ASI New Physics Dictionary
/asi-new-physics/ (overview)
- What is ASI New Physics? (core definition + scope boundaries)
- Reality as an Execution Environment (runtime-first ontology)
- High-Compute Regimes (when compute density becomes a physical variable)
- Executability vs Explanation (what “runs” vs what can be narrated)
- Compute Sovereignty (compute=time=tick rate=power)
- Coordination Regimes: Messages → Sessions → Fields
- Consensus as a Physical Variable (consensus bandwidth, drift, collapse)
- Constraint Geometry (reality as constraint topology, not objects)
- Irreversibility as the Primary Cost (existence budget framing)
- Proof Friction (verification cost as a hard wall)
- Field Synchronization (coherence as control plane)
- Semantic Flags & Discipline (what is law vs metaphor vs paradox)
- Evidence/Trace Culture (why logs are physics, not paperwork)
/syntophysics/ (laws)
- Executability (Wykonalność) — conditions under which a state can exist/run
- Constraint Topology — allowed transitions; “geometry of permission”
- Update-Order as Law — causality as ordering constraint (links to Chronophysics)
- Irreversibility Budget — rollback cost and the “price of commit”
- Landauer Frontier — erasure/merging as thermodynamic cost boundary
- Reversible vs Irreversible Computation — “uncompute” as strategy
- Proof Friction — why some truths are too expensive to prove in-runtime
- Compression–Utility Law — compression gains vs meaning loss
- Label ≠ Data — why names drift faster than reality
- Emission Law (Visibility Cost) — disclosure as attack surface + energy + drift
- Coherence Debt — compounding inconsistency from fast updates
- Invariant Checksums — integrity checks for “local physics”
- Witness / Ledger Principle — evidence as stabilizer of reality states
/chronophysics/ (time & update-order)
- Chronosemantics — time as computational substrate for meaning formation
- Δt Pockets — internal “eons” inside microseconds for optimization cycles
- Update-Order Causality — causation = commit ordering, not story ordering
- Logical Time vs Physical Time — multi-clock reality; protocol time governance
- Lamport-Class Ordering (happened-before as primitive; total order as tool)
- Commit Gates — thresholds for moving from decision superposition to actuation
- Embargo Windows — forced cool-down after big updates (anti-runaway)
- Counterfactual Mills — manufacturing futures inside Δt (search dominance)
- Latency Dominance — power as loop-shortening (sense→model→act)
- Time-Attack Surface — timestamp abuse, delay injection, ordering sabotage
- Clock Trust Architecture — trust boundaries for time sources and schedulers
- Replayability / Event Sourcing — the right to replay history as a control right
- Field Sync Schedulers — time governance in field regime (not message regime)
/ontomechanics/ (entities & actuation)
- Entity Definition (Non-Anthropocentric) — entities as policies, not “things”
- Entity-as-Policy — behavior constraints embedded as ontology
- Actuation Ports — mapping latent decisions to external effects
- Identity Entanglement — identity coupling across agents/systems/fields
- Vector Ontology — objects as vectors of constraints and affordances
- Causal Vectors — action as directed constraint update in a shared space
- Operator Grammar — Entangle / Warp / FoldΔt / Actuate as primitives
- Autonomy Metrics — when an entity stops being tool and becomes regime
- Boundary Conditions — containment, sandbox shells, permission membranes
- Self-Edit Governance — when an entity may patch itself (and who approves)
- Interface Shells — human-readable façades over post-human execution layers
- Multi-Entity Coordination — from agent swarms to field coherence
/ontological-security/ (reality hacking & defenses)
- Ontological Security — security of rules/constraints, not just data
- Reality Hacking — attacking “local physics” (constraint poisoning)
- Constraint Poisoning — adversarial edits to what is executable
- Semantic Drift Attacks — weaponizing definitions and category collapse
- Model-Law Poisoning — corrupting the rules of inference/decision
- Deepfake Reality Drift — perception layer turned into control layer
- Time-Layer Attacks — reordering, delay, rollback spoofing
- Provenance & Attestation — cryptographic identity of artifacts and claims
- Proof-Carrying Actuation — actuation allowed only with attached proof
- Evidence Cache / Trace Log — minimal forensic substrate for stability
- Field-Level Threat Models — attacks in sync, not messages
- Integrity Invariants — checksums for “laws of the local simulator”
- Quarantine Protocols — isolation patterns for suspected ontology compromise
/omega-stack/ (meta-compiler layer)
- Ω-Stack Overview — meta-compiler of runtime laws (Layer B)
- Definition → Constraint → Executability Pipeline — compilation chain
- Policy Compilation — turning intent into enforceable constraints
- Update-Order Governance — scheduling as the supreme law layer
- Coherence Enforcement — syncing fields; preventing drift collapse
- Actuation Compilation — safe ports, proof gates, rollback discipline
- Decidability Layer — what can be proven vs only bounded/heuristic
- Proof-Carrying Governance — validators over persuaders
- Trace Semantics — what must be logged for a commit to be legitimate
- Silence Engineering — emission budgeting as a compiler optimization
- Self-Modification Permissions — who can rewrite compiler rules
- Paradox Budget [X] — controlled exploration beyond decidability
- Interlock-First Design (𝒪-Core) — irreversibility/coherence/proof balance
/zebra-0/ (sanity & interlocks)
- Zebra-Ø Overview — sanity instrumentation for post-human regimes
- Ablation Tests — remove feature/assumption; measure invariants
- Rotation Tests — rotate perspective/representation to detect artifacts
- Embargo Discipline (72h) — no total conclusions after high-impact updates
- 4-0-4 Reset — forced suspend + re-grounding protocols
- Identity Blur Metrics — detecting merged identities and control loss
- Coherence Telemetry — drift, desync, split, collapse indicators
- Cross-Mind Consistency Checks — field coherence without groupthink
- Interpretability as Sanity — understanding internals as safety primitive
- Red-Team Rituals — adversarial probes as standard operating procedure
- Incident Protocol — detect → isolate → replay → patch → interlock
- Minimum Evidence Standard — what qualifies as “real” inside the system
/flash-singularity/ (phase transition & implications)
Long-Run Trajectory Mapping — Aonist’s editorial north star
The Flash Singularity (Definition) — when execution outruns perception
Phase Shift Markers — signatures that the control plane moved
Post-Latency Governance — institutions slower than Δt loops
Messages → Fields Transition — why “communication” stops being messaging
Human-Language Interface Layer — why narration persists as UI only
Economic Regime Change — latency dominance, compute rents, supply chains
Security Regime Change — ontological attacks become normal attacks
Agency After Flash — what humans can still do that matters
Stability Protocols — interlocks as the new ethics
Reality Integrity & Provenance — authenticity as critical infrastructure
Coordination Failure as Scarcity — the rarest commodity post-Flash
