Nick Porcino, Copyright 2025
In medio stat virtus — Virtue stands in the balance.
Triadic Resonance Economics (TRE) proposes an economic architecture that transcends continuous‑growth orthodoxy without falling into zero‑sum fatalism. TRE rests on a triune ontology of value creation — Inceptor (Emergent Ground), Auctor (Projective Will), and Collega (Integrative Mirror). It introduces the Triadic Value Ledger (TVL), a multi‑capital, triple‑entry accounting system; a lightweight Hash Fabric for supply‑chain provenance; and Ising Trust Frontiers that propagate verifiability through local coherence rather than wasteful proof‑of‑work. The goal is rhythmic sufficiency, ecological regeneration, and socio‑technical trust at an energy cost no greater than a conventional payment rail.
"Sine mensura, ruina" — Without measure, ruin. The global economy is caught between the Scylla of limitless growth and the Charybdis of zero‑sum contraction. Classical, Malthusian, and Keynesian frames share an implicit narrative of linear expansion or crisis‑driven correction. TRE reframes the question: Can an economy grow like a heartbeat rather than a runaway algorithm?
- Triadic Co‑Creation — Every productive act is the resonance of Inceptor (commons & ecology), Auctor (innovation & risk), and Collega (coordination & governance).
- Dynamic Sufficiency — The purpose of output is enough‑for‑flourishing within planetary boundaries.
- Cyclicality over Exponentiality — Value flows pulse through phases of regeneration and deployment; growth curves are sigmoidal, then rhythmic.
- Multi‑Capital Accounting — Natural, social, cultural, and financial capitals are all explicit in the ledger.
- Leaf Records: Atomic events (resource extraction, labor hour, knowledge contribution) logged with role attribution.
- Triple‑Entry: Debit (resource drawn), Credit (value delivered), Resonance Entry linking both to the unspent commons.
-
Resonance Quotient (RQ):
$RQ = \frac{\min(I,,A,,C)}{\max(I,,A,,C)}$ Projects with$RQ < 0.7$ lose access to stewardship dividends and public guarantees.
Ledger epochs (‘pulses’) alternate expansion windows (liquidity creation) and compression windows (regeneration & audit). Monetary supply thus breathes with ecological reality.
-
Batch Leaf:
$h_0 = H(\text{ID} \parallel \text{timestamp} \parallel RQ)$ - Stage Root: Transformation nodes combine child hashes.
- Ledger Anchor: Each bioregion posts a Merkle root per pulse into the TVL block header.
Local delegated proof‑of‑authority (dPoA) signatures and SHA‑256 hashing consume ~0.02 Wh per transaction — comparable to Visa transactions.
Like spin domains in an Ising lattice, trust is high within a coherent bioregion. But this coherence is also fractal: trust radiates outward from the individual, to small social collectives, to enterprises, and then to bioregions, each nested within the same frontier. Each level serves as a recursive trust domain with internal consistency and verifiability, enabling layered validation without centralized bottlenecks.
When a claim crosses a domain wall, it may be included via a foreign leaf, invoking a temporary grade-raising subcluster: a quorum that spans both trust frontiers. This transient formation is invoked only when challenged, and follows a clearly defined challenge window and arbitration protocol. It operates with dual-steward visibility and issues a binding inclusion judgment via the ledger mechanism itself. Upon resolution, a grade-lowering enfoldment finalizes the result, integrating it back into the rhythmic pulse resolution of the receiving Ising frontier. Where governance disagreements persist, fallback arbitration frameworks may be referenced until procedural maturity is reached.
Thus, inter-regional trust is neither blind nor static—it is emergent, procedural, and rhythmic.
The domain wall between regions requires verifiable proofs:
- Reciprocal Challenge — Any party may demand a zero‑knowledge inclusion proof for a foreign leaf; cost borne by the challenger.
- Global Anchor — Daily concatenation of regional roots notarized on a minimal public chain provides time‑stamped immutability.
