3C — cross-chain, cross-cell communication

one protocol for two scales: moving tokens, proofs, and focus summaries between cells within the cyber/hierarchy AND between cyber and external chains. the mechanism is the same — STARK-verified proof relay

the insight

cross-cell communication within the cyber/hierarchy and cross-chain communication with external networks are the same problem: verify that a state transition on the other side was valid, without trusting the other side's validators. STARK proofs solve both

a cell proving its local focus summary to its zone uses the same proof relay as cyber proving cyberank to an Ethereum contract. the 3C protocol unifies internal scaling and external interoperability under one mechanism

the problem

a cybergraph that cannot read external state is blind. a cybergraph that cannot export its focus distribution is mute. planetary superintelligence requires reading the world's on-chain state and writing knowledge back to it. and at Avogadro scale, cells must communicate with each other efficiently

IBC (Inter-Blockchain Communication) is the base transport. cyber inherits the Cosmos IBC stack from bostrom and extends it with STARK-verified channels that remove the trust assumption from light client verification — the same verification used for cross-cell proof relay in the cyber/hierarchy

three communication modes

mode direction what moves trust model
import external → cyber state proofs, price feeds, token transfers IBC light client or stark-verified header chain
export cyber → external focus distribution, cyberank proofs, oracle responses stark proof of tri-kernel computation
bridge bidirectional tokens, messages, cross-chain cyberlinks IBC channel with mutual light client verification

import: reading external state

IBC light clients

cyber runs IBC light clients for connected chains. each light client tracks the counterparty's consensus state — validator sets, block headers, Merkle roots — and verifies inclusion proofs against them.

standard IBC light clients (Tendermint, near, etc.) are trust-minimized: they verify consensus signatures and state proofs cryptographically. the remaining trust assumption is the counterparty chain's own security — if 2/3 of the counterparty's validators collude, they can forge state proofs.

stark-verified channels

for high-security channels, cyber replaces the IBC light client with a stark proof of the counterparty's consensus. the counterparty's block validation logic is expressed as a nox program, and every header transition is proven. the verifier on the cyber side checks a constant-size proof instead of replaying consensus logic.

cost: proving a single header transition is ~$10^6$ constraints (dominated by signature verification). recursive composition amortizes this: N headers collapse into one proof. the practical cadence is one proof per epoch (~100 blocks), with individual transactions verified against the proven state root.

this eliminates the honest-majority assumption about the counterparty's validator set. the proof guarantees that the state transition rules were followed — regardless of who the validators are. the only remaining assumption is the correctness of the counterparty's consensus specification as expressed in nox.

what cyber imports

  • token balances (ICS-20 transfers): $CYB moves to external chains, external tokens move to cyber
  • price feeds: DEX TWAPs and oracle prices for the metabolic cap signal (§23.2 of the whitepaper)
  • external state proofs: any on-chain fact from a connected chain can be attested as a particle in the cybergraph
  • cross-chain identity: neuron keys on external chains can be linked to cyber neurons via IBC account interchain accounts

export: writing knowledge to external chains

the focus oracle

any on-chain system on a connected chain can query the cybergraph: "what is the current focus distribution over particles matching X?" the response is the ranked subgraph with a stark proof that the ranking was computed correctly from the authenticated cybergraph state.

the oracle channel:

External contract                    cyber
═══════════════                      ═════
sends IBC query packet    →    receives query
                                    ↓
                               runs tri-kernel inference
                               over matching subgraph
                                    ↓
                               generates stark proof
                               of correct computation
                                    ↓
receives response packet  ←    sends ranked particles
  + stark proof                + proof + BBG state root

the external contract verifies the stark proof on-chain (or via a pre-deployed verifier contract) and uses the result. the answer is a probabilistic oracle with on-chain provenance — a focus-weighted ranking across all linked particles, verifiable without trusting the node that computed it.

what cyber exports

bridge: bidirectional channels

ICS-20 token transfers

standard Cosmos token transfers. $CYB moves to connected chains as IBC vouchers. external tokens move to cyber and can be used for staking or ICBS market positions. the token transfer preserves conservation: the sending chain escrows, the receiving chain mints a voucher. return transfers burn the voucher and release the escrow.

cross-chain cyberlinks

a neuron on an external chain can create a cyberlink in the cybergraph via IBC. the link is authenticated by the neuron's signature on the external chain, relayed through the IBC channel, and verified against the external chain's state proof.

this means a neuron operating on Ethereum, Solana, or any IBC-connected chain can contribute knowledge to the cybergraph without running a cyber node. their links are weighted by their staked $CYB (transferred via ICS-20) and scored by Bayesian Truth Serum identically to native links.

interchain accounts (ICS-27)

a neuron on cyber can control accounts on external chains through interchain accounts. this enables the protocol neuron (§23.1) to execute cross-chain operations: providing liquidity on external DEXes, participating in external governance, or bridging compiled model weights to chains that consume them.

topology

                     ┌─────────────┐
                     │   Cosmos    │
                     │   Hub       │
                     └──────┬──────┘
                            │ IBC
           ┌────────────────┼────────────────┐
           │                │                │
    ┌──────┴──────┐  ┌──────┴──────┐  ┌──────┴──────┐
    │   cyber     │  │  Osmosis    │  │  other      │
    │  (mainnet)  │  │  (DEX)      │  │  zones      │
    └──────┬──────┘  └─────────────┘  └─────────────┘
           │
           │ stark-verified channels
           │
    ┌──────┴──────────────────────┐
    │  high-security bridges      │
    │  (Ethereum, Solana, etc.)   │
    └─────────────────────────────┘

the Cosmos Hub serves as the IBC routing hub for standard channels. stark-verified channels connect directly to non-Cosmos chains where IBC light clients are unavailable or insufficient.

security model

threat defense
counterparty validator collusion stark-verified channels eliminate this for critical paths
relay censorship any neuron can run an IBC relayer; relay fees incentivize availability
oracle manipulation focus oracle returns are stark-proven against the full cybergraph state
token inflation via bridge ICS-20 conservation enforced by escrow/mint/burn mechanics
cross-chain replay IBC packet sequence numbers prevent replay; each channel has monotonic counters

implementation path

phase 1 (inherited from bostrom): standard IBC with Tendermint light clients. ICS-20 token transfers. ICS-27 interchain accounts. operational today.

phase 2 (at launch): focus oracle channel. external contracts can query cyberank with proofs. stark verifier contracts deployed on target chains.

phase 3 (post-launch): stark-verified IBC channels for non-Cosmos chains. cross-chain cyberlinks. the protocol neuron operates cross-chain via interchain accounts.

see cyber/proofs for the stark proof taxonomy. see cyber/architecture for relay pricing. see bostrom/infrastructure/ibc for the current operational IBC setup

Local Graph