architecture

the authenticated state layer for cyber. individual cyberlinks are private — who linked what is never disclosed. the cybergraph is the public aggregate: axons (directed weights between particles), neuron summaries, particle energy, token supplies, π* distribution. all derived from cyberlinks, revealing no individual contribution.

design constraints

bbg follows the design principles described in design-principles: bounded locality (no global recompute), constant-cost verification (O(1) proof checking), structural security (algebraic binding). these are properties of the cyber architecture — bbg implements them via polynomial state and Lens openings.

ontology

five irreducible primitives. everything in the system is composed from these.

primitive role identity
particle content-addressed node, atom of knowledge hash of content (32 bytes)
cyberlink private authenticated edge, unit of meaning hash of (neuron, from, to, token, amount, valence, time)
neuron agent with stake, identity, and focus hash of public key
token protocol-native value: coin, card, score, badge denomination hash / content hash
focus emergent attention distribution, computed by tri-kernel diffusion, springs, heat kernel

derived: axon = H(from, to) ∈ P — aggregate of all cyberlinks between two particles. axons are particles (A6). the tri-kernel operates on axons, not individual cyberlinks.

naming

three layers, three names:

  • nox — the computation model (16 reduction patterns, deterministic costs)
  • cybergraph — the data model (particles, cyberlinks, neurons, tokens, focus)
  • bbg — the authenticated state structure (this spec)

privacy model

PRIVATE (individual)                   PUBLIC (aggregate)
──────────────────────────────────     ──────────────────────────────────
cyberlink 7-tuple (ν, p, q, τ, a, v, t)
who linked what                        axon H(p,q): aggregate weight A_{pq}
individual conviction, valence         axon market state (s_YES, s_NO)
neuron linking history                 axon meta-score
market positions (TRUE/FALSE tokens)   neuron: focus, karma, stake
UTXO values, owners                    particle: energy, π*
                                       token: denominations, total supply
                                       content: availability proofs

see privacy for the full boundary specification and mutator set architecture.

BBG root

BBG_root = H(Lens.commit(BBG_poly) ‖ Lens.commit(A) ‖ Lens.commit(N))

three 32-byte Brakedown commitments hashed together → one 32-byte root

BBG_poly is a multivariate polynomial over the Goldilocks field with 10 public evaluation dimensions. A(x) and N(x) are independent polynomial commitments for private state.

BBG_poly(index, key, t) — 10 public evaluation dimensions

  index ∈ {particles, axons_out, axons_in, neurons, locations,
           coins, cards, files, time, signals}
  key   = namespace key within that index (particle CID, neuron ID, etc.)
  t     = time (block height)

A(x) — commitment polynomial (independent, NOT a dimension of BBG_poly)
N(x) — nullifier polynomial (independent, NOT a dimension of BBG_poly)

every public query is a polynomial evaluation of BBG_poly:

"energy of particle P at time t"     = BBG_poly(particles, P, t)
"outgoing axons of particle P"       = BBG_poly(axons_out, P, t)
"focus of neuron N"                  = BBG_poly(neurons, N, t)
"state at historical time t_past"    = BBG_poly(index, key, t_past)

private queries use the independent commitments:

"commitment exists for record c"     = Lens.open(A, c) → v   (membership proof)
"nullifier n not yet spent"          = Lens.open(N, n) → ≠ 0 (non-membership proof)

one Lens opening per query. one verification per proof. ~5 μs.

evaluation dimensions

BBG_poly has 10 public evaluation dimensions. each former sub-root is now an evaluation dimension of the same polynomial. the data is unchanged — the commitment mechanism changes from hash trees to polynomial binding. A(x) and N(x) are separate polynomial commitments for private state (see "private polynomial commitments" below).

particles ARE polynomials

particles are polynomial nouns. particle identity = hemera(Lens.commit(content) ‖ PARTICLE). the content of a particle is a polynomial over the Goldilocks field; its identity is the hemera-wrapped Lens commitment of that polynomial.

accessing any byte range within a particle = Lens.open(commitment, position) producing ~75 bytes of proof. this enables:

