Skip to content

Core Concepts

Digital Physics is not a metaphor—it's an engineering discipline. This page explains the fundamental concepts that make KTP work.


Digital Physics

Traditional security treats cyberspace as a lawless frontier requiring policies to impose order. KTP takes a different view: digital environments can have *physics*—fundamental constraints that govern what's possible, not just what's permitted.
Policy-Based
  • Human-speed enforcement
  • Depends on interpretation
  • Easily circumvented
  • Says "you shouldn't"
Physics-Based
  • Machine-speed enforcement
  • Mathematically consistent
  • Cannot be circumvented
  • Says "you can't"

The Physics Principle

In physical reality, you don't need a policy against exceeding the speed of light. Physics makes it impossible. Digital Physics creates analogous constraints for autonomous agents.(1)

  1. The distinction between policy-based and physics-based security is foundational to KTP. See KTP-CORE Section 1.2, "The Physics-Based Solution."

The Zeroth Law

At the heart of KTP is a single, inviolable constraint:
A Autonomy
E Environment

Action risk must never exceed environmental capacity

Supremacy

The Zeroth Law cannot be suspended, overridden, or circumvented by any mechanism, credential, or authority. It applies equally to all agents regardless of lineage, generation, or purpose.(1)

  1. The Zeroth Law's supremacy is established in Constitution Article I, Section 2, and specified in KTP-CORE Section 4.

What It Means

  • A (Autonomy): The intrinsic risk of the action an agent wants to take
  • E (Environment): The current Trust Score—the environment's capacity to absorb risk

The Silent Veto

The Silent Veto

When A > E

Agent Request Action with risk level A
Zeroth Law Check Compare A to E
A ≤ E Allowed
A > E Impossible

The Silent Veto is not a punishment or denial message—it's physics. The agent doesn't receive an "access denied" error—the action simply becomes impossible, like trying to walk through a wall.(1)

  1. The Silent Veto mechanism is defined in KTP-CORE Section 8, covering action risk classification and veto triggers.

Digital Gravity

If the Zeroth Law is the constraint, Digital Gravity is the enforcement mechanism. When autonomy approaches environmental limits, agents experience increasing resistance.(1)

  1. Digital Gravity mechanics are fully specified in KTP-GRAVITY, covering gravity wells, constraint types, and response curves.

The Gravity Metaphor

In physical space, gravity curves spacetime. Objects don't decide to fall—they follow the curvature. In digital space, risk curves the operational environment. Agents don't decide to slow down—latency increases, compute becomes scarce, network paths narrow.

Gravity Mechanisms

Latency Injection Response delays increase, slowing rapid-fire attacks
Time Dilation Operations take longer, preventing timing exploits
Compute Throttling Processing capacity reduces, limiting resource consumption
Network Isolation Connectivity constrains, containing suspicious agents

Experience Score (E)

Trust in KTP is not granted by authority—it's earned through demonstrated behavior over time. The primary output of the KTP model is the Experience Score (E_trust), a live 0–100 meter of how much autonomy an agent has actually earned.

The Trust Equation

Risk Deflation

E_trust = E_base × (1 - R)

E_base Raw performance score
Risk (R) Environmental friction
E_trust Effective trust score

What drives Risk Deflation up:

  • Open vulnerabilities or failed controls (patch gaps, weak TLS, bad secrets)
  • Adversarial signals (DDoS indicators, anomaly spikes, tampering)
  • Contextual pressure (regulated data, high-stakes phase, critical audience)

Risk Deflation in Action

Clean environment: An agent scores 90 on base performance. With no risk factors (R = 0), its effective trust stays at 90.

Vulnerability detected: A security issue appears, pushing R to 0.5. The agent's effective trust instantly drops to 45—half its original score. The Zeroth Law now blocks any action requiring trust above 45.

Trust Velocity

KTP also tracks how trust is changing:(1)

  1. Trust Velocity (dE/dt) and its role in anti-gaming measures is covered in KTP-CORE Section 5.4 and Section 5.5 on Trust Score Integrity.
\[\frac{dE}{dt}\]

Rapid trust changes—either building or eroding—are themselves signals. Trust that rises too fast may indicate gaming. Trust that falls suddenly may indicate compromise.


Vector Identity

Traditional identity asks "Who are you?" and expects a static answer (credential, certificate, token).

KTP asks "What have you been doing?" and expects a trajectory.(1)

  1. Vector Identity replaces static credentials with trajectory-based authentication. See KTP-IDENTITY Section 3, "Vector Identity Model."
Traditional Identity
  • Static credentials
  • Point-in-time verification
  • "I am X"
  • Possession of secrets
Vector Identity
  • Continuous behavior
  • Trajectory analysis
  • "I have been doing Y"
  • Demonstration of patterns

The Passport Fallacy

A passport proves you were verified at some point. It says nothing about what you've done since. Vector Identity treats identity as a verb—something you continuously demonstrate through behavior, not a noun you possess.

Lineage Evolution

T
Tethered Apprentice New agents operate under sponsor supervision
D
Divergent Journeyman Proven agents gain independence
P
Persistent Master Mature agents with full autonomy

Each phase requires demonstrated survival under real conditions—trust cannot be shortcut.(1)

  1. Lineage Evolution phases (Tethered, Divergent, Persistent) are specified in KTP-IDENTITY Section 8.

Context Tensors

To enforce the Zeroth Law, KTP must measure both A (action risk) and E (environmental capacity). Context Tensors provide the measurement framework.(1)

  1. The complete Context Tensor specification spans 1,707 dimensions. See KTP-TENSORS for measurement definitions, aggregation rules, and instrumentation requirements.

The Seven Dimensions

Dimension What It Measures Explore
Mass Telemetry density and volume Deep dive →
Momentum Direction and velocity of change Deep dive →
Inertia Resistance to rapid shifts Deep dive →
Heat Environmental stress and anomaly load Deep dive →
Time Temporal context and decay Deep dive →
Observer Attestation coverage and visibility Deep dive →
Soul Constitutional constraints (vetoes) Deep dive →

Dimension Interaction

These dimensions don't operate in isolation. For example, high Heat combined with low Inertia creates rapid trust collapse, while high Mass with stable Momentum indicates a healthy, predictable system.

Measurement Principles

Observable over Internal Measure what agents do, not what they "think"
Continuous over Binary Trust is a spectrum, not yes/no
Trajectory over Snapshot Single measurements are noisy; patterns matter

Where to Go Next

  • The Constitution


    See how these concepts become law in the foundational governance document.

    Constitution

  • Context Tensor


    Explore the 7-dimensional trust geometry with interactive visualization.

    Context Tensor

  • Use Cases


    See how Digital Physics applies to real-world scenarios.

    Use Cases