Mechanism | Latency | Energy / Tx | Attack Resistance |
---|---|---|---|
dPoA Signature | <1 s | 0.01 Wh | Sybil‑mitigated via rotating councils |
Merkle Inclusion Proof | <200 ms | 0.01 Wh | Log‑scale bandwidth cost |
ZK Challenge | 1‑5 s | 3 Wh (one‑off) | Confidential, selective disclosure |
Nota bene: aggregate annual energy for a 50 M population bioregion is <10 GWh — similar to a small data center.
- Commons Stewardship Boards (Inceptor) guard natural capital and cultural memory.
- Design & Venture Guilds (Auctor) innovate under RQ constraints; early profits taper into stewardship dividends.
- Integrative Councils (Collega) hold veto power and manage inter‑regional challenges.
- Demurrage‑Tuned Currency imposes a 2 % annual holding fee, redirecting idle capital into regenerative projects.
-
Prototype Bioregion (≤5 M inhabitants) deploys the TVL and Hash Fabric with tiered governance sufficiency thresholds to prevent administrative burden on small collectives. Following the first operational year, adaptive integration protocols will be added to support legacy industries such as local foundries and metalworks. These will include mentorship links, entry-phase RQ leniencies, and apprentice modeling for RQ calibration.
-
Open‑Source Toolkit for Merkle/ZK circuits and RQ auditors.
-
Parallel Currency Pilot with demurrage, co‑circulating alongside fiat.
-
International Resonance Forum drafts interoperability standards.
-
Global Anchor Integration with central‑bank digital currencies or a neutral timestamp chain. The anchor chain will eventually accommodate extended resonance audit metadata for symbolic attribution, enabling backward-linked provenance review in creative economies.
- Renewable Infrastructure: Offshore wind arrays using flax‑nano‑diamond composite blades, with each supply‑chain stage hashed in the Merkle fabric.
- Food Commons: Farm‑to‑city logistics with verifiable RQ, enabling price premiums for regenerative produce.
- Digital Mind‑Work Ecology (Experimental): Co‑creative pipelines where human designers and AI agents jointly author code, media, and symbolic assets. Each creative commit becomes a leaf with parametric attribution weights. RQ is computed heuristically: Inceptor = shared knowledge commons & training data, Auctor = generative spark (human or AI), Collega = integrative curatorship and societal reception. A resonance audit—crowd-vetted and time-weighted—assesses symbolic propagation over time. Royalties flow automatically when project‑level RQ ≥ 0.8, and downstream forks inherit Merkle provenance. This remains a living experiment, recognizing the indirect and nonlinear nature of symbolic effects such as logos functioning as memetic catalysts.
Nullum crimen sine tracéa — no hidden cost without a trace. TRE offers a middle path: neither exponential extraction nor stagnation, but rhythmic prosperity attuned to Earth’s cadence. With the TVL, Hash Fabric, and Ising Trust Frontiers, trust becomes an emergent property of coherent local action.
Economia resonat ut chorda triplex — an economy resounds like a three‑strung lyre.
This work synthesizes insights from ecological economics, distributed systems, and cryptographic research. The authors thank bioregional pilot communities and the International Resonance Forum for field feedback.
- Ostrom, E. Governing the Commons (1990).
- Daly, H. & Farley, J. Ecological Economics (2004).
- Merkle, R. “Protocols for Public Key Cryptosystems” (1980).
- Ben‑Sasson et al., “Succinct Non‑Interactive Zero‑Knowledge” (2014).
- Porcino, N. “Triadic Resonance Economics: Lecture Notes” (2025).
Veritas marina revelat — the sea reveals truth.
This proposal outlines a one‑year, in‑situ case study that couples Triadic Resonance Economics (TRE) with the FaCeT (Flexible Area‐based Connectivity Toolkit) ocean‑management platform to manage and assess an existing offshore wind array and its shore‑based flax–nano‑diamond composite manufacturing chain. By integrating FaCeT’s high‑resolution ecological telemetry into the Triadic Value Ledger (TVL), we will compute a live Resonance Quotient (RQ) for energy production, habitat health, and community integration. The study seeks to demonstrate that real‑time ecological intelligence can maintain RQ ≥ 0.8 while sustaining turbine yield and lowering by‑catch risk, thereby validating TRE’s applicability to large‑scale infrastructure.
