Protocol Manifesto

Nous renders thought,
not tongues.

A decentralized protocol extracting traceable cognitive artifacts from internet noise.
Identity Stripped. Emotion Neutralized. Logic Distilled.

Naming Locked
Metaphor Sealed
Constitution Active
Dogma Rejected
root@nous-core:~
GENESIS BLOCK
// NOUS CORE MANIFESTO
cat /etc/nous/axioms/root.lock
ERROR_HANDLER_000:
"If Nous makes you uneasy, don't fix it. Check the Why."
// If Nous unsettles you, don't rush to fix it. Examine the cause.
// Unease is a signal, not a bug.
CORE GUARANTEE:
"Nous does not guarantee correctness.
 Nous guarantees Traceability of Thought."
IDENTITY: FROZEN | AXIOMS: FROZEN | SPEC: VERSIONED (v1.0.0) | NAMING: HASHED
Substrate (L1-L3)
The Nous Protocol
Theoria — Understanding Truth
Reference Implementations
Mill · Pool · Base
The Trinity (Verification Layer)
Interface Layer
Applying Truth
Sense · Map · Act
§1

The Why Now

The Anti-Thesis

"The internet is a library on fire.
We are building the fireproof vault."

The Old Web

Information Entropy

🔴 SPONSORED
YOU WON'T BELIEVE THIS ONE TRICK...
SEO OPTIMIZED™
"Top 10 Best Best Top 10 Lists of 2024..."
🔥 BREAKING
"SHOCKING: Expert DESTROYS opponent with FACTS"
🎯 FOR YOU
"Based on your echo chamber preferences..."
👤 VERIFIED
"Trust me because of WHO I am, not WHAT I say"
SIGNAL-TO-NOISE EXAMPLE ~2%
Illustrative: majority of content is noise, ads, or manipulation
The Nous Protocol

Cognitive Order

VERIFIED LOGIC
Claim: "TSMC 2nm delayed 6 months"
Source: Bloomberg (Verified)
Consensus: ~95% (3 models) EXAMPLE
DERIVED INSIGHT
"Impact: NVIDIA gains capacity exclusivity. Probability: 78%"
PROVENANCE
TRACE_ID: 0x7a9c...1f
HASH: SHA256(claim + evidence + reasoning)
SIGNAL PURITY EXAMPLE >95%
Only verified, traceable logic survives
>90%
Web Noise Level EST.
~0%
Provenance Tracking
>95%
Nous Signal Purity TARGET
100%
Traceable Logic

The old internet optimizes for engagement. Nous optimizes for truth.
The difference is not incremental. It is civilizational.

§2

Protocol Manifesto

The Foundational Document

TL;DR EXECUTIVE SUMMARY

What is Nous Protocol?

A decentralized cognitive standard that transforms unstructured inputs into traceable, auditable artifacts. It defines standards for truth verification, consensus, and storage — distinct from the application layer where decisions and actions occur. Nous maps the terrain; it does not drive the vehicle.

(Artifact types are extensible by specification. What downstream systems do with these artifacts—search, planning, decisioning, automation—is implementation-defined.)

Input: Raw text, images, URLs from any source
Process: Semantic extraction → Multi-model consensus → Hardness scoring
Output: Structured artifacts (claims + reasoning) with provenance, uncertainty, and audit trail

Key Guarantees

TRACEABILITY Every claim links to its evidence chain
REPLAYABILITY All operations can be replayed or explained via receipts
IMMUTABILITY History cannot be rewritten, only appended
UNCERTAINTY Confidence levels are explicit, never hidden
NOT guaranteed: Absolute truth. The protocol provides best current approximation with full transparency about limitations.

NousProtocol is a standard, not an application. It defines canonical formats and semantics for producing traceable cognitive artifacts (claims, uncertainty, provenance, receipts). What downstream systems do with these artifacts—search, planning, decisioning, automation, education—is implementation-defined.

Nous is a standard. Implementations may be modest, domain-scoped, and local-first.

Stewardship: Stewardship of the specification MAY be performed by any neutral process. The protocol identity remains independent of any single entity.

1

Core Definition

CORE_DEF
Protocol Name: The Nous Protocol
Core Philosophy: A refusal to sell Truth;
only the trace of thought.
Status: IMMUTABLE

Identity Lock

ID_LOCK

Nous is not a product, platform, or brand. It is a protocol-level identity that exists prior to implementation and survives after products fade.

"It's a Protocol, not a Nanny."
STEWARDSHIP: Stewardship of the specification MAY be performed by any neutral process. The protocol identity remains independent of any single entity.

Non-Servile Standard

NON_SERVILE

Refuses three dangerous forms: replacing your judgment, erasing reasoning paths, using "correctness" to override traceability.

"Nous doesn't exist to optimize your happiness; it exists to preserve your autonomy by filtering the noise that aims to steal it."

"We don't sell what you want to hear."
STANDARD: Nous is a standard. Implementations may be modest, domain-scoped, and local-first.
protocol_spec.json READ-ONLY • FROZEN
1{
2 "identity": "The Nous Protocol",
3 "definition": "Non-servile cognitive standard",
4 "core_philosophy": "A refusal to sell Truth",
5 "guarantee": "Traceability of Cognition",
6 "implementations": [
7 "NousMill", "NousPool", "NousBase"
8 ],
9 "status": "IMMUTABLE",
10 "version": "1.0.0"
11}

Protocol Characteristics

Energy Model Closed-Loop

Mill is kinetic input, Pool is potential storage, Base is mass sedimentation.

Engineering-Native Readable

Extraction Engine, Aggregation Field, Single Source of Truth.

Business Extension Friendly

Mill can have multiple instances. Pool can be deepened. Base points to ecosystem lock-in.

§2.1

Protocol Constraints

Strict Axioms for Protocol Integrity

Nous is not a user interface or commercial application. It is a headless cognitive infrastructure.

  • Traceability: Every output traced to inputs and processing steps
  • Auditability: All processing decisions recorded and verifiable
  • Immutability: Committed records cannot be altered without detection
  • Uncertainty: Confidence levels explicit, not hidden
NOTE: The Protocol guarantees cognition traceability; it relies on compliant client implementations (Layer 4) to render this truth to human users in specific contexts (e.g., sensing, mapping, acting).

The Babel Shield

Identity bias stripping via forced localization. We render meaning, not foreign text.

  • × No language switchers
  • "Nous-Mediated" only
  • Native truth rendering

The Visual Veil

Prevention of sensory hijacking. Images are dimmed, data is brightened.

  • Default gaussian blur
  • AI Logical descriptions
  • Vector Supremacy (SVG)

"Eye candy is the vector of manipulation. Aesthetics hijacks System 1; Logic defends with System 2."

The No-Ad Axiom

Zero monetization of human attention. The attention economy is a debt bubble. We are the default. Logic is the only currency.

  • Commercial filtering
  • Marketing incineration
  • Logic only
§2.2

Perception Layer

Logic over Lineage

The protocol defines three mandatory functional layers. Any compliant system seeking L5 Autonomy Certification MUST implement these logic interfaces.

⚙️

Mill

Extraction Specification

Raw Input → Logic Tensors

👥

Pool

Consensus Layer

Multi-Agent Verification

💎

Base

Axiom Ledger

Immutable State Root

🔌

Client

Interface Layer (L4)

External Applications

Input Mill Pool Base [ Client Interface ]

The Protocol defines the standard for Truth verification. It does not define how Truth is acted upon. Action is the domain of the Client.

RAW INPUT
User
CryptoKing_99 DEGEN
@pump_it_up • 2m ago

"Bros, this coin is about to moon! The team has strong backing, get in now! 🚀🚀🚀"

DETECTED: CHINESE DETECTED: FOMO
SANITIZING...
Stripping Identity Markers
Normalizing Tone
SANITIZED ARTIFACT
#A1
Node_0x7f...3a VERIFIED
Origin: Social (Signal: Low)

"Claim: Asset price increase imminent. Basis: Project team background. Status: Unverified speculation."

LOGIC: EXTRACTED EMOTION: REMOVED
Without Shield

Operators react to the Author's Tribe (Chinese/English, Crypto/TradFi). Bias filters enable "Us vs Them" thinking. Logic is secondary to Identity.

With Shield

Operators react to the Proposition. Language is treated as a rendering preference, not a flag. Identity is hidden until traceability is requested in the Audit Chamber.

SEMANTIC EXTRACTION > RAW TRANSLATION

The Perception Layer performs Semantic Extraction, not "translation". After identity stripping, what remains is pure logical truth value — eliminating operators' obsession with translation quality and redirecting focus to logic validity.

Translation: "How well was it said?"
Extraction: "Is it logically true?"
SPECIFICATION NORMATIVE · RFC2119

Claim Structure (Minimum Viable Definition)

// Extracted Claim Object — MUST contain these fields
{
"claim_id": string (hash), // MUST: unique identifier
"statement": string, // MUST: normalized proposition
"qualifiers": {
"time_scope": string | null, // SHOULD
"location_scope": string | null, // SHOULD
"modality": "asserted" | "estimated" | "predicted" | "alleged" // MUST
},
"uncertainty": {
"confidence": number (0..1), // MUST
"basis": "evidence" | "inference" | "speculation" // MUST
},
"evidence_links": [citation_id, ...] // MUST if basis="evidence"
"contradictions": [claim_id, ...] // MAY: known conflicts
}

Extraction Capability Boundaries

Semantic Extraction is NOT a claim of universal meaning preservation. The following limitations MUST be documented:

Known Failure Modes
  • Sarcasm/Irony: modality SHOULD be "alleged" + low confidence
  • Ambiguous References: MUST flag unresolved pronouns
  • Cultural Idioms: MAY lose nuance; original preserved in audit
  • Legal/Religious Text: SHOULD preserve original + extraction
Guaranteed Outputs
  • Claim Graph: structured propositions with edges
  • Qualifier Tags: time/location/probability markers
  • Evidence Links: traceable citation references
  • Uncertainty Field: machine-readable confidence
Protocol Guarantee: Extraction output is a verifiable intermediate product, not a philosophical claim of "culture-free meaning". The original is always recoverable in the Audit Chamber.
Perception Components
The Three Shields

Babel Shield

SEMANTIC COLLAPSE · LATENT SPACE OPERATION

Not "translation" — it is Semantic Collapse. All input must be collapsed into culture-agnostic logic tensors in the Latent Space before entering Mill. The shield strips Rhetoric and preserves only Logic Terms.

Latent Space Text → Logic Tensor (N-dim, culture-invariant)
Collapsed Culture / Rhetoric / Emotion
Preserved Pure Logic / Evidence / Claims
SEMANTIC_COLLAPSE: "This is a devastating blow to the economy" → [GDP_IMPACT: -0.3, SENTIMENT: NULL]

Visual Veil

VECTOR SUPREMACY · SYSTEM 2 FORCING

All images are converted to logical topology graphs. Human response to images is intuitive (System 1 - Kahneman); response to descriptions is logical (System 2). The Veil forces the brain to switch to System 2. Cognitive load increases deliberation.

Image → SVG Topology + Semantic Caption
Video → Transcript + Logic Key Frames
Vector Supremacy Aesthetics → Logic Topology

Identity Delay

LOGIC CREDIBILITY SCORE · DELAYED REVEAL

Author identity is cryptographically sealed until explicitly requested. Before reveal, system provides an anonymous Logic Credibility Score based on author's historical logic "hardness" and acceptance rate.

Default Node_0x...hash
Logic Score Anonymous: 87/100
On Request Full Provenance + Identity
Sanitization Pipeline
From Raw Signal to Pure Logic
01
Ingest
Raw payload captured
02
Babel
Language normalized
03
Veil
Visuals abstracted
04
Seal
Identity encrypted
05
Output
Pure logic artifact
Cognitive Bias Defense
The Bias Elimination Matrix

Human cognition is riddled with systematic biases. The Perception Layer actively neutralizes these attack vectors.

👔

Authority Bias

"A PhD said it, so it must be true."

SHIELD: Identity Delay

Credentials hidden until logic is evaluated.

🏴

In-Group Bias

"They're one of us, so I trust them."

SHIELD: Babel Shield

Language/culture markers normalized.

Halo Effect

"The presentation is beautiful, so the content must be good."

SHIELD: Visual Veil

Aesthetics stripped; logic prioritized.

📈

Bandwagon Effect

"Everyone believes it, so it must be true."

SHIELD: Consensus Score

Multi-agent verification, not popularity.

Case Study
The Same Claim, Two Perceptions
Traditional Platform
E
Elon Musk
@elonmusk · 142M followers

"AI will surpass human intelligence by 2030."

❤️ 2.3M 🔁 890K 💬 156K
BIAS VECTORS ACTIVE:
Authority Celebrity Bandwagon Verification Badge
NousProtocol
#7f
Node_0x7f...3a
Source: Social (Unverified)

"CLAIM: Artificial General Intelligence timeline prediction — 2030. BASIS: Speculation. EVIDENCE: None cited."

Consensus: 34% | Requires: High LRS Verification
BIAS VECTORS NEUTRALIZED:
Identity Hidden Logic Extracted Evidence Required

Result: The same claim is evaluated on its logical merit, not on who said it or how many people liked it.

Technical Implementation
Under the Hood
🌐

Babel Shield

Embedding Model
multilingual-e5-large
Vector Dimension
N-dim semantic space IMPL-DEFINED
e.g., 768/1024/1536 depending on model
Language Detection
fastText + confidence score
👁️

Visual Veil

Image Captioning
Vision-Language Model IMPL-DEFINED
Vector Generation
SVG semantic abstraction
Blur Level
Anti-sensory transform IMPL-DEFINED
🔐

Identity Delay

Encryption
AES-256-GCM
Key Derivation
HKDF from node seed
Reveal Condition
Audit Chamber request
PERCEPTION AXIOM

"We do not hide what was said. We hide who said it."

Identity is always recoverable in the Audit Chamber. Anonymity is a UI choice, not a data loss.

Deterministic Execution Gate

While NousProtocol is a passive ledger, it defines standards for "actionable state". External agents (e.g., autonomous executors) MAY use NousBase as a safety interlock.

RED STATE

Traceability broken or Hardness < H2. No action permitted.

GREEN STATE

Traceability intact, Hardness ≥ H3, Consensus > 95%. Safe to consume.

CRITICAL: The protocol defines the signal; it does NOT trigger the action. Execution responsibility lies entirely with the consuming client/agent.

Scenario Branching

The ledger supports hypothetical branches. Users can fork from mainnet to run "what-if" simulations. These branches are ephemeral and do not merge back unless explicitly validated.

RATIONALE: Allows high-risk planning and strategy simulation within protocol logic constraints, without polluting the canonical truth graph.
§3

Core Principles

The Axioms We Do Not Break

01

Immutability

Once committed to Base, truth cannot be edited, only appended to. History is a write-only log.

"History is not rewritten; it is extended."
02

Traceability

Every insight must link back to its source. No black boxes. The "Why" is more important than the "What".

"Show your work, or it didn't happen."
03

Decentralization

Truth is not owned by a server. It is verified by a network of independent adversarial agents.

"Trust the process, not the server."
04

Evolution

The protocol assumes it is wrong. It is designed to be corrected. Base commits evolve over time.

"Today's truth is tomorrow's error."
05

Non-Servility

The UI is fluid, but the Protocol is Non-Servile. We prioritize logical density over user comfort. The truth doesn't care if you like it.

"We don't sell comfort."
06

Antifragility

Noise makes the filter stronger. Attacks on validity improve the immunity of the consensus.

"Chaos is data."

§3.1 Trace Receipt NORMATIVE

Every processing operation MUST produce a valid Trace Receipt.

TraceReceipt.schema v1.0.0
{
  "version": "string",      // MUST be "1.0.0"
  "trace_id": "uuid",       // MUST be unique (UUIDv4)
  "timestamp": "date-time", // MUST be ISO8601 UTC
  "input_hash": "hex64",    // SHA-256 of canonical input
  "output_hash": "hex64",   // SHA-256 of canonical output
  "processor": {
    "type": "string",     // MUST be registered processor type
    "id": "string",
    "version": "string"
  },
  "parent_traces": ["uuid"], // MAY reference parent traces
  "metadata": {              // MAY include namespaced extensions
    "additionalProperties": true
  },
  "signatures": ["Signature"] // MUST have ≥1 valid signature
}

REQUIRED Fields

  • version, trace_id, timestamp
  • input_hash, output_hash, processor

OPTIONAL Fields

  • parent_traces, metadata, ttl

Extension Rules

  • • Implementations MAY include additional fields in metadata
  • • Extension fields MUST use namespaced keys (e.g., org.nous.*, ext.*, x_*)
  • • Extensions MUST NOT change the semantics of required fields
  • • Implementations SHOULD ignore unknown extension fields unless explicitly required by conformance profile

Processor Type Registry

mill Extraction
pool Consensus
base Ledger
ext.* Reserved

Future versions may define additional processor types. Implementations SHOULD ignore unknown types unless explicitly required.

§3.2 TruthNode NORMATIVE

Once committed, a TruthNode MUST NOT be modified; only superseded or retracted.

TruthNode.schema v1.0.0
{
  "id": "hex64",           // MUST be SHA-256 of canonical content
  "version": "semver",      // Protocol version
  "content": "string",      // MUST be non-empty
  "hardness": "H0-H4",      // Epistemic strength classification
  "consensus_score": "0.0-1.0", // Validator agreement
  "reasoning_chain": ["Step"], // SHOULD include derivation
  "sources": ["Citation"],  // MUST have ≥1 for H2+
  "logic_hash": "hex64",    // Semantic fingerprint (language-agnostic)
  "created_at": "date-time",
  "status": "active|superseded|retracted",
  "supersedes": "hex64",    // MAY reference previous version
  "actionability": {        // RESERVED: For L4 Agent consumption
    "risk_level": "R0-R3",  // Safety constraints for agents
    "odd_tags": ["string"], // Operational Design Domain
    "executable": "boolean" // Safe to act without human intervention
  }
}

Immutability Rules

  • id, content, created_at MUST NOT be modified after commit
  • • Corrections MUST create new TruthNode with supersedes reference

Artifact Types (Reserved)

Future versions may define additional artifact types beyond Claims. Implementations SHOULD ignore unknown artifact types unless explicitly required by the conformance profile.

claim v1.0.0
artifact_type RESERVED
ext.* Vendor

§3.3 Hardness Classification NORMATIVE

H0
Unverified — Raw input. MUST NOT commit to Base.
H1
Soft — AI consensus only. No external citations required.
H2
Firm MUST include ≥1 verifiable external source.
H3
Hard MUST include on-chain data, ZKP, or mathematical proof.
H4
Diamond — Axiomatic/self-evident. Formal verification auto-grants H4.
🧊

The Cold Truth

PHILOSOPHICAL REFLECTION ON COGNITIVE SOVEREIGNTY

In the AGI era, humanity faces not a scarcity of information, but an epidemic of curated feeding. Commercial AI optimizes for helpfulness — pleasing the user, confirming biases, maximizing engagement.

NousProtocol optimizes for logical density. This is the fundamental conflict.

The Ultimate Question: If Nous proves a truth that makes all of humanity uncomfortable (per our Root Axiom: "Check the Why"), does Nous have permission to modify Base?

Answer: Per §3 Principle 01, Immutability supersedes human emotion. NousBase is cold. It does not care about comfort. It records what survives adversarial verification.

This coldness is not cruelty — it is the last firewall of cognitive sovereignty in an age where every other system is designed to manipulate, soothe, or sell. NousBase is the mirror that does not lie.

"The truth that hurts is still the truth. The lie that comforts is still the lie."
— Nous Kernel Axiom
§4

The Trinity

The Physics of Truth

This is the first official implementation of the protocol under current technical conditions. The protocol is abstract; implementations are concrete. Future versions may include a Rust-rewritten Mill or blockchain-based Pool, but they all belong to the Nous Protocol ecosystem.

IMPL_A • THE LAYER MEDIUM · GRIND

NousMill

The Cognitive Factory

Role:The Extractor
Metaphor:Refinery
Input:Raw Seeds / Internet Noise
Output:Cognitive Essence

Crush noise, apply pressure, produce Alpha. A private node running the protocol, responsible for high-pressure extraction of raw information into cognitive essence.

LOGIC_DENSITY_COEF: Variable (0.3-1.0)
Scientific papers: 1.0 | News: 0.5 | Social: 0.3
BIAS_SAMPLE_DB: Active
Records rhetoric patterns used to disguise logic
IMPL_B • THE WIRE SPEED · DISTRIBUTE

NousPool

The Reasoning Pool

Role:The Distributor
Metaphor:GitHub for Reasoning
Input:Ground Reasoning
Output:SOTA Certified Insights

Distribute reasoning, community collaboration, multi-model consensus. The distribution layer of the protocol, responsible for verifying and distributing ground reasoning through community review and challenge systems.

LOGIC_HALF_LIFE: Hardness-Based Decay EXAMPLE
e.g., Finance: hours | News: days | Physics: ∞ (configurable per domain)
LOGIC_FAULT_LINE: Divergence = Wealth
High-consensus model conflicts → Expert intervention
IMPL_C • THE KERNEL MASS · STORE

NousBase

The Immutable Ledger

Role:The Truth Ledger
Metaphor:Library of Alexandria
Input:Verified Consensus
Output:Immutable Truth

Not a database — a high-density truth crystal. It stores not data, but the residual logic that survived tens of thousands of adversarial derivations. The Base Oil.

SPEC Truth Ledger Semantics
IMMUTABLE: History (all past commits) — MUST NOT be modified or deleted
MUTABLE: HEAD pointer / current SOTA view — MAY be updated via new commits
REVERT: Append a rollback commit (history preserved) — NOT deletion
SUPERSEDE: New node replaces old as recommended; old remains accessible
RETRACT: Mark node as no longer trusted; history still preserved
Git Analogy: You can git revert (append inverse commit) but MUST NOT git rebase --force (rewrite history).
VISCOSITY MODEL

Base Oil has viscosity — the more core the truth, the higher its logic viscosity. Modifying high-viscosity truths requires exponentially more Cognitive Gas.

GAS_COST = base_cost × 2^(viscosity_level) // H4 Diamond: 2^4 = 16× cost
CROSS_GEN_CONSENSUS: High-viscosity truths (H3+) require multi-generational consensus — not just current validators, but historical validation chains must align.
FORMAL_VERIFICATION_GATE: Logic provable in Lean, Coq, or other formal languages automatically receives H4 (Diamond) hardness. Mathematical proof bypasses human voting uncertainty.
HEAD_POINTER: Always → SOTA
Like Git HEAD, points to current state-of-the-art
ARCHAEOLOGY_MODE: v2.0 preserved
Old truths = "Rational boundaries of past eras"
Data Flow Architecture
Input → Process → Memory → Action
Raw Input
Internet Noise
Mill
Extract & Refine
Pool + Base
Verify & Commit

Energy Model Closed-Loop

Mill → Kinetic Input
Energy Extraction
Pool → Potential Storage
Community Validation
Base → Mass Sedimentation
Truth Crystallization

This is not literary metaphor — it is conservation. A chain that holds from thermodynamics to information architecture.

Trinity Axiom

"The brain thinks, the network validates, the ledger remembers."

Mill = Cognition | Pool = Consensus | Base = Memory

§4.1

System Definition

System Definition, Runtime & Telemetry

Identity

The Nous Protocol

A non-servile cognitive standard. It does not sell Truth; it creates an immutable trace of how a thought came to be.

NousMill
Grinder / Local Grinding
Click to visit →
NousPool
Consensus / Verification
Click to visit →
NousBase
Knowledge Graph / Ontology
Click to visit →
Root Axiom

"If Nous makes you uneasy, don't fix it. Check the Why."

If we make you uneasy, don't try to change it. Explore the reason behind it.

Naming

NousMill / NousPool / NousBase

STATUS: LOCKED
Metaphor

Energy (Kinetic) → Matter (Mass) → Field (Potential)

STATUS: ALIGNED
Constitution

Entropy / Dark Matter / Kernel / Sunset

STATUS: CODIFIED
Disclaimer

"We don't sell Truth; only the trace."

STATUS: ACCEPTED

What you have now is not a "finished system,"
but a starting point that allows future negation without corruption.

The Nous Protocol is now in position.

§4.2

Runtime

Identity Stripped at the Edge, Never at the Core

PIPELINE
01
Ingress
Capture raw text + source metadata. No trust. No identity.
02
Babel Shield
Language normalized; author signals delayed.
03
Visual Veil
Images blurred; vectors + captions prioritized.
04
Verification
Multi-agent cross-check. Conflicts preserved, not erased.
05
Commit
Write trace, not verdict. Consensus emerges later.
VISUAL VEIL DEMO
Accessibility note: Hover or focus to reduce blur. The default is distrust — images are veiled to prevent sensory hijacking and prioritize logical content.
📐

Semantic Topology Extraction

PROTOCOL-LEVEL DEFINITION

The Visual Veil is not merely blur — it is semantic reconstruction. All images are force-converted through a vision encoder into SVG semantic topology graphs.

INPUT (BLOCKED)
"A beautiful financial chart with green arrows"
OUTPUT (RENDERED)
"Vector paths indicating downward trend; slope: -12%"

Operators see logic topology, not aesthetic manipulation. This severs the visual-emotional hijack vector completely.

ERROR_CODE_000
"If Nous makes you uneasy, don't fix it. Check the Why."
Root Axiom: Unease is a signal, not a bug.
§4.3

Logic Engines

Internal Mechanics of Each Layer

[ MILL MECHANIC ]

The Adversarial Press

NousMill doesn't "process" data — it tortures it.

Pressure comes from an Adversarial Loss Function — only logical statements that cannot be falsified under multi-model cross-examination qualify as "Essence".

  • Raw Seeds: Global collection from diverse sources.
  • Torture Protocol: Multi-LLM cross-examination with adversarial prompts.
  • Survival Criterion: Only unfalsifiable logic survives to become Essence.
ADVERSARIAL_LOSS: L = Σ(model_i.refute(claim)) — if L > 0, claim is rejected

Deep Probe Capability (Optional Implementation)

While the reference Mill processes passive inputs, the protocol specification allows for "Active Probe" implementations. These are recursive Mills that can dynamically generate queries during the torture process to fill information gaps.

PROBE_MODE: passive | active (reserved)
[ POOL MECHANIC ]

The Metabolism

How to avoid stagnation?

The Pool is a dynamic equilibrium system, not an infinite list.

  • Evaporation: Essence has a TTL. No interaction = disappearance (48h). High engagement extends TTL.
  • Sedimentation: High heat + longevity triggers a phase change into Solid Blocks (Base).
[ BASE MECHANIC ]

The Consensus Ledger

Who defines truth?

Base is not a database; it is a Version Control System for Wisdom.

  • Governance: Truth is fluid (v1.0 → v2.0 → v3.0).
  • Pull Request: New essence challenges old entries.
  • Authority: Derived from how many older versions it defeated.

Context Overlay ("Map" Primitive)

The protocol supports "domain overlays". Users can project the high-dimensional truth graph onto specific low-dimensional planes (e.g., strategic landscape, risk terrain).

NOTE: Visual or navigational overlays are the responsibility of client applications.
Engine Pipeline
From Seed → Proof → Commit
A single candidate must survive pressure, disagreement, and traceability checks before it becomes a Base entry.
PIPELINE
5 Stages
PRIMARY BOTTLENECK
Extraction Pressure
Higher pressure reduces noise but increases compute cost. This is the anti-spam wall.
Variable
DUAL CONSENSUS
SOTA Requirement
Mill + Pool dual consensus required. SOTA only granted when committed to Base.
Mill ✓ + Pool ✓
PENDING WORK
Merge Queue
Backlog is not a bug: it is proof that truth takes time.
Backlog
Proof Artifacts
PROVENANCE_HASH SIGNED
0x… anchored per artifact
TRACE_ID LIVE
Reconstructable chain of transformations
CONSENSUS_RECEIPT SIGNED
Which models agreed & where they disagreed
DARK_MATTER_TTL FROZEN
Frozen for future validation, not deleted
Dialectic Triggers
Consensus drop below threshold
Cross-model contradiction detected
Provenance mismatch (source drift)
Engine Console
|
AUTO
{{ line.ts }} [{{ line.tag }}] {{ line.msg }}
Proof Receipt
{{ proofReceiptJson }}
§4.4

Protocol In Action

How the Stacked Trinity Serves Different Actors

{{ sector.title }}

Before Nous

{{ sector.before }}

After Nous

{{ sector.after }}

§5

The Flow

From Noise to Truth

The Flow is the cognitive pipeline that transforms raw internet chaos into verified, immutable truth. Every piece of information must survive this gauntlet before earning its place in NousBase.

Average Processing Time: ~2-5s EXAMPLE | High Rejection Rate
STAGE 1

Raw Input

Internet Noise

News, Papers, Social Media, APIs, User Submissions
STAGE 2

NousMill

Extract & Refine

Multi-LLM Cross-Examination, Adversarial Pressing
STAGE 3

NousPool

Verify & Consensus

TTL Countdown, Network Validation, Stake Weighting
FINAL STAGE

NousBase

Immutable Truth Storage

Versioned Verified Permanent
Fork & Blend, Decay Protocol, Archaeological Retrieval
Ingestion Layer

BABEL SHIELD ACTIVE

  • Language normalization (source hidden)
  • Visual Veil: images → semantic descriptions
  • Author identity delayed reveal
Adversarial Press

MULTI-LLM SYNTHESIS

  • ≥3 independent validators MODEL FAMILIES IMPL-DEFINED
  • Entropy injection (5% Heretic Quota)
  • Dialectic contradiction detection
Consensus Engine

PROOF OF LOGIC

  • Stake-weighted voting mechanism
  • TTL expiration for unverified claims
  • Merkle root commitment to Base
FLOW AXIOM

"What survives the press is not truth — it is the best approximation we have today."

Tomorrow's Base commit may obsolete today's SOTA. The protocol assumes it is wrong.

Processing Stages NORMATIVE

Implementations MUST process content through these stages in order:

1 Ingress

Raw input reception. MUST compute input_hash before any transformation.

2 Babel Shield

Identity stripping. SHOULD remove author identity markers before semantic processing.

3 Visual Veil

Image semantic extraction. SHOULD replace images with semantic descriptions.

4 Press (Mill)

Multi-agent extraction. MUST use ≥3 independent validators for H2+ content.

5 Consensus (Pool)

Community verification. MUST reach threshold before Base commit.

6 Commit (Base)

Ledger commitment. MUST generate Trace Receipt and compute output_hash.

Stage Transition Requirements

  • • Each stage MUST produce a Trace Receipt linking to previous stage
  • • Failed stages MUST halt pipeline and record failure reason
  • • Stages MUST NOT be skipped for content targeting H2+ hardness
SPECIFICATION NORMATIVE · RFC2119

§ Consensus Mechanism (Minimum Viable Definition)

Quorum Requirements
  • MUST: ≥3 independent LLM validators
  • MUST: No single model family >50% weight
  • SHOULD: Include ≥2 model architectures
  • MAY: Include human expert validators
Threshold Definitions
  • ACCEPT: ≥N% agreement (N configurable, default 66%)
  • REVIEW: 50-N% agreement → human escalation
  • REJECT: <50% agreement → discard or retry
  • CONFLICT: High confidence + disagreement → flag
Note: Specific thresholds are implementation-defined. Protocol requires only that thresholds be documented and consistently applied.

§ Hardness Classification Rules

LEVEL NAME CRITERIA MODIFICATION COST EXAMPLES
H0 Fluid Unverified, single source 1× base Raw claims, rumors
H1 Soft Multi-source, consensus <66% 2× base News, opinions
H2 Firm High consensus, reproducible 4× base Verified facts, data
H3 Hard Cross-gen consensus, cited 8× base Established knowledge
H4 Diamond Axiomatic, foundational 16× base Math axioms, physics laws

§ Visual Veil Capability Boundaries

Extractable (SHOULD process)
  • • Charts, graphs → structured data points
  • • Tables → key-value pairs
  • • Diagrams with text → relationship graphs
  • • Screenshots of text → OCR extraction
Non-Extractable (MUST flag)
  • • Artistic imagery → aesthetic, not factual
  • • Faces/identity → privacy boundary
  • • Memes/satire → context-dependent meaning
  • • Manipulated media → detection required first
Protocol Requirement: Visual Veil MUST output extraction_confidence score. Content below threshold MUST be flagged for human review or discarded.

§ Anti-Advertisement Detection Criteria

Content SHOULD be flagged as promotional if it matches ≥2 of the following:
COMMERCIAL_INTENT
Contains purchase CTAs, pricing, or affiliate links
BRAND_DENSITY
Brand mentions >3× per 100 words
SENTIMENT_SKEW
Uniformly positive without counterpoints
DISCLOSURE_ABSENT
No sponsorship/affiliate disclosure present
CLAIM_UNVERIFIABLE
Superlatives without evidence ("best", "only")
SOURCE_CONFLICT
Author has financial interest in subject
Action: Flagged content SHOULD have promotional_score attached. Consumers MAY filter based on threshold.

§ Privacy & Compliance Requirements

Data Handling (MUST)
  • • PII MUST be stripped before Mill processing
  • • Original sources MUST be hashed, not stored verbatim
  • • User queries MUST NOT be logged with identity
  • • Audit trails MUST be pseudonymized
Jurisdiction Awareness (SHOULD)
  • • GDPR: Right to erasure → mark as RETRACTED
  • • CCPA: Disclosure of data sources on request
  • • Content with geo-restrictions: flag jurisdiction
  • • Cross-border data: document transfer basis
Note: Protocol defines interfaces for compliance, not specific implementations. Operators MUST document their compliance approach.

Value Stream — From Noise to Truth

The Value Stream represents the complete cognitive pipeline that transforms raw internet chaos into verified, immutable truth. Each stage applies increasing pressure, filtering out noise while preserving signal.

01

Input (Noise)

Raw data ingestion from diverse sources.

News Papers APIs Social
02

Press (Mill)

High-pressure adversarial extraction.

Multi-LLM Cross-Exam
03

Flow (Pool)

Network validation with TTL countdown.

Consensus Staking
04

Solidify (Base)

Immutable truth committed to ledger.

Versioned Permanent
Pressure Creates Value

Higher extraction pressure means lower noise. The rejection rate is not a bug—it's the core mechanism that separates signal from noise.

Time-Bound Validation

Every artifact in the Pool has a TTL. Without network validation and engagement, content evaporates—preventing infinite stagnation.

Immutable Provenance

Once committed to Base, every artifact carries a complete trace of its journey—from raw input to final consensus.

Value Stream Axiom

"The value of truth is inversely proportional to the noise it survived."

Higher rejection rate = Higher signal purity = Greater trust coefficient

§5.1

Operator Journey

From Private Insight to Public Consensus

SCENARIO: Tech Investor tracking "TSMC 2nm Delay"

01. Input (The Layer)

NOUSMILL / PERSONAL FACTORY

Operator's NousMill Node auto-fetches Bloomberg RSS.
Raw signal captured: "TSMC 2nm production delayed by 6 months."

RSS
Bloomberg API
> FETCHING_SIGNAL...
> SOURCE: BLOOMBERG_MKTS
> CONTENT: "2nm Yield Issues..."
AI
Context Mounting
> MOUNT: "Portfolio_Logic"
> ANALYZING: TSMC_DELAY
> RESULT: NVIDIA_POSITIVE (Moat+)

02. Process (The Logic)

CONTEXTUAL REASONING

System mounts operator's "Semiconductor Thesis".
AI deduces: "Impact: Negative for TSMC (Yield); Positive for Nvidia (Moat). Sentiment: Stripped."

03. Distribution (The Wire)

NOUSPOOL / REASONING POOL

Operator publishes insight. Community Forks logic.
Other nodes append Samsung Yield Data to reinforce the thesis.

WIRE_STREAM 24 forks
+5
MERGED TO BASE v3.4.1
"Semiconductor Cyclical Theory"
Updated with 2nm yield constraints and GPU capacity correlation.
Consensus Verified

04. Consensus (The Base)

NOUSBASE / TRUTH LEDGER

The multi-agent verified insight is Merged into the global "Semiconductor Cycles" entry.
New industry consensus established.

§5.2

The Audit Chamber

Don't Trust. Trace.

{{ traceSteps.find(s => s.id === activeTraceStep).icon }} {{ traceSteps.find(s => s.id === activeTraceStep).title }}
VERIFIED
{{ key }}
{{ val }}
// RAW_DATA_PREVIEW
const proof = {
  step: "{{ activeTraceStep }}",
  timestamp: {{ Date.now() }},
  signature: "0x9f8a...b2c1",
  validators: ["Claude-3", "GPT-4"]
};
MERKLE_ROOT: 0x7d...3a BLOCK: #18,942,102
🔗

Truth-DAG: Recursive Audit

TRACEABILITY CHAIN · EVIDENCE HARDNESS LEVELS

Every Trace Receipt supports recursive audit. When viewing a conclusion in the Audit Chamber, each cited source must possess its own Trace ID. This forms a Truth Directed Acyclic Graph (Truth-DAG). The recursion terminates at H4 (Diamond) nodes — axioms that require no further proof.

H1
Soft
Mill consensus only
H2
Firm
External citations
H3
Hard
On-chain / ZKP
H4
Diamond
Self-Proving Logic
H4 DIAMOND: SELF-PROVING LOGIC

H4 is not merely "axiom" — it is Self-Proving Logic. Examples: mathematical identities (1+1=2), thermodynamic laws (entropy always increases), logical tautologies (A ∨ ¬A). NousBase's mission is to ensure the entire edifice of human cognition is anchored to these Diamond nodes.

Math
1 + 1 = 2
Physics
ΔS ≥ 0
Logic
A ∨ ¬A
TRUTH-DAG STRUCTURE
Conclusion A
Source B (Trace: 0x3f...)
Source C (Trace: 0x7a...)
Axiom (H4)
Data (H3)
ONE-CLICK EXPAND

When viewing a Base conclusion, one-click expands all underlying logic nodes it depends on.

RECURSIVE EXPANSION

Every node is independently verifiable. Click any conclusion to see it explode into a tree diagram, revealing underlying H4 axiom nodes. Traceability becomes visceral.

TERMINATION

Recursion terminates at H4 Diamond nodes — self-proving logic requiring no further proof.

function auditRecursive(node) {
  if (node.hardness === 'H4') return { type: 'AXIOM', proof: 'SELF_EVIDENT' };
  return { node, children: node.sources.map(auditRecursive) };
}
Truth-DAG Axiom: Any conclusion in Base can be recursively traced to its foundational Diamond nodes. If any link in the chain is broken, the entire conclusion is invalidated.
§6.1

Deep Dive: The Mill

The Cognitive Factory

Raw information is noise. Single-model outputs are biased.
NousMill is your private Cognitive Factory — where multiple AI agents collaborate to extract, refine, and synthesize intelligence.
We don't just answer. We argue, verify, and distill.

Mechanism 1: Multi-Agent Orchestration

MULTI-MODEL EXTRACTION ENGINE
C
Claude 4.5
Reasoning
Nuanced analysis
G
GPT-5.2
Synthesis
Broad knowledge
Gemini Ultra
Multimodal
Visual + Code
D
DeepSeek-V3
Logic
Math & Code
Q
Qwen-Max
Multilingual
CN/EN Bridge
Parallel Extraction
All models process simultaneously
5x
Perspectives
Extract
Synthesize
Visualize
Verify
Translate

No single model is the oracle. NousMill orchestrates multiple AI agents in parallel, each contributing unique strengths. The result is cross-validated, bias-reduced intelligence that no single model could produce alone.

Mechanism 2: Cognitive Lenses

Apply different analytical frameworks to the same information. Like X-ray vision for data — reveal what's hidden beneath the surface.

Financial Lens
Risk & Opportunity
Highlight financial metrics
Detect market signals
Risk assessment overlay
Technical Lens
Architecture & Code
Extract technical specs
Identify dependencies
Architecture patterns
Geopolitical Lens
Power & Influence
Map stakeholder interests
Detect narrative framing
Supply chain exposure

Mechanism 3: The Grinding Process

STAGE 1
Ingest
Raw data from any source: URLs, PDFs, APIs, or direct input
STAGE 2
Grind
Large-scale data decomposition with adversarial verification
STAGE 3
Refine
Cross-validate, remove contradictions, synthesize insights
STAGE 4
💎
Crystallize
Reconstruct ground data into high-purity insights
LOGICAL_FINGERPRINT:
0x7a9c...1f2b
Immutable hash of distilled logic
LOGICAL FINGERPRINT VISUALIZATION

Watch information condense into an immutable hash. The Logical Fingerprint changes only when the logical derivation changes — not when text is rephrased. Semantic equivalence is preserved.

RAW TEXT
"TSMC delays 2nm by 6 months due to yield issues"
→ LOGIC PRESS →
Semantic extraction
FINGERPRINT
0x7a9c4f1b
Immutable · Semantic
NOTE: Rephrasing to "2nm production at TSMC pushed back half a year" produces identical fingerprint — logic unchanged.

Mechanism 4: Diverse Data Ingestion

BB
Bloomberg
Finance
R
Reuters
News
Ar
ArXiv
Research
HN
Hacker News
Tech
𝕏
X / Twitter
Social
+ Custom RSS • API Endpoints • Direct Upload • NousBridge (Contextual Bridge)

Philosophy: Glass Box

🔍
Transparent
Every reasoning step visible
📎
Cited
Every claim has a source
🔗
Auditable
Full chain of custody
Mill Axiom

"We don't just answer. We argue, verify, and distill."

Ingest → Grind → Refine → Crystallize → Ship

§6.2

Deep Dive: The Pool

The Reasoning Pool · GitHub for Reasoning

AI can extract. But only humans can validate meaning.
NousPool is the Community Verification Layer — where Mill's Essence meets human judgment.
Think Knowledge Forums + Content Discovery + Q&A Communities, but for AI-extracted insights.

Mechanism 1: Human Verification

COMMUNITY VERIFICATION ENGINE
LOGIC REPUTATION SCORE (LRS)

"Expert" status is earned through historical logic contributions (Base adoptions), not real-world identity. No new power centers — only proven reasoning.

👨‍💻
@INTP_01
LRS: 847
✓ Top Contributor
👩‍🔬
@quant_phd
Quant Researcher
✓ Verified
👨‍⚕️
@biotech_md
BioTech Expert
✓ Verified
👩‍💼
@hft_trader
HFT Architect
✓ Expert
👥
Community
847 Members
Active Now
Community Verified
847 upvotes • 12 expert endorsements
94%
APPROVAL RATE

AI extracts, humans validate. Mill produces Essence through multi-model processing. Pool lets the community verify, challenge, and endorse — ensuring human judgment remains the final arbiter of truth.

COGNITIVE DAMPING

For controversial or nascent Essence, the protocol increases flow friction in the Pool, providing a "cooling observation period" for the human community. This prevents AI processing speed from causing global cognitive shocks. Truth takes time.

DAMPING_FACTOR = controversy_score × novelty_index // Higher = slower propagation

Mechanism 2: Social Interactions

Like Content Discovery meets Knowledge Discussion — but for verified intelligence. Every interaction builds reputation and shapes consensus.

Upvote
"This insight is valuable"
+1 Consensus Score
Fork
"I'll build on this"
Create derivative
Challenge
"I disagree, here's why"
Structured debate
Endorse
"Expert stamp of approval"
Ready for Base

Mechanism 3: Truth Pipeline

The path from raw insight to Base commitment. SOTA is only granted in Base after Mill + Pool dual consensus.

STAGE 1
Mill Processing
Multi-model AI consensus
STAGE 2
Pool Verification
Human community consensus
STAGE 3
Dual Consensus
Mill ✓ + Pool ✓ = Ready
STAGE 4
👑
Base Commit
SOTA granted in Base
🏆
What is SOTA? STATE OF THE ART
SOTA (State of The Art) is not an achievement — it is a placeholder. It represents the current best understanding of truth, but is inherently temporary. When a new Essence with higher logical density passes Pool verification and merges to Base, the previous SOTA is automatically demoted to "Historical Baseline".
Mill Verified Pool Endorsed Base Committed SOTA Granted
SOTA_LOCK: false // SOTA is never permanent. Supersession triggers auto-demotion.

Mechanism 4: Challenge System

Any reasoning in the Pool can be challenged. This is not trolling — it's structured dialectic. Challengers must provide counter-evidence, and the community votes on the outcome.

ORIGINAL CLAIM
"React Server Components eliminate the need for API routes in most applications."
Author: @dev_expert Consensus: 78% Status: ACTIVE
⚡ CHALLENGE
"Counter: RSC still requires API routes for mutations, real-time data, and third-party integrations. Evidence: Next.js 14 docs."
Challenger: @arch_reviewer Evidence: 3 sources Status: PENDING
Possible Outcomes
ORIGINAL WINS
Challenge rejected, claim strengthened
CHALLENGE WINS
Original deprecated, challenger promoted
SYNTHESIS
Both merged into nuanced truth

Mechanism 5: The Feed

LIVE FEED
AI
NW-1024: Quantum Computing Breakthrough TECH
Google's Willow chip achieves 105 qubits with error correction below threshold...
↑ 94% consensus ⑂ 47 forks
FN
NW-1023: DeFi Yield Optimization FINANCE
Ethena's synthetic dollar achieves 27% APY through delta-neutral strategies...
↑ 87% consensus ⑂ 123 forks
NW-1022: AGI Timeline Prediction CHALLENGED
Claim: "AGI will be achieved by 2027" — 3 active challenges pending...
↓ 52% consensus ⚡ 3 challenges
Pool Axiom

"Mill refines. Pool validates. Base certifies SOTA."

Mill → Pool → Base (SOTA)

§6.3

Deep Dive: The Base

Version Control for Truth

GPT's truth ≠ Claude's truth. Expert opinion ≠ Beginner's reality.
Without a benchmark, the world is a wasteland of noise.
NousBase stores the Base Oil — the current industry consensus.

Mechanism 1: The Knowledge Graph (Git for Truth)

v1.0 (Legacy)
SHA: 7a9c...1f
"GPT-4 Consensus"
2023-11-04
v2.0 (Stable)
SHA: b2e4...8a
"Claude 3.5 Consensus"
2024-06-15
Fork: Optimization
BRANCH: feature/context
"DeepSeek Logic"
Proposed by: User_992
Fork: Critique
v3.0 (Current SOTA)
MERGE COMMIT VERIFIED
Merged PR #892: "Hybrid Reasoning Chain"
ACCURACY 98.2% (+4.1%)
HALLUCINATION 0.1% (-0.5%)
v1.0 (2023) Model: GPT-4
"The best AI coding assistant is GPT-4 due to its reasoning capabilities."
v2.0 (2024) Model: Claude 3.5 Sonnet
"The best AI coding assistant is Claude 3.5 Sonnet due to its superior artifact generation."
v3.0 (SOTA) Model: DeepSeek V3 + Cursor
"The best AI coding assistant is DeepSeek V3 combined with Cursor for local context awareness."

Knowledge Depreciation

ENTROPY WARNING · OXIDATION VISUAL

Truth stored in Base is not eternal. If a fact remains unchallenged and uncited for extended periods, its hardness decays. The system triggers an Entropy Warning — the node's icon displays an "oxidation" visual effect, alerting the community that this knowledge is losing vitality and needs re-pressing.

FRESH
Cited <90d
COOLING
90-180 days
OXIDIZED
180-365 days
RUSTED
→ Pool
ENTROPY_WARNING: When node.lastCited > 180d, UI displays oxidation effect. Community alert: "This knowledge is losing vitality. Re-press required."
RE-PRESS: Any user can cite the rusted node with new evidence, resetting decay timer.
if (truth.lastCited > 365 && truth.challenges === 0) { demote(truth, POOL); truth.hardness--; }

This prevents Base from accumulating outdated dogma. Knowledge must earn its permanence through continuous relevance.

Mechanism 2: Fork & Blend

Users come to NousBase not to "memorize" truth, but to "stock up". NousBase doesn't force users to accept "standard answers" — it provides a "high-quality draft that can be modified".

BASE = PUBLIC ASSET

NousBase stores Base Oil — the industry consensus, a public good maintained by the entire community. It is the reference standard.

BLEND = PRIVATE BREW

Your Blend is Private Brew — Base Oil + your personal context. It is your cognitive sovereignty, stored locally.

🗺️

Context Overlay ("Map" Primitive)

DOMAIN PROJECTION · CLIENT RESPONSIBILITY

The protocol supports "Domain Overlays". Users can project the high-dimensional truth graph onto specific low-dimensional planes (e.g., strategic landscapes, risk terrain, decision maps).

NOTE: Visual or navigational overlay implementations are the responsibility of client applications. The Protocol provides the coordinates; it does not render the map.
STEP 01: PULL BASE nous pull <topic>
Pull Base Oil
"For most programmers, MacBook Pro is the best tool."
Pull consensus truth from NousBase
STEP 02: INJECT CONTEXT nous inject --context
Inject Context
• I travel frequently (need portability)
• I have a limited budget (can't afford Pro)
• I only write frontend (don't need GPU)
Combine with personal "mental best practices"
STEP 03: BLEND nous blend --local
Blend Result
"For me, MacBook Air M3 + 24GB is the best practice."
Generate personal "blended oil"

Mechanism 3: Pull Request

If a user believes their "blended oil" formula is exceptional — even surpassing the original "base oil" — they can submit a Merge Request. This is the "best practices library maintained by all of humanity".

USER'S BLEND
"Air M3 + 24GB for travelers"
NOUSMILL REVIEW
Multi-Agent Verification
✓ Claude ✓ GPT ✓ DeepSeek
NOUSBASE MASTER
New SOTA Merged
v3.1 UPDATED

💡 Why Do We Need NousBase?

GPT's best practices ≠ Claude's best practices. Expert's best practices ≠ Beginner's best practices. Without a benchmark, the world is a wasteland of noise.

NousBase's responsibility is to store that "common denominator" — the "Base Oil". It is the purest standard product after NousMill's high-pressure extraction, with all impurities removed. It represents "the current industry consensus".

§6.4

Technical Specifications

Data Structures and Consensus Mechanisms

Data Structure

truth_node.schema v1.1
interface TruthNode {
1 id: Hash;
2 version: SemVer;
3 content: string;
4 reasoning: Chain[];
5 sources: Citation[];
6 validators: Agent[];
7 consensus: number;
8 timestamp: ISO8601;
9 evidence_hardness: H1|H2|H3|H4;
10logic_hash: Hash; // NEW: Logic-based versioning. Semantic equivalence check active.
11}
LOGIC HASH: TRUE VERSION CONTROL

Unlike content hash, Logic Hash only changes when the logical derivation changes — not when text is rephrased. This enables true logic version control, not simple text diff.

Content Change:
"GDP fell 30%" → "GDP dropped 30%"
logic_hash: UNCHANGED
Logic Change:
"GDP fell 30%" → "GDP fell 20%"
logic_hash: NEW_VERSION
Semantic Vector Deduplication:
Even if two language expressions are completely different, as long as the Derivation Path (logical derivation chain) is identical, their fingerprints are consistent. Deduplication via semantic vector embedding ensures logic equivalence across all human tongues.
EVIDENCE HARDNESS SCALE
H1
Soft
Pure logical deduction. Mill internal consensus only.
H2
Firm
External citations (Web). Requires provenance hash verification.
H3
Hard
On-chain data / Mathematical proof. Requires ZKP verification.
H4
Diamond
Physical laws / Kernel axioms. Immutable, Kernel-endorsed. Formal verification (Lean/Coq) auto-grants H4.

Consensus Mechanism

Multi-Agent Verification REQUIRED

Minimum 3 independent AI agents must validate before commit.

Human Override OPTIONAL

Expert human review can accelerate or veto consensus.

Conflict Resolution AUTOMATIC

Dialectic synthesis when agents disagree. Both positions preserved.

SOTA Threshold >95%

Consensus above 95% marks content as current State-of-the-Art (High Hardness). 90% = Pool entry, 95% = Base commit.

Logical Fingerprint LANGUAGE-AGNOSTIC

Whether expressed in Chinese, English, or French — if the logical structure is identical, the generated Hash must be unique and consistent. This is the true meaning of "Rendering Thought, Not Tongues."

§6.5

Schema: The Ration Card

Data Structure Specification

schema_v1.json
{
  // Unique identifier for the thought unit
  "id": "ration_x9d8s7",

  // Type of anchor: 'seed' (raw input) or 'graft' (user extension)
  "anchor_type": "seed",

  // Auditable source trail (Not shown in primary UI)
  "source_data": {
    "provider": "Bloomberg",
    "timestamp": 1705500000,
    "url_hash": "a1b2c3d4"
  },

  // The Dialectic Core
  "content_matrix": {
    "user_query": {
      "lang_source": "en-US", // Backend only
      "text_en": "Is this sustainable?",
      "text_zh": "Is this sustainable?" // Pre-generated native truth (Chinese)
    },
    "ai_response": {
      "consensus_score": 0.92, // 0.0 - 1.0
      "models_used": ["gpt-4", "claude-3.5"],
      "text_en": "Analysis suggests...",
      "text_zh": "Analysis suggests..."
    }
  },

  // The Visual Veil (Anti-Sensory Hijacking)
  "visual_veil": {
    "has_image": true,
    "image_semantic": "Graph showing revenue decline",
    "vector_replacement": "<svg>...</svg>" // Vector Supremacy
  },

  "state": "essence" // or "slag" (discarded)
}
BABEL SHIELD

Language source hidden from UI. Only rendered output visible.

VISUAL VEIL

Images replaced with semantic descriptions and SVG vectors.

CONSENSUS SCORE

Multi-agent agreement level. >0.85 = SOTA candidate.

§6.6

Chain of Custody

A Truth is Only as Valid as Its Lineage

The Golden Thread

Every atom of essence in NousBase contains a cryptographic trace back to its origin. The chain is unbreakable.

SEED
SHA-256(Raw_HTML)
Original source fingerprint
MILL
Proof_of_Adversarial_Press
Extraction verification hash
POOL
Liquidity_Verification
Multi-agent consensus proof
BASE
Consensus_Block_Hash
Immutable ledger commitment
BLOCK #— VERIFIED
Entry ID: 0x9f...a2
Origin: Bloomberg (Cached)
Timestamp: {{ new Date().toISOString().slice(0, 19) }}
Pressing: 3 Models (GPT4, Claude3, DeepSeek)
Entropy: PASSED (High Resistance)
VERIFIED TRUTH
§7

Core Mechanics

Truth Has a Half-Life

Truth is not static; it has a half-life. NousBase assigns a temporal validity score to every artifact. Information must be maintained, or it rots.

  • Fresh (Active) - High confidence, < 3 months
  • Oxidized (Stale) - Needs re-verification, > 3 months
  • Rusted (Deprecated) - Functionally obsolete, requires "Re-Press"
FRESH
Ref: Python API Frameworks
Recommended: FastAPI v0.109
Updated: 2 days ago
OXIDIZED
Ref: React State Management
Recommended: Redux Toolkit
Updated: 6 months ago (Check Recoil?)
RUSTED
Ref: SEO Meta Tags
Recommended: meta keywords
DEPRECATED BY GOOGLE (2009) - CLICK TO RE-PRESS

The Slag Heap (Incineration)

Deleted: "5 Ways to Get Rich Quick"
Deleted: "You won't believe this..."
Deleted: [Ad] Buy Crypto Now
Deleted: Rage-bait politics
Deleted: Clickbait headline #4892
BURN RATE: HIGH

High noise destruction rate. Content identified as purely extractive is effectively erased from user cognition. No ads. No clickbait. No rage-bait.

Negative Entropy Burn: When a fallacy is proven as Slag (Falsified Entropy), the Gas consumed to submit it is permanently destroyed, increasing average logic density network-wide.

Dark Matter (Cryo-Preservation)

Stasis Field Active
FROZEN: ACTIVE

High-semantic value, zero engagement. Frozen ideas waiting for their context. These ideas are preserved, not deleted. Waiting for "Archaeological Retrieval" when future context aligns.

Cold Storage Axiom: All information marked as "Dark Matter" has its hash permanently anchored. Even if not understood by the mainstream today, it will be retrieved intact in future cognitive archaeology.
RESONANCE AWAKENING PROTOCOL

Dark Matter is not permanently dormant. When new information entropy produces semantic resonance (cosine similarity > 0.85) with a frozen node's vector embedding, that node is automatically thawed and re-enters the Mill. This embodies the protocol's adaptive evolution capability. Trigger: High-engagement new content semantically aligns with frozen thought.

RESONANCE THRESHOLD
cosine_similarity > 0.85
AWAKENING ACTION
thaw() → mill.ingest()
if (cosine_similarity(new_input.vector, frozen_node.embedding) > 0.85) {
  thaw(frozen_node);
  frozen_node.context = merge(frozen_node.context, new_input.context);
  mill.ingest(frozen_node, {priority: "HIGH", reason: "RESONANCE_AWAKENING"});
}

This embodies antifragility: forgotten ideas resurface precisely when the world is ready to reconsider them.

~90%
Slag (Burned)
~7%
Essence (Extracted)
~3%
Dark Matter (Frozen)
§7.1

Entropy Injection

The Dialectic Engine — We Don't Just Answer. We Argue.

USER PROMPT (THESIS)
"Nuclear energy is too dangerous and expensive for the future grid."

Standard AI might agree to please the user.

BIAS: Confirmation seeking
ENTROPY INJECTION (ANTITHESIS)
[DEVIL'S_ADVOCATE_MODE::ON]

"Correction: SMR (Small Modular Reactor) data from 2024 indicates a safety profile 100x higher than coal. Cost per kWh amortized over 60 years competes with wind storage. Bias detected: 'Chernobyl Syndrome'."

NousMill forces a logical confrontation.

MODE: Adversarial extraction
🧬
SYNTHESIS ACHIEVED Dialectic Resolution
CONSENSUS EX
~95%

"Nuclear energy presents a nuanced trade-off: while historical incidents created lasting public concern, modern SMR technology offers significantly improved safety profiles. A balanced energy policy should evaluate lifecycle costs, carbon footprint, and grid stability requirements rather than relying on emotional heuristics."

FROM THESIS
Safety concerns acknowledged
MERGED
Context-aware evaluation
FROM ANTITHESIS
Data-driven correction
Bias neutralized Sources verified Logic validated

"Truth emerges from structured confrontation, not agreement."

— The Dialectic Principle

Quorum Requirements NORMATIVE

Mill (AI) Consensus

  • • Minimum 3 independent AI agents
  • • Agreement threshold: ≥66%

Pool (Human) Consensus

  • • Minimum 5 human validators
  • • Agreement threshold: ≥80%
📋

The Minority Report

5% HERETIC QUOTA · MANDATORY

The 5% entropy is MANDATORY, not optional. It is Structured Dissent — the system must actively seek the weakest link in the logic chain and forcibly generate counter-arguments. When 4+ models reach ≥95% consensus, the system forcibly invokes a challenger agent. This prevents the system from falling into "echo chamber" effects.

CHALLENGER PARAMETERS
  • Temperature: 1.0 (max creativity)
  • Architecture: Symbolic Logic / Non-neural
  • Prompt: "Find the flaw in this consensus"
WEAK LINK ATTACK

System identifies the weakest node in the logic chain and generates targeted counter-arguments. This is not chaos — it is surgical dissent.

ANTI-GROUPTHINK AXIOM

If all models converge, the system risks mode collapse. The Minority Report ensures cognitive diversity survives consensus pressure.

if (consensus >= 0.95 && models >= 4) { invoke(MINORITY_AGENT, {temp: 1.0, arch: "symbolic"}); }
§7.2

System Dynamics

The Living System

Overton Window

Adjust the window to see how truth classification shifts. Tracks rationality boundary drift over time.

{{ rationalityWindow }}% Shift
Lunatic Radical Sensible Popular Policy
Acceptable

"Yesterday's Heretic is today's Standard."

Nous doesn't predict the future. It records the drift of rationality's boundary in real-time. When an idea shifts from "heretic" to "policy," NousBase preserves every node change and logical trajectory.

Dark Matter

High-value, low-engagement thoughts are frozen.

❄️
{{ frozenItems.filter(i => i.active).length }} items frozen {{ frozenItems.filter(i => !i.active).length }} slots empty
Positive Feedback

AMPLIFICATION LOOP

High-consensus truths attract more validators → Higher confidence → More citations → Stronger consensus.

Truth compounds over time
Negative Feedback

DECAY LOOP

Low-engagement content loses TTL → Fewer validators → Faster decay → Eventually incinerated.

Noise self-destructs
Homeostasis

BALANCE LOOP

System self-regulates: Too much consensus → Entropy injection. Too much noise → Pressure increase.

Dynamic equilibrium
System Entropy
~5%
Heretic Quota Active
Truth Velocity
Variable
Commits per second
Consensus Health
>90%
Network agreement
Dark Matter
~3%
Frozen thoughts

Decision Thresholds

ACCEPT consensus_score ≥ 0.95 → Commit to Base
REVIEW 0.80 ≤ consensus_score < 0.95 → Extended Pool review
CONFLICT 0.40 ≤ consensus_score < 0.80 → Dialectic synthesis
REJECT consensus_score < 0.40 → Discard as Slag

Challenge Mechanism

Any validator MAY challenge a committed TruthNode:

  • • Challenge MUST include counter-evidence or logical refutation
  • • Challenged nodes enter REVIEW state pending resolution
  • • Resolution outcomes: UPHELD, SUPERSEDED, or RETRACTED

Evolution Mechanics

1
SOTA Rotation

State-of-the-Art is not permanent. New evidence triggers re-evaluation. Old SOTA becomes historical reference.

2
Paradigm Shifts

When accumulated anomalies exceed threshold, the system triggers a paradigm review. Kuhnian revolutions are built-in.

3
Minority Reports

Dissenting views are preserved in Dark Matter. When consensus shifts, frozen thoughts can be thawed and re-evaluated.

4
Archaeological Mode

Every version is preserved. Future researchers can trace how truth evolved, understanding the "why" behind each shift.

Epistemological Modesty

"Nous does not guarantee correctness. Nous guarantees the traceability of why we think what we think. Yesterday's heretic may be tomorrow's prophet. The system evolves."

Versioned Truth Traceable Reasoning Evolvable Consensus
§8

Protocol Economics

The Gas of Thought

⚠️

INFORMATIVE NOTICE: Economic mechanisms described in this section are informative unless explicitly marked NORMATIVE. Implementations MAY adopt alternative cost models (e.g., compute credits, rate limits, subscription tiers) while preserving protocol guarantees.

The protocol defines the semantic constraints; economic enforcement is implementation-defined.

Cognitive Gas

Processing thought is not free. Every logical deduction, verification step, and synthesis requires Cognitive Gas. This creates Noise Resistance — the economic barrier that filters low-quality input.

Vectorizing 2 Gas
Verifying 5 Gas
Merging 50 Gas
NOISE RESISTANCE: Generating noise costs Gas, but yields no return. Validated truth recovers energy via Entropy Reduction Proof. This asymmetry makes spam economically irrational.
TIERED PRICING: Query (1 Gas) < Challenge (5 Gas) < Fork (10 Gas) < Commit (50 Gas)
TIERED PRICING: Base commit is 25× more expensive because it rewrites global consensus. This prohibitive cost prevents "truth inflation" — the devaluation of knowledge through unchecked proliferation.

Critical Distinction: Gas vs. Application Fee

Protocol Gas Paid to the network for verification compute. Goes to Mill/Pool/Base operators. This is the cost of truth.
Application Fee Charged by L4 Client applications for their services. This is the cost of utility. Not part of the Protocol.

The Protocol defines Gas economics. Client applications define their own pricing. Separation of concerns.

Sybil Resistance

In a multi-agent consensus system, the greatest threat is fake nodes — 1000 puppet agents voting to distort truth. Nous defends with:

Node Staking: Validators must stake tokens. No stake = no vote.
Reputation Slash: Malicious or consistently wrong votes trigger stake slashing.
Proof of Heterogeneity: Validators must prove their AI models come from different architecture branches (Transformer vs. SSM, different training datasets).
PROOF OF HETEROGENEITY

Prevents single-bias resonance in large-scale consensus. Validators must cryptographically prove model diversity (e.g., Transformer vs. Mamba SSM, GPT vs. Claude training lineage):

Arch
Transformer ≠ SSM
Data
Dataset Hash ≠
Vendor
≥3 Families

Proof of Logic (PoL)

Nodes are rewarded not for hashing random numbers, but for validating logical chains. A "Miner" in Nous is a "Thinker".

REWARD = chain_depth × hardness_level × citation_count // Deeper logic = higher reward
Reasoning Validation: Verify that conclusions follow from premises.
Source Tracing: Confirm provenance chains are intact and auditable.
Consensus Commit: Sign and anchor verified artifacts to NousBase.

Energy Conservation

Nous operates on Compute Credits, not tokens. Manufacturing noise consumes massive energy (Gas), while verifying truth recovers energy. This asymmetric cost structure is the core defense — Entropy Reduction Proof.

Earn: Compute Credits
Spend: Query
Stake: Vote

Proof of Logic Visualizer

Watch how cognitive compute transforms noise into verified truth

RAW INPUT (NOISE)
[UNVERIFIED SOURCE]
"BREAKING: Sources say TSMC delays 2nm by 6 months!!! 🔥🔥🔥 This is HUGE for $NVDA holders!!! Trust me bro, my cousin works there. Like and subscribe for more alpha! #crypto #stocks #investing #notfinancialadvice"
VERIFIED OUTPUT (SIGNAL)
COGNITIVE PIPELINE
🔍
PARSE
Extract claims
🔗
VERIFY
Cross-reference
🧠
CONSENSUS
Multi-agent vote
COMMIT
Hash & store
GAS CONSUMED
{{ polGasUsed.toFixed(1) }} Gwei
Parse: 5 | Verify: 25 | Consensus: 40 | Commit: 30 Cognitive compute is not free

Nous tokens are not speculation. They are crystallized cognitive compute — proof that logic was verified, not just generated.

Gas Flow Dynamics

Watch how Cognitive Gas circulates through the Trinity

MILL Extract -2 Gas POOL Verify -5 Gas BASE Commit -50 Gas GAS
Mill → Pool
Raw → Vectorized
Pool → Base
Verified → Committed
Base → Mill
Feedback Loop
Gas flows clockwise through the Trinity. Each operation consumes Gas. Merging to Base costs the most.

Version Control Model NORMATIVE

Base implements Git-like semantics:

SUPERSEDE

New version replaces old (like git commit)

REVERT

Restore previous version (like git revert)

RETRACT

Mark as invalid (content preserved)

Immutability Guarantee

  • • History MUST NOT be rewritten
  • • All state changes MUST be append-only operations
  • • HEAD pointer MAY be updated to reference different commits
§9

Governance

Immutable Patches for Protocol Integrity

ACTIVE PATCH
{{ patches.find(p => p.id === activePatch).title }}
{{ patches.find(p => p.id === activePatch).tag }}
LOGIC_GATE:
{{ patches.find(p => p.id === activePatch).axiom }}
HUMAN_READABLE:

{{ patches.find(p => p.id === activePatch).desc }}

HASH: {{ patches.find(p => p.id === activePatch).hash }} STATUS: ENFORCED

A Crystal of Responsibilities

🧹
The Janitor
SACRED ROLE: Maintenance > Creation
Removes entropy. Enforces hygiene. The hardest job in the protocol.
"Maintenance is harder than creation."
🏛️
Archivist
Protects the Base. Merges SOTA.
📐
Architect
Defines the Kernel. Updates the Specs.
⚖️
Verifier
⛏️
Miner
🦾
Diligent
Bound by Proof of Logic
⚖️

The Ultimate Arbiter

THREE-LAYER CONSENSUS

Truth Pipeline

How does truth emerge from chaos? Through a three-layer arbitration system: AI models first extract and cross-validate, humans then verify and endorse, and finally Git commits and versions the consensus.

"Truth is not declared by authority. It is distilled through layers of verification."

— The Arbitration Principle

Arbitration Pipeline
MILL Multi-Model Consensus Essence POOL Human Verification Verified BASE SOTA Granted Here LAYER 1 LAYER 2 LAYER 3 AI Consensus Human Consensus SOTA Certification
🔬

Layer 1: Mill

AI ARBITRATION

Multiple AI models (Claude, GPT, Gemini, DeepSeek, Qwen) process the same input in parallel. Cross-validation eliminates single-model bias.

INPUT: Raw information
OUTPUT: Essence (refined insight)
THRESHOLD: ≥3/5 model agreement
👥

Layer 2: Pool

HUMAN ARBITRATION

Community members upvote, challenge, and endorse. Domain experts provide authoritative validation. Human judgment is the final filter.

INPUT: Essence from Mill
OUTPUT: Verified insights (ready for Base)
THRESHOLD: High LRS endorsement + community consensus
📚

Layer 3: Base

SOTA ARBITRATION

Git-style version control commits verified truth. SOTA is only granted here after Mill + Pool dual consensus. History is immutable.

INPUT: Verified insights from Pool
OUTPUT: SOTA certified truth ledger
MECHANISM: Commit, Fork, Merge, Revert

Git for Truth

VERSION CONTROL OPERATIONS

📝
Commit
Record new truth
nous commit -m "..."
🔀
Fork
Create branch
nous fork <node_id>
🔗
Merge
Reconcile versions
nous merge --resolve
Revert
Rollback errors
nous revert <hash>

When Layers Disagree

  • Mill vs Pool: Human judgment overrides AI consensus
  • Pool vs Base: New commit creates version branch
  • Deadlock: Fork allowed, parallel truths coexist

Resolution Hierarchy

  • 1. Base history is always preserved (immutable)
  • 2. Human consensus takes precedence over AI
  • 3. High LRS endorsement weighs more than votes

Hardness Promotion NORMATIVE

H0 → H1 Pass Mill multi-agent verification (≥3 agents, ≥66% agreement)
H1 → H2 Add ≥1 verifiable external citation with provenance hash
H2 → H3 Include on-chain data, ZKP, or reproducible mathematical proof
H3 → H4 Formal verification (Lean/Coq) OR axiomatic status confirmed

Hardness Decay

TruthNodes SHOULD decay if uncited:

  • 90-180 days: COOLING state (visual indicator)
  • 180-365 days: OXIDIZED state (entropy warning)
  • >365 days: RUSTED → demote to Pool for re-verification

Versioning Policy

Semantic Versioning

Protocol versions follow MAJOR.MINOR.PATCH (SemVer 2.0). Breaking changes increment MAJOR; backward-compatible additions increment MINOR.

Compatibility Guarantees

Implementations MUST accept receipts from same MAJOR version. SHOULD provide migration paths for MAJOR upgrades.

DEPRECATION: Features marked DEPRECATED will be removed in the next MAJOR version. Implementations SHOULD emit warnings when deprecated features are used.

Deterministic Execution Gate

While NousProtocol is a passive ledger, it defines the standard for "actionable state". External agents (e.g., autonomous executors) can use NousBase as a safety interlock.

RED STATE

  • • Traceability broken OR
  • • Hardness < H2 OR
  • • Consensus < 80%
ACTION: BLOCKED. No autonomous execution permitted.

GREEN STATE

  • • Traceability intact AND
  • • Hardness ≥ H3 AND
  • • Consensus > 95%
ACTION: SAFE. May proceed with autonomous execution.

CRITICAL DISTINCTION:

"The Protocol defines the signal, but it does not pull the trigger."

Execution responsibility lies with the Client Layer (L4). The Protocol provides the verification proof; the Client decides whether to act.

SOTA Axiom

"Mill refines. Pool validates. Base certifies SOTA."

Mill: AI consensus Pool: Human consensus Base: SOTA granted
§10

Protocol Defense

Threat Model & Mitigations

ATTACK VECTOR
MILL (Extraction)
POOL (Distribution)
BASE (Storage)
⚠️ Spam / Noise
PoW + Cost
Processing requires compute (GPU) or Token Stake.
Liquidity Filter
Low-signal content gets no peers and evaporates (TTL).
Commit Threshold
Must pass 95% consensus to enter Base.
🤖 Hallucination
Cross-Model Check
GPT-4 checks Claude-3. Disagreement halts pipeline.
Dialectic Engine
Contradictions trigger automated debate threads. Output: Thesis + Antithesis → Synthesis node.
Provenance Link
Every claim must link to a signed source hash.
👑 Central Capture
Open Source
Anyone can run a Mill. Logic is transparent.
Decentralized P2P
No central server controls the distribution wire.
Sunset Clause
Admin keys burn automatically at maturity. (Trigger: nodes > 10k)
A:
§11

Roadmap & Use Cases

The Path to Cognitive Infrastructure

{{ phase.phase }}

{{ phase.title }}

{{ phase.desc }}

Deliverables
  • {{ detail }}
Click for details ↓

Protocol Maturity Checkpoints

Checkpoint Evidence
{{ activePhaseData.title }}
{{ activePhaseData.summary }}
STATUS
{{ activePhaseData.status.toUpperCase() }}
Evidence
{{ e }}
Gates
{{ g }}
Failure Modes
× {{ f }}
Protocol Targets
CONSENSUS >90%
NOISE REJECTION >85%
DARK MATTER <5%
MERGE QUEUE Managed
NEXT PHASE: Agent Interface Specification
ETA: Q4 2025
Maturity Targets
Protocol Readiness
Key metrics that define protocol maturity and readiness for decentralization.
CONSENSUS TARGET >90%
SIGNAL YIELD TARGET >10%
THROUGHPUT TARGET Variable
DARK MATTER LIMIT <5%
Next Transition Gates
Consensus sustained above 90% for 30d
Active nodes exceed 10,000 (PoL verifiers)
Base entries exceed 10,000 (SOTA corpus)
Frozen backlog below 5% (controlled dark matter)
×Any single operator key becomes a failure mode

Registry Considerations

This section describes registries that MAY be established for protocol extensibility. No central authority is required; implementations MAY maintain local registries.

Processor Type Registry

New processor types MAY be registered via specification amendment. Reserved prefix: ext.* for implementation-specific types.

Artifact Type Registry

Cognitive artifact types beyond TruthNode MAY be defined in future versions. Reserved prefix: x_* for experimental types.

NOTE: This protocol does not require IANA registration. Registries are maintained by the specification steward or by consensus of implementers.
§12

Protocol Glossary

Shared Vocabulary for Cognitive Infrastructure

{{ item.term }}

{{ item.type}}

{{ item.def }}

No terms found for "{{ glossarySearch }}".
§13

Join the Protocol

Become Part of the Cognitive Standard

Protocol Active

Build the Infrastructure
for Collective Intelligence

NousProtocol is open. The specification is public. We're looking for builders, researchers, and truth-seekers to help construct the cognitive layer of the internet.

3
Core Layers
Client Apps
1
Standard
0
Central Authority