crypto
the domain of trust through mathematics. crypto is the phenomenon of replacing human trust with computational guarantees: cryptographic proofs verify claims, tokens encode incentives, consensus algorithms agree on state without central authority. not just cryptography (the math of secrets) — crypto is the full stack from hash functions to token economies
for cyber, crypto is the foundation. every cyberlink is signed by a private key. every particle is content-addressed by a hash. STARK proofs compress computation into verifiable certificates. $CYB and $BOOT are the economic primitives that align neurons with the graph's health. without crypto, the protocol is just a database; with crypto, it is a self-sovereign, censorship-resistant knowledge system
scope
cryptography — crypto/graphy, crypto/hashing, crypto/encryption, crypto/signatures, crypto/zero-knowledge, crypto/commitments, crypto/key-exchange, crypto/data-structures, crypto/quantum. the mathematical primitives. hash function selection, polynomial commitment, FRI, WHIR, LogUp, STARK, sumcheck — the building blocks of provable computation
tokens — $CYB, $BOOT, $H, $A, $V, token, tokens, token engineering, coin, $PUSSY. digital assets that carry rights and incentives. token design is mechanism design applied to digital systems
consensus — consensus, consensus algorithms, proof of stake, proof of work, finality, tendermint, nothing at stake, double signing attack, honest majority assumption. how distributed agents agree on truth. Bostrom uses Tendermint BFT consensus
mechanism design — staking, delegation, delegation rewards, automated market maker, arbitrage, prediction markets, auction, pricing, liquidity subsidy. the engineering of incentive structures. cybernomics is cyber's mechanism design
infrastructure — Bostrom, ibc, evm, cosmwasm, cosmos-sdk, ipfs, dht, distributed systems. the technical stack that runs crypto systems. cyber builds on Cosmos SDK with IBC for cross-chain communication
bridges
- crypto → math: cryptographic proofs rest on mathematical hardness assumptions. number theory, algebra, probability underpin everything
- crypto → comp: cryptographic primitives are algorithms. complexity theory classifies what adversaries can and cannot compute
- crypto → socio: crypto replaces institutional trust with mathematical trust. governance, voting, constitution can be implemented on-chain
- crypto → game: mechanism design is applied game theory. staking is a coordination game. auction theory designs markets
- crypto → info: entropy and randomness are cryptographic resources. ciphertext hides information; proofs reveal it selectively
- crypto → cyber: the protocol is a crypto system. keys, hashes, proofs, tokens — every layer of cyber is crypto
key figures
Satoshi Nakamoto, Vitalik Buterin, Ralph Merkle, Eli Ben-Sasson, Daira Hopwood