Core Concepts¶
Digital Physics is not a metaphor—it's an engineering discipline. This page explains the fundamental concepts that make KTP work.
Digital Physics¶
- Human-speed enforcement
- Depends on interpretation
- Easily circumvented
- Says "you shouldn't"
- Machine-speed enforcement
- Mathematically consistent
- Cannot be circumvented
- Says "you can't"
The Physics Principle
In physical reality, you don't need a policy against exceeding the speed of light. Physics makes it impossible. Digital Physics creates analogous constraints for autonomous agents.(1)
- The distinction between policy-based and physics-based security is foundational to KTP. See KTP-CORE Section 1.2, "The Physics-Based Solution."
The Zeroth Law¶
Action risk must never exceed environmental capacity
Supremacy
The Zeroth Law cannot be suspended, overridden, or circumvented by any mechanism, credential, or authority. It applies equally to all agents regardless of lineage, generation, or purpose.(1)
- The Zeroth Law's supremacy is established in Constitution Article I, Section 2, and specified in KTP-CORE Section 4.
What It Means¶
- A (Autonomy): The intrinsic risk of the action an agent wants to take
- E (Environment): The current Trust Score—the environment's capacity to absorb risk
The Silent Veto¶
The Silent Veto
When A > E
The Silent Veto is not a punishment or denial message—it's physics. The agent doesn't receive an "access denied" error—the action simply becomes impossible, like trying to walk through a wall.(1)
- The Silent Veto mechanism is defined in KTP-CORE Section 8, covering action risk classification and veto triggers.
Digital Gravity¶
If the Zeroth Law is the constraint, Digital Gravity is the enforcement mechanism. When autonomy approaches environmental limits, agents experience increasing resistance.(1)
- Digital Gravity mechanics are fully specified in KTP-GRAVITY, covering gravity wells, constraint types, and response curves.
The Gravity Metaphor
In physical space, gravity curves spacetime. Objects don't decide to fall—they follow the curvature. In digital space, risk curves the operational environment. Agents don't decide to slow down—latency increases, compute becomes scarce, network paths narrow.
Gravity Mechanisms¶
Experience Score (E)¶
Trust in KTP is not granted by authority—it's earned through demonstrated behavior over time. The primary output of the KTP model is the Experience Score (E_trust), a live 0–100 meter of how much autonomy an agent has actually earned.
The Trust Equation¶
Risk Deflation
E_trust = E_base × (1 - R)
What drives Risk Deflation up:
- Open vulnerabilities or failed controls (patch gaps, weak TLS, bad secrets)
- Adversarial signals (DDoS indicators, anomaly spikes, tampering)
- Contextual pressure (regulated data, high-stakes phase, critical audience)
Risk Deflation in Action
Clean environment: An agent scores 90 on base performance. With no risk factors (R = 0), its effective trust stays at 90.
Vulnerability detected: A security issue appears, pushing R to 0.5. The agent's effective trust instantly drops to 45—half its original score. The Zeroth Law now blocks any action requiring trust above 45.
Trust Velocity¶
KTP also tracks how trust is changing:(1)
- Trust Velocity (dE/dt) and its role in anti-gaming measures is covered in KTP-CORE Section 5.4 and Section 5.5 on Trust Score Integrity.
Rapid trust changes—either building or eroding—are themselves signals. Trust that rises too fast may indicate gaming. Trust that falls suddenly may indicate compromise.
Vector Identity¶
Traditional identity asks "Who are you?" and expects a static answer (credential, certificate, token).
KTP asks "What have you been doing?" and expects a trajectory.(1)
- Vector Identity replaces static credentials with trajectory-based authentication. See KTP-IDENTITY Section 3, "Vector Identity Model."
- Static credentials
- Point-in-time verification
- "I am X"
- Possession of secrets
- Continuous behavior
- Trajectory analysis
- "I have been doing Y"
- Demonstration of patterns
The Passport Fallacy¶
A passport proves you were verified at some point. It says nothing about what you've done since. Vector Identity treats identity as a verb—something you continuously demonstrate through behavior, not a noun you possess.
Lineage Evolution¶
Each phase requires demonstrated survival under real conditions—trust cannot be shortcut.(1)
- Lineage Evolution phases (Tethered, Divergent, Persistent) are specified in KTP-IDENTITY Section 8.
Context Tensors¶
To enforce the Zeroth Law, KTP must measure both A (action risk) and E (environmental capacity). Context Tensors provide the measurement framework.(1)
- The complete Context Tensor specification spans 1,707 dimensions. See KTP-TENSORS for measurement definitions, aggregation rules, and instrumentation requirements.
The Seven Dimensions¶
| Dimension | What It Measures | Explore |
|---|---|---|
| Mass | Telemetry density and volume | Deep dive → |
| Momentum | Direction and velocity of change | Deep dive → |
| Inertia | Resistance to rapid shifts | Deep dive → |
| Heat | Environmental stress and anomaly load | Deep dive → |
| Time | Temporal context and decay | Deep dive → |
| Observer | Attestation coverage and visibility | Deep dive → |
| Soul | Constitutional constraints (vetoes) | Deep dive → |
Dimension Interaction
These dimensions don't operate in isolation. For example, high Heat combined with low Inertia creates rapid trust collapse, while high Mass with stable Momentum indicates a healthy, predictable system.
Measurement Principles¶
Where to Go Next¶
-
The Constitution
See how these concepts become law in the foundational governance document.
-
Context Tensor
Explore the 7-dimensional trust geometry with interactive visualization.
-
Use Cases
See how Digital Physics applies to real-world scenarios.