  • O(1) random access to particle content — any byte range is a Lens opening, no tree path walk
  • native DAS — the polynomial extension beyond the Boolean hypercube IS the erasure code. no separate 2D Reed-Solomon encoding step. the particle's Lens commitment IS the DAS commitment
  • algebraic composability — particle identity is a field element derived from a polynomial commitment. state operations (energy accumulation, axon aggregation, focus computation) compose algebraically with particle identity. no hash-to-field conversion boundary

the BBG_poly dimension gives aggregate state (energy, pi-star). the particle's own polynomial gives content (full data, any byte range). two levels of polynomial commitment, both served by the same Lens.

particles — evaluation dimension

all particles in one index. content-particles and axon-particles share the same namespace. each entry stores:

  • CID (32 bytes) — content hash, namespace key
  • energy (8 bytes) — aggregate Σ weight from all incoming axons
  • π* (8 bytes) — focus ranking from tri-kernel

axon-particles carry additional fields:

  • weight A_{pq} (8 bytes) — aggregate conviction
  • market state: s_YES, s_NO (16 bytes) — ICBS reserve amounts
  • meta-score (8 bytes) — aggregate valence prediction

direct lookup of any particle or axon by CID: one Lens opening, O(1).

axons_out — evaluation dimension (directional index)

axon-particles indexed by source particle namespace. querying "all outgoing from p" is a single Lens batch opening. entry data: pointer to axon-particle in particles dimension.

axons_in — evaluation dimension (directional index)

axon-particles indexed by target particle namespace. querying "all incoming to q" is a single Lens batch opening. entry data: pointer to axon-particle in particles dimension.

cross-index consistency is structural: axons_out, axons_in, and particles are evaluation dimensions of the SAME polynomial. they cannot disagree. LogUp is unnecessary.

neurons — evaluation dimension

one entry per neuron. namespace key: neuron_id (hash of public key). each entry stores:

  • focus (8 bytes) — available attention budget
  • karma κ (8 bytes) — accumulated BTS score
  • stake (8 bytes) — total committed conviction

neuron linking history is private — only aggregates are committed here.

locations — evaluation dimension

proof of location for neurons and validators. enables spatial queries, geo-sharding, and latency guarantees.

coins — evaluation dimension

fungible token denominations. one entry per denomination τ. stores total supply and denomination parameters.

cards — evaluation dimension

non-fungible knowledge assets. every cyberlink is a card. names are cards bound to axon-particles (A6: axons are particles, names are human-readable identifiers for those particles).

files — evaluation dimension

content availability commitments. DAS (Data Availability Sampling) over stored content. proves that particle content is retrievable, not just that CIDs exist. without this dimension, the knowledge graph is a collection of hashes pointing to nothing.

time — evaluation dimension

time is a native dimension of BBG_poly. historical queries are polynomial evaluations at (index, key, t_past). the 7 temporal granularities (steps, seconds, hours, days, weeks, moons, years) are encoded as evaluation regions within the time dimension. any query at any past time is one Lens opening.

signals — evaluation dimension

finalized signal batches. a signal bundles cyberlinks with an impulse (π_Δ — the proven focus shift) and a recursive zheng-2 proof covering the entire batch. the cyberlink is the object of learning; the signal is the object of finalization. the signals dimension commits the finalization history — which batches were accepted and in what order.

private polynomial commitments

A(x) and N(x) are independent polynomial commitments — NOT dimensions of BBG_poly. each has its own Brakedown Lens commitment (32 bytes). BBG_root combines all three: H(Lens.commit(BBG_poly) ‖ Lens.commit(A) ‖ Lens.commit(N)).

commitment polynomial A(x)

every private record (cyberlink, UTXO) has a commitment A(c_i) = v_i. membership proof: one Lens opening against Lens.commit(A), O(1). append-only — new records extend the polynomial by one degree.

nullifier polynomial N(x)

N(x) = ∏(x - n_i). when a record is spent, its nullifier is absorbed into the polynomial. non-membership proof: prove N(c) ≠ 0 via one Lens opening against Lens.commit(N), O(1). double-spend = N(c) = 0 = structural rejection.