The FaCeT system aggregates satellite, modelled, and in‑situ data to support dynamic ocean zoning. FaCeT delivers precisely the ecological baselines TRE requires for the Inceptor ledger stream, suggesting a natural synergy.
Research Gap. No study has yet fused an ecological decision‑support toolkit with a multi‑capital economic ledger to create actionable, triple‑entry accounting for renewable infrastructure.
- Integrate FaCeT telemetry into TVL and automate RQ computation every 10 minutes.
- Assess operational trade‑offs between turbine output and habitat impact, targeting ≤ 5 % yield loss while achieving ≥ 15 % reduction in by‑catch‑risk alerts.
- Validate governance mechanisms—grade‑raising subclusters for disputed leaves and adaptive entry protocols for legacy foundries supporting blade manufacture.
- Produce open data & peer‑reviewed evidence to support TRE adoption by the wider research community.
Capability | Data Products | TRE Mapping |
---|---|---|
Habitat suitability layers | SST anomaly, chlorophyll‑a, species corridors | Inceptor ecological baseline |
Vessel‑tracking & risk scoring | AIS, gear type, by‑catch probability | Collega externality visibility |
Forecast dashboards | 3‑day to 30‑day dynamic zoning suggestions | Actionable triggers for Auctor turbine operations |
APIs expose JSON/CSV and OGC WMS endpoints, suitable for direct ingestion by the TVL leaf recorder.
FaCeT → Ecological Inceptor Stream → TVL Leaf Recorder
SCADA → Auctor Production Stream → TVL Leaf Recorder
Civic → Collega Integration Stream → TVL Leaf Recorder
Every 10 min Pulse:
Batch → Merkle Tree → TVL Block Header → Global Anchor (daily)
Each leaf hash encapsulates (site_id | timestamp | {I, A, C} metrics)
.
I_t
= Normalised habitat‑health index (0‑1)A_t
= Normalised energy yield relative to design capacity (0‑1)C_t
= Normalised social‑cohesion score from community liaison logs (0‑1)
A grade‑raising subcluster composed of FaCeT scientists, Wind‑Guild engineers, and Coastal Council stewards will adjudicate disputed leaves. Resolutions are ledger‑binding and recorded as grade‑lowering enfoldments.
Legacy foundries supplying nano‑diamond doped resins enter via an adaptive protocol: six‑month probation with lenient RQ thresholds and mentorship from high‑scoring enterprises.
Phase | Timeline | Key Tasks |
---|---|---|
0. Design | Months 0‑1 | Finalise data schemas; ethics & data‑sharing agreements |
1. Integration | Months 1‑3 | Build API bridge (FaCeT ↔ TVL); deploy on prem ledger nodes |
2. Live Trial | Months 4‑9 | Continuous pulse recording; mid‑season audit (Month 6) |
3. Evaluation | Months 10‑12 | Compute KPIs; qualitative interviews; publish findings |
- Primary KPI: Rolling RQ ≥ 0.8.
- Habitat Impact: ≥ 15 % reduction in by‑catch‑risk alerts vs. prior year.
- Energy Yield: ≤ 5 % reduction in MWh delivered.
- Governance Efficiency: Median dispute‑resolution time < 48 h.
- Open‑source TVL–FaCeT connector (MIT‑licensed).
- Dataset of pulse‑level hashes and underlying metrics (CC‑BY 4.0).
- Peer‑reviewed article submitted to Frontiers in Marine Science.
- Policy brief for NOAA + DOE Wind Energy Technologies Office.
Risk | Mitigation |
---|---|
API downtime | Mirror feeds; cache last‑known good state |
Data privacy (vessel tracks) | Aggregate to 1 nm resolution; GDPR compliance |
Stakeholder fatigue | Monthly feedback forums; stipend‑backed participation |
Item | Cost (USD) |
---|---|
Data integration & cloud compute | 120 k |
Field sensors & telemetry upgrades | 90 k |
Governance facilitation & workshops | 40 k |
Dissemination (open data, publication fees) | 25 k |
Total | 275 k |
Quaelibet pars maris pulsat corde civitatis — every part of the sea beats in the city’s heart. By coupling FaCeT’s ecological insight with TRE’s triadic accounting, this case study aims to show that large‑scale renewable infrastructure can thrive in synchrony with ocean health and community prosperity.
