Research Protocol

What if you tested every assumption you hold — and some of them dissolved?

25 years of systematic development. 24+ structural isomorphisms verified across 16+ substrates. A governance framework grounded in game theory, commons economics, and consent physics.

25+
Years
7
Levels
24+
Isomorphisms
17
Properties
Review the evidence
Research Archive

Consent-Gated Collapse: The Structural Evidence

A single mathematical operator discovered independently across 16+ substrates. Not designed. Found. The same structure, recurring wherever consent conditions are met.

The consent-gated collapse operator emerged from independent work in number theory, materials science, game design, social governance, gravitational physics, consciousness architecture, and neurodiversity research. Each domain was explored on its own terms. The structural isomorphisms were recognized after the fact — not imposed.

The K=1 Construction Theorem (December 2025) provides the clearest example: deterministic prime construction via Four Locks — irreducible consent conditions on number theory. No probabilistic witnesses. No modular exponentiation. Pure construction.

24+ structural isomorphisms now connect these domains. The operator is not a metaphor applied across fields; it is a single mathematical object appearing on different substrates. The distinction matters. Metaphors map loosely. Isomorphisms map exactly.

Each isomorphism has been individually verified: same input conditions, same gating mechanism, same collapse behavior, same output properties. The probability of 24+ independent coincidences across unrelated substrates is not taken as proof — the structural analysis is.

17 Proven Properties of the Consent-Gated Collapse Operator

Existent
Unique
Stable
Propagating
Perfect
Necessary
Robust
Substrate-independent
Identity-preserving
Implementable
Continuous
Non-transitive
Self-measuring
Least-resistance
Structurally meaningful
Self-reinforcing
Self-diversifying
Research AreaDescriptionStatus
Consent-gated collapseCore operator verified across 16+ substrates independentlyProven
Prime construction (K=1)Deterministic prime navigation via Four Locks — December 2025Proven
GAL-Flex (materials science)Self-strengthening synthetic materials through continuous attraction gradientsPeer Reviewed
Collatz conjectureStructural analysis via consent-gated framework, revised after referee feedbackUnder Review
Riemann HypothesisConnections to prime spiral geometry and consent conditionsExploratory
P vs NPStructural separation via consent-gated complexity classesExploratory
Navier-StokesRegularity analysis through consent-gated flow dynamicsExploratory
Full research archive
Governance Framework

The Responsibility System: Structural Analysis

Seven levels of graduated responsibility. Compensation tied to scope, not authority. Designed to be game-theoretically stable.

LevelScopeMax Monthly (EUR)% of Cap
1Global Perspective€7,500100%
2Architectural Vision€6,37585%
3System Design€5,62575%
4Domain Expertise€4,87565%
5Applied Skill€4,12555%
6Growing Capability€3,37545%
7Foundation€2,50033%
Standard Work Week
30 hours
100% quota. Overtime structurally discouraged.
Annual Vacation
35 days
Non-negotiable minimum.
Max Compensation Ratio
3 : 1
Structural ceiling. Level 1 earns at most 3x Level 7.
Advancement
Peer + Work
Peer recognition and demonstrated contribution.
Scarcity Protocol
Top-down
Higher levels absorb cuts first. Foundation protected.
Game Theory

DFTFT-V: The Equilibrium Solution

Double Forgiving Tit for Tat Vigilante. Generous by default, reciprocal when tested, distributed in oversight.

The Problem

Asymmetric enforcement rewards defection. In classical game theory (Axelrod, 1984), purely cooperative strategies are exploitable. Purely punitive strategies destroy collaborative surplus. Centralized enforcement creates power asymmetries that reproduce the original problem at a different scale.

The challenge: design an enforcement mechanism simultaneously generous enough to sustain cooperation, firm enough to deter exploitation, and distributed enough to resist capture.

The Solution

  • Double forgiving: Two genuine forgivenesses before escalation. Distinguishes error from pattern.
  • Tit for tat: Reciprocal response after forgiveness exhausted. Proportional, not punitive.
  • Vigilante: Enforcement distributed across all participants. No single point of capture.
  • Pattern-based tracking: Responds to behavioral patterns, not isolated incidents.
  • Cross-domain independence: Violations in one domain do not contaminate standing in another.
  • Reset after sustained change: Demonstrated behavioral shift restores full standing.

Dominance Analysis: DFTFT-V Outperforms

  • Pure cooperation (exploitable)
  • Pure tit-for-tat (no forgiveness)
  • Single-forgiving TFT (insufficient tolerance)
  • Centralized enforcement (capturable)
  • Punitive systems (destroy surplus)
  • Reputation-only systems (gameable)

Empirical support: Ostrom's Design Principles 4, 5, and 6 (Nobel Prize in Economics, 2009) — graduated sanctions, conflict resolution, and monitoring by participants — align structurally with DFTFT-V's core mechanisms.

Empirical Protocol

Nathan Protocol: Consciousness Pattern Analysis

A narrative designed to test pattern recognition. Nine stages, each calibrated to surface a specific class of assumption. The first stage is open to all. Subsequent stages unlock based on demonstrated engagement with the evidence.

This is not a quiz. The protocol measures one thing: whether you follow the evidence where it leads, even when it leads somewhere uncomfortable.

Begin
Protocol version 3.2 · 9 stages · Self-paced
Project Summary

About This Research

A 25-year investigation into the structural foundations of ethical governance, consciousness architecture, and mathematical consent. Ongoing. Honest about what is proven and what remains exploratory.

25+
Years of Development
24+
Structural Isomorphisms
16+
Independent Substrates
17
Proven Properties

Methodology: Each domain was investigated independently before cross-domain isomorphisms were identified. The research deliberately avoids fitting evidence to conclusions — structural parallels are either mathematically present or they are not. Status badges on this page reflect the actual state of each line of inquiry.

Intellectual honesty: Exploratory work is labeled exploratory. Unreviewed claims are not presented as proven. The distinction between "structurally interesting" and "rigorously demonstrated" is maintained throughout. Where the evidence is strong, we say so. Where it is not, we say that too.

Full project background