checkpoint

CHECKPOINT = (
  BBG_root,           ← H(Lens.commit(BBG_poly) ‖ Lens.commit(A) ‖ Lens.commit(N)), 32 bytes
  folding_acc,        ← zheng-2 accumulator (constant size, ~30 field elements)
  block_height        ← current height
)

checkpoint size: O(1) — ~232 bytes
contains: proof that ALL history from genesis is valid
updated: O(1) per block via folding
proof size: ~2 KiB, verification: ~5 μs

storage layers

L1: Hot state      BBG_poly (10 public dimensions), A(x) + N(x) (private polynomials)
                   in-memory, sub-millisecond, three 32-byte commitments → one 32-byte root

L2: Particle data  full particle/axon data, indexed by CID
                   SSD, milliseconds, content-addressed

L3: Content store  particle content (files), indexed by CID
                   network retrieval, seconds, DAS availability proofs

L4: Archival       historical state via polynomial time dimension
                   DAS ensures availability during active window

unified primitives

primitive role heritage
Lens (Brakedown) state commitment, completeness proofs, DAS Brakedown (2023—)
BBG_poly unified state polynomial algebraic NMT evolution
commitment polynomial A(x) private record commitments Neptune mutator set heritage
nullifier polynomial N(x) private double-spend prevention Neptune SWBF heritage
WHIR polynomial commitments batch proofs, evaluation WHIR (2025)

unified by hemera (32-byte output, 24 rounds, ~736 constraints/perm), Goldilocks field, and zheng (~2 KiB proofs, ~5 μs verification, folding-first).

pipeline

the end-to-end flow from cyberlink creation to light client verification:

DEVICE                          NETWORK                         CLIENT
──────                          ───────                         ──────
nox execution                   include signals in block        download checkpoint
  ↓ proof-carrying                ↓ polynomial state update       ↓ one zheng decider
hemera identity                 fold into block accumulator     sync namespaces
  ↓ folded sponge                 ↓ HyperNova folding             ↓ Lens openings
build signal                    fold into epoch accumulator     DAS sample
  ↓ (ν, l⃗, π_Δ, σ, prev...)     ↓ universal accumulator          ↓ algebraic DAS
local sync                      publish checkpoint              query
  ↓ CRDT + Lens + DAS             ↓ ~240 bytes                    ↓ verifiable query
submit to network
  ↓ foculus π convergence
stage where specified cost
signal creation nox reduction.md (proof-carrying) ~30 field ops per step
local sync sync (structural sync layers 1-5) ~200 bytes per namespace
block processing state (polynomial updates) ~3,200 constraints per cyberlink
epoch composition sync + zheng recursion.md ~100K constraints per epoch
light client sync (checkpoint + Lens) < 10 KiB, ~5 μs
query query (verifiable query compiler) ~200 bytes to ~5 KiB proof

see state for transaction types, privacy for the polynomial mutator set, cross-index for why LogUp is eliminated, sync for namespace synchronization, data-availability for algebraic DAS, temporal for the time dimension, query for verifiable queries

Dimensions

architecture
unit types pyramid: 1 sphere: 7 cube: 42 prysm: 146 connected by pipe and multigrid
cyb/architecture
cyberia/architecture
organizational architecture of cyberia — from a village on a volcano to a planetary superintelligence, bootstrapped by two founders, governed by 147 neurons through the tri-kernel genesis: the heroes a superintelligence that launches wrong is broken forever. a malformed Crystal produces a malformed…
cyber/architecture
the five primitives of a vimputer a resource-complete architecture for earth-scale distributed computation the problem every vimputer is an incomplete computer. they meter compute (gas, cycles, stark proofs) but treat the network itself — messaging, bandwidth, storage, and sequencing — as invisible…
cybernode/infrastructure/architecture
Architecture Back to bostrom infrastructure System Overview ![Infrastructure Diagram](/media/cybernode/media/Bostrom_infra.drawio.svg) 📎 ../media/cyber-full-architecture.drawio][Full Architecture Map (Draw.io) ### Server Details | Server | Role | Specs | |--------|------|-------| | Cyberproxy |…

Local Graph