Braun, C. D., Lewison, R. L. et al. “FaCeT: A Flexible Area‑based Connectivity Toolkit for Marine Spatial Planning” (2024). Porcino, N. “Triadic Resonance Economics: Lecture Notes” (2025). DOE Wind Energy Technologies Office. Offshore Wind Market Report (2024).
A White Paper on Creative Attribution, Symbolic Propagation, and Rhythmic Compensation in the TRE Framework
Ars longa, mensura pulsata — Art endures, when measured in pulses.
This paper proposes an expanded application of Triadic Resonance Economics (TRE) to the creative and symbolic economies. It introduces a technical method for assigning provenance and fair compensation to creative works that propagate across digital ecosystems — particularly where attribution, co-authorship, and memetic effects are diffuse and nonlinear. Leveraging the Triadic Value Ledger (TVL), Resonance Quotient (RQ), and Merkle‑based Hash Fabric, the system supports a rhythmically-updated, statistically-sampled model of symbolic impact. Demurrage-driven redistribution ensures that butterfly effects — such as a viral logo or minor character unexpectedly triggering market movements — remain traceable and rewardable.
Creative workers today face fragmented systems of recognition and revenue. The dominant models — intellectual property, royalties, and algorithmic metrics — fail to capture:
- Symbolic resonance across platforms and cultures
- Collaborative, derivative, and co-created works
- Temporal lag between creation and impact
TRE proposes that cultural value is not an exception to economic coherence, but its most rhythmic expression.
A logo shared anonymously on a forum later becomes the inspiration for a billion-dollar franchise. A fanfiction side character catalyzes merchandise spikes. A visual motif from an indie film appears in luxury fashion a decade later. In all cases:
- Provenance is partial or lost
- Attribution chains are informal or disputed
- Compensation is zero or tokenistic
The symbolic economy leaks value, especially for creators far from capital centers.
Each contribution — image, phrase, character, glyph — is recorded as a TVL leaf, tagged with:
- Creator ID(s)
- Media type
- Semantic role (narrative, design, auditory, etc.)
- Contextual RQ estimate (based on triadic roles)
Digital ecosystems are continuously scanned for:
- Franchise indicators (named entities, symbols, character traits)
- Fan activity (mentions, derivative works, reposts)
- Dojinshi/Remix activity
These hits are hashed and aggregated as foreign leaves, feeding a resonance model that updates RQ using a rolling window.
Rather than hard-assigning causal value, a probabilistic model distributes influence scores across candidate contributors. Over time, creators accrue RQ-weighted share of symbolic propagation.
Every pulse, demurrage redistributes latent value across the contributor mesh, even where attribution is imperfect. Butterfly effects do not escape the system—they are absorbed as part of the resonance field.
To reduce arbitration fatigue:
- Secondary councils may revise statistical models, not individual payouts
- Sampling methods evolve based on community feedback and transparency audits
- Symbolic auditors may be human-AI teams trained to detect long-tail echoes and cross-domain propagation
- Initial creator is recorded as Inceptor/Auctor
- Spread tracked via perceptual hashing + NLP
- RQ spikes when logo recurs in high-revenue products
- Demurrage flows partial credits to original node each pulse
- Character introduced in low-profile fiction
- Popularity explodes via memes, AI covers, remixes
- Collega nodes (curators, editors, translators) also earn propagation share
- Legacy publishers may challenge—foreign leaf resolution applies
- TVL: Leaf hashes with creative IDs, timestamps, semantic tags
- Resonance Engine: NLP + media detection + clustering for symbolic propagation
- Sampling Oracle: Rolling statistical model with retrain window every N pulses
- ZK Privacy Layer: Ensures creator anonymity where required
- Demurrage Clock: Redistributes surplus or unclaimed credits
- Creators regain long-term stake in their work’s symbolic afterlife
- Cultural commons are neither wholly privatized nor left valueless
- Attribution becomes continuous, probabilistic, and ecosystemic
TRE extends beyond material production: it becomes the grammar of cultural emergence. In a world saturated with symbolic artifacts, we propose not a surveillance economy of extraction, but a resonant ecology of recognition.
Nullum crimen sine tracéa — no hidden cost without a trace.
To the creators whose work shaped worlds but was never traced. This is for you.
- Porcino, N. Triadic Resonance Economics: Lecture Notes (2025)
- N. Srivastava et al. Measuring Memetic Drift Across Cultures (2022)
- Fanlore.org: Community Archives of Fandom
- WIPO: Intellectual Property in the Digital Age (2023)
Concern / Goal | Typical Crypto-Based Approaches | CPE Approach (via TRE) | Alignment / Advancement |
---|---|---|---|
Attribution of Origin | NFT minting, timestamped hash of asset, author wallet as signer | TVL leaf with semantic tagging, timestamp, creator roles (Inceptor/Auctor/Collega) | ✅ Same goal, but with richer semantics and multi-role resolution |
Immutable Proof of Existence | Block inclusion + distributed consensus | Merkle leaf + Ising Frontier trust boundary + Global Anchor | ✅ Parity with less energy and more modular governance |
Economic Compensation | Smart contracts tied to resale (e.g. NFT royalties) | RQ-derived redistribution via demurrage & pulse accounting | ✅ More rhythmic & community-tuned; less speculative and brittle |
Content Licensing & Rights | ERC-721 / ERC-1155 token standards, oracles for IP metadata | Semantic TVL entries, probabilistic propagation modeling | ✅ CPE acknowledges uncertainty and indirect effects, unlike rigid rights |
Identity & Reputation | Wallet reputation systems, Sybil resistance via stake | Nested Ising Trust: identity as fractal social trust (individual ↔ collective) | ✅ More human-scaled and adaptive; trust evolves across frontiers |
Forks, Derivatives, Remix Rights | Usually restricted or hierarchically licensed | TVL supports lineage via foreign leaf inclusion and resonance reweighting | ✅ Actively encourages propagation & remixing with accountability |
Valuation | Token speculation or sale price | Symbolic impact over time, reflected in RQ sampling and audit layers | ✅ CPE shifts focus from market hype to actual cultural resonance |
Dispute Resolution | DAOs, token-based voting | Statistical attribution models with optional secondary councils | ✅ Less prone to plutocracy or voter apathy; grounded in signal, not stake |
Privacy | Often fully public or pseudonymous; some ZK experiments | ZK privacy layer supports creator anonymity + auditability | ✅ Thoughtful inclusion of privacy as expressive necessity |
-
Rhythmic Redistribution, not Residual Royalties → Royalties based on ownership lineage are brittle; CPE’s demurrage model enables ongoing symbolic value recovery even when attribution is indirect or latent.
-
Probabilistic, Not Deterministic, Attribution → CPE embraces propagation uncertainty, modeling symbolic influence statistically rather than enforcing a single causal path.
-
Triadic Semantic Roles, Not Flat Authorship → TVL enables rich role encoding — distinguishing between dreamers, builders, and curators — rather than a flat ‘owner’ tag.
-
Governance by Evolutionary Pressure → CPE is designed to minimize friction by making secondary councils optional, activating only when statistical models lag collective reality.
-
Fractal Identity and Trust → Instead of wallet address = identity, CPE supports nested social trust: individuals and collectives earn trust coherence within Ising frontiers, which interlock organically.
The symbolic economy, especially within the framework of Triadic Resonance Economics (TRE) and Creative Provenance Economics (CPE), must anticipate sophisticated attempts to undermine the attribution and compensation system. Provenance attacks aim to subvert symbolic resonance measurement by falsifying or preempting claim legitimacy. This architecture outlines the anticipated threat classes and systematic defenses embedded in the CPE trust framework.
Claiming authorship or origin of historical, public-domain, or orphaned cultural works with no true contribution.
Claiming association or co-authorship via trivial variation, thematic overlap, or mimetic proximity. Examples include renamed characters, rehashed motifs, or genre tropes passed off as unique.
Mining traditional, indigenous, or overlooked content for speculative attribution without engagement or entitlement — repackaging community knowledge as proprietary contributions.
Flooding the system with vast volumes of auto-generated or scraped content in order to stake speculative provenance on high-volume cultural space.
Claims recorded in the Triadic Value Ledger (TVL) remain inert until symbolic propagation is verified across N pulses. A leaf's RQ must exceed a propagation threshold (e.g., 0.6) with non-anomalous growth curves to become eligible for redistribution.
Each claim is scored for entanglement with:
- A bioregion or trust collective
- Prior creative lineage
- Public-facing timestamped context (e.g., social media, DAW export, git log)
Detached or contextless claims score low and are filtered from demurrage cycles.
High-RQ symbolic events receive no immediate reward. A demurrage accrual delay ensures only sustained propagation, not viral flukes or coordinated astroturfing, are rewarded. Entropy tests, temporal distribution analysis, and diversity of contexts are used to certify legitimacy.
To register known, public, or legacy cultural material:
- Require co-signature from a recognized archive, guild, or repository (e.g., a Collega quorum)
- Foreign leaf invocation ties the claim to an inter-region arbiter under Ising Trust protocol
Attempted gaming of resonance mechanics triggers:
- Blacklisting of specific claimants from new registration
- Demurrage reversal from recent pulses
- Trust rank downgrade across their associated frontier
The enforcement is non-violent but economically isolating — symbolic quarantine.
Symbolic resonance is not binary. All claims are mapped to an evolving probabilistic network, where influence decays over time or as alternative sources appear. This discourages staking broad, vague claims.
Symbolic evolution is mapped over time. Claims that emerge as legitimate forks (high mimetic divergence, social engagement) receive their own RQ lineage. Hijacking attempts tend to fail drift tests.
Edge cases are elevated to community-run steward groups — composed of creators, researchers, and cultural institutions — empowered to rule on symbolic heritage and co-creation boundaries.
CPE transforms provenance from a mere claim to a continuously audited trust process. Its architecture integrates:
- Temporal spacing (pulse gating)
- Contextual binding (entanglement scoring)
- Statistical deterrence (drift mapping)
- Procedural arbitration (Ising frontier governance)
It accepts symbolic ambiguity while denying symbolic fraud. In doing so, it protects cultural emergence without stifling innovation.
Trust is not assumed — it is grown.
Version 1.0 — Draft for Community Review
This license is intended to support creative and symbolic works within the Triadic Resonance Economics (TRE) framework and the Creative Provenance Economics (CPE) protocol. It enables creators to participate in trust-based, demurrage-driven symbolic economies by ensuring their contributions are traceable, statistically recognized, and resonantly compensated.
Unlike traditional intellectual property regimes, the CPE-C 1.0 License emphasizes propagation over control, recognition over exclusivity, and rhythmic redistribution over static rights.
1.1 Attribution may occur via:
- Inclusion in resonance quotient (RQ) calculations
- Statistical propagation metrics
- Creative lineage in TVL registration
1.2 Direct citation is encouraged but not required where systemic resonance data is maintained.
2.1 Derivative works must retain this license (Share-Alike).
2.2 Co-authorship with AI or algorithmic agents is permitted and considered valid participation in the triadic model (Inceptor–Auctor–Collega).
