Disciplinary Roots

Local Authority formalizes patterns observed across multiple established fields:

Local-First Software Movement

The contemporary local-first revolution (Kleppmann, Wiggins, 2019) articulated seven ideals for software:

  1. No requirement for high-bandwidth server
  2. Offline operation by default
  3. Seamless collaboration
  4. Multi-device sync
  5. User data ownership
  6. Encrypted by default (user controls keys)
  7. Long data lifespan (software can be archived/reconstructed)

Protective Computing refines: These ideals describe how to structure *authority*. Local Authority is the architectural expression of "users own their data and decisions locally; servers support but don't control."

Distributed Systems Resilience

Distributed systems theory (Lamport, Fischer et al.) teaches:

Protective Computing applies: Users should never be blocked by unavailable central servers. Local-first design acknowledges network partition as normal and designs around it.

Digital Sovereignty & User Autonomy

Political philosophy of digital sovereignty (Zuboff, Morozov) emphasizes:

Protective Computing operationalizes: Local Authority is the technical instantiation of digital sovereignty. Your data on your device, by default.

Offline-First Mobile Architecture

Mobile app design (Fowler, 2009+) established:

Protective Computing generalizes: These aren't mobile-specific constraints; they're universal truths. All systems should architect as if the network is unreliable.

Security Through Reduction of Authority

Cryptographic and systems security (Saltzer & Schroeder, principle of least privilege) teaches:

Protective Computing applies: Local Authority isn't just convenient; it's a security principle. Distribute authority to reduce attack surface.

Relationship to Other Principles

Local Authority works with:

Next Steps

For system designers:

  1. Audit your architecture: What requires internet? Can offline-first replace it?
  2. Identify "must work offline" features (read, write, sync, crypto)
  3. Choose CRDT or eventual-consistency strategy (operational transforms, last-writer-wins, CRDTs, explicit merge)
  4. Implement local storage first; server sync second
  5. Test offline thoroughly (disable network, kill server, long taxi times)
  6. Make sync state visible to users (showing "synced" vs. "pending")

Related Principles

Next principle to explore: