Replies: 1 comment
-
|
I probably jumped the gun by opening a PR for this: https://github.com/UOR-Foundation/Hologram/issues/1 Please take a look at the whitepaper proposed in this RFD. Once we get this hammered out, I'll update the PR. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
The Hologram
A Technical Introduction to a Coherence‑Preserving Internet Substrate
Abstract
The Hologram is a two‑dimensional, toroidal data structure of 12,288 elements arranged as 48‑element pages across 256‑element cycles. Two closure laws—one per axis—govern admissible states. Systems built on this substrate treat computation, transport, authorization, and settlement as sequences that preserve these laws. The design removes external trust anchors: correctness reduces to local, deterministic verification of closure and provenance.
1. Introduction
Separate stacks exist for virtual machines and containers, software distribution, digital currencies, and formal verification. They introduce distinct control planes and inconsistent safety models. The Hologram adopts a single base rule—conservation—and encodes all layers as transformations that must satisfy it.
This document defines:
The intent is descriptive and technical; no deployment assumptions are required to understand or verify the model.
2. Model
Let the alphabet Σ be finite. The default instantiation uses bytes with additive group$(\mathbb Z/256\mathbb Z, +)$ .
2.1 Conservation laws (L0)
There exist functionals$I_P: Σ^{P}→Σ$ and $I_C: Σ^{C}→Σ$ such that for all c and p: $I_P(H[·,c]) = 0, \qquad I_C(H[p,·]) = 0.$ The default uses modular sum; XOR is an equivalent bitwise form. Translations along pages or cycles preserve the equations.
2.2 Immediate consequences
2.3 Working example (closure‑preserving construction)
Define$a[p] = 1$ for $0≤p<24$ , and $a[p]=255$ for $24≤p<48$ . Define $b[c] = (16·c)\bmod 256$ . Then $H[p,c] = (a[p] + b[c]) \bmod 256$ satisfies both closure equations.
Checks. For any c:$\sum_p H[p,c] = \sum_p a[p] + 48·b[c] ≡ 0\pmod{256}$ . For any p: $\sum_c H[p,c] = \sum_c b[c] + 256·a[p] ≡ 0\pmod{256}$ .
2.4 Canonical encoding details
3. Witnesses and Verification
A state is accepted if the following are true:
Verification is local; no global consensus is required.
3.1 Algorithms (deterministic)
Closure check (cycle‑major):
Time$O(N)$ , memory $O(1)$ beyond streaming buffers.
Merkle construction (per‑page). Leaf$c$ = Hash($H[0,c]∥…∥H[47,c]$ ). Root uses a fixed binary tree. If $C$ is not a power of two, duplicate the last leaf to fill the level; the index of each leaf is explicit.
Padding function. If the final element of a row/column is absent, compute it as the modular negative of the partial sum.
3.1.1 Canonical Merkle rules
Hash function. SHA‑256 is the hash for leaves and internal nodes. Output is 32 bytes.
Domain separation.
H(0x00 ∥ leaf_bytes)whereleaf_bytes = H[0,c]∥…∥H[47,c].H(0x01 ∥ left ∥ right).Ordering. The tree is indexed left‑to‑right by increasing leaf index
c(0..255). For internal nodes,leftis the subtree covering the lower index range.Arity/padding. The base profile has 256 leaves (a power of two). If other profiles are defined with non‑power‑of‑two leaf counts, pad by duplicating the last leaf to the next power of two.
Endianness. All indices used in inclusion proofs are big‑endian unsigned integers.
3.2 Failure codes
E_PAGE: a page equation fails.E_CYCLE: a cycle equation fails.E_ROOT: Merkle root mismatch.E_LAYOUT: serialization/layout invalid.E_STALE: stale or missing witnesses.4. Identity and Addressing (L1)
Sections of H admit canonical identifiers. An identifier binds a serialization to its witnesses (closure equations and Merkle root). The addressing map$(p,c) ↔ i$ is a bijection over $[0,N)$ . Typed references select pages, cycles, or blocks; dereference preserves closure because witnesses are part of the identifier.
Definition (identifier).
layoutrecords ordering;hashRootis the Merkle root;closureWitnessis the minimal data to recompute padding during verification.Example. A page reference includes the cycle index c, the corresponding leaf hash, and the Merkle branch needed to reconstruct the root.
4.1 Identifier binary format
A minimal binary form binds layout and witnesses deterministically.
cwCount=0and omitcw.5. Integrity and Exchange (L2)
The Coherent Exchange Format (CEF) preserves closure by construction and carries witnesses.
Record layout.
5.1 Field semantics and canonicalization
version: fixed at 1 for the base profile.order: 0 = cycle‑major, 1 = page‑major. Implementations MUST accept both and preserve the flag on re‑encode.length: MUST equal 12,288 in the base profile.payload: raw bytes of H in the chosen order.pcw(per‑closure witnesses): 48 bytes reserved. In the base profile these bytes are all zero and ignored during verification. Future streaming/fragmented profiles MAY use them to carry minimal closure fixups.leafCount: fixed at 256; included for explicitness.root: SHA‑256 Merkle root as defined in §3.1.1.Round‑trip.* Decoding reconstructs$H$ ; re‑encoding yields the same root and closure result.
Inclusion proofs. A page can be verified independently by supplying its leaf index and Merkle branch.
6. Protocol Construction (L3