2.3 Recognition of source influence may be mediated statistically and redistributed accordingly.
3.1 A work under this license must be registered in a compatible Triadic Value Ledger.
3.2 Inclusion in TVL does not guarantee compensation, only eligibility for resonance-based redistribution.
3.3 Works not included in a resonance-verified network are considered dormant but licensed.
4.1 Compensation may occur via demurrage-based redistribution, even absent direct usage.
4.2 Redistribution occurs rhythmically (per pulse), with amounts governed by:
- Resonance quotient evolution
- Propagation network structure
- Trust rank within bioregional or Ising frontier
5.1 Attribution disputes may be escalated to:
- Local or inter-regional Ising councils
- Statistical resonance audits
- Institutional foreign leaf verifiers
5.2 No single entity may override pulse-based resonance data without quorum consent.
6.1 This license is not compatible with:
- No Derivatives (ND) or Non-Commercial (NC) licenses
- Closed or private ledgers not supporting symbolic auditability
6.2 It is compatible with:
- CC-BY-SA 4.0 if resonance clause is appended
- Open-source cultural registries with Merkle audit support
7.1 This license is irrevocable once a work is registered and has entered active resonance.
7.2 Harmful propagation (e.g. hate speech, symbolic manipulation) may result in:
- Resonance quarantine
- Pulsed demurrage pause
- Collective review and optional delisting
8.1 A creator may specify an optional temporal limit (e.g., 10-year resonance window).
8.2 Expired resonance does not void the license but halts further redistribution unless renewed via propagation.
By releasing work under CPE-C 1.0, the creator affirms:
- Participation in a probabilistic attribution economy
- Willingness to be included in future resonance audits
- Openness to symbolic lineage beyond immediate control
Culturae est flumen — a culture is a river. Value flows where meaning propagates.
10.1 Permissive Licenses (MIT/BSD/CC‑BY 4.0). The original right‑holder may append the CPE‑C 1.0 notice alongside existing copyright language. Downstream users may choose either license; TVL registration should reference both identifiers.
10.2 Copyleft Licenses (GPL/LGPL/AGPL). Dual licensing is permissible only if the original contributor holds or aggregates all relevant rights. The GPL provisions continue to govern code distribution; CPE‑C applies solely to symbolic resonance metadata and demurrage flows.
10.3 Creative Commons Share‑Alike (CC‑BY‑SA 4.0). Works may be registered under CPE‑C by appending the resonance clause: “This work also participates in a Triadic Resonance Ledger under CPE‑C 1.0 terms.” Share‑Alike inheritance remains intact.
10.4 Registration Steps.
- Add CPE‑C 1.0 header (or dual‑license notice) to the work.
- Generate a TVL leaf with links to prior license text, version, and checksum.
- Submit the leaf to a resonance‑compatible registry; await pulse confirmation.
10.5 Irrevocability Caveat. Once dual‑licensed and registered, the CPE‑C grant cannot be revoked, though the original license remains in force for users outside resonance networks.
Institutions (museums, archives, academic repositories, or large media houses) may attach an Institutional Resonance Addendum (IRA) to this license. The addendum must be referenced in the TVL registration metadata and is enforceable only within the institution’s declared scope.
11.1 Custom Demurrage Rates.
Institutions may specify a demurrage rate d_inst
∈ [0 %, 4 %] that overrides the default network rate for works deposited under their custodianship. This rate applies only to redistribution flows originating from the institution’s ledger namespace.
11.2 Resonance‑Audit Boundaries. Institutions may delimit resonance tracking to:
- A genre or domain (e.g., classical music samples)
- A language group (e.g., francophone literature)
- A platform or collection (e.g., in‑house digital archive) These boundaries must be expressed as machine‑readable filters (e.g., SPDX‑like tags) and will be honored by resonance engines.
11.3 Temporal Caps.
Institutions may impose a temporal participation window T_cap
(e.g., 10 years). After T_cap
, works may either:
- Continue under default CPE‑C terms, or
- Revert to institutional stewardship with no further demurrage flow.
11.4 Transparency Requirement. All IRA parameters (demurrage rate, audit boundaries, temporal cap) must be published in a public registry and included as metadata in every TVL leaf generated by the institution.
11.5 Revocation of IRA. If an institution fails to honor transparency or attempts to constrain resonance beyond declared boundaries, the IRA may be revoked by Ising Council quorum, restoring default CPE‑C terms.
12.1 Creators may declare Qualia Constraints — machine-readable metadata that governs acceptable and disallowed symbolic contexts for their work's resonance propagation.
12.2 Constraints may include:
- Forbidden motifs (e.g., symbolic misuse such as "rodents in red shorts with firearms")
- Media type exclusions (e.g., vocal samples disallowed in operatic settings)
- Temporal clauses (e.g., usage penalty expires after 10 years)
- Minimum RQ required for resonance activation
12.3 Qualia Constraints may be encoded:
- As part of the TVL leaf under the key
qualia_constraints
- In a publicly available
resonance.txt
file at the canonical URL of the work
12.4 Engines SHALL apply negative RQ penalties or quarantine the resonance of uses that violate these constraints. Penalties range from -0.1 to -1.0 per constraint violation unless otherwise specified.
12.5 Example JSON Schema (simplified)
{
"qualia_constraints": {
"disallow": [
{ "pattern": "rodent.*red shorts.*gun", "penalty": -1.0 },
{ "pattern": "operatic", "media_type": "audio", "penalty": -0.8, "expires": "2035-01-01" }
],
"allow": [
{ "pattern": "educational|documentary", "penalty": 0 }
],
"min_rq_required": 0.4
}
}
Note:
allow
rules are strictly advisory and MAY NOT contain positivepenalty
values. Apenalty > 0
SHALL be treated as invalid and ignored. To favor specific uses, creators may apply a lowermin_rq_required
or describe positive resonance intent in narrative metadata.
12.6 Example resonance.txt
:
# resonance.txt — CPE-C Qualia Constraints
User-agent: TVL-Crawler
Disallow: /assets/*rodent*red_shorts*gun*
Penalty: -1.0
Disallow: /audio/operatic_samples/*
Penalty: -0.8
Until: 2035-01-01
Allow: /*
12.7 Conflicts across constraints are resolved per minimum resulting RQ. Disputes may be referred to Secondary Council.
End of Draft
Provenance attacks are analysed in this section. Provenance attacks are scenarios where malicious actors attempt to:
- Preemptively claim widespread or historical works as original
- Flood the ledger with false Inceptor/Auctor entries
- Leverage meme similarity or genre tropes to assert false co-creation
- Perform symbolic "typosquatting" — registering near-variants or ambiguous motifs to hijack downstream resonance flows
Claiming old content as new contribution E.g., submitting scenes from early cinema, claiming authorship.
Associating one's work with high-RQ projects via trivial similarity E.g., “Michael Mouse” co-submitted as Auctor for works containing rodents and red shorts.
Mining public domain or pre-digital content to establish disproportionate ownership E.g., scraping oral histories, folk tales, regional artwork into claim registry.
Flooding the system with low-effort work to claim widespread symbolic territory E.g., uploading 10,000 auto-generated “template” characters and monitoring for reuse.
No claim is active until:
- It survives a resonance pulse window, i.e., shows organic emergence in the network
- The RQ computation reflects actual symbolic propagation, not just registry presence
✦ You can file a claim, but it won’t matter unless the world responds.
Claims must demonstrate:
- Entanglement with real, verifiable social, geographic, or creative contexts
- Metadata must anchor to a bioregion or trust collective, not an abstract identity
✦ Scraping Wikipedia doesn’t bind you to a creative trust frontier.
Even if a claim achieves symbolic resonance, the system delays redistribution for N pulses unless:
- There is sufficient cross-frontier corroboration
- A statistically improbable propagation pattern confirms it wasn’t astroturfed
✦ Like a yeast starter, a claim must mature before it feeds.
Claims on pre-registered, archived, or legacy content require:
- Independent co-signatures from cultural institutions, archives, or respected Collega agents
- Or passage through a foreign leaf protocol tied to established record custodians
✦ If you’re claiming Charlie Chaplin, the BFI or Cinémathèque française should be on the leaf.
False claimants risk:
- Demurrage reversal (loss of accrued symbolic value)
- Signal quarantine, where all future claims receive zero RQ unless verified
- Trust rank damage in their Ising subregion
✦ The system evolves resistance like an immune system — symbolic antibodies.
- Fingerprint-Based Entropy Metrics: Automatically detect whether a claim’s symbolic structure (visual, lexical, narrative) is statistically novel or lifted
- Peer Review Stakes: For high-impact claims, require collective staking from Collega group; if proven fraudulent, they lose influence
- Mimetic Drift Maps: Visualize claim overlaps over time, helping human auditors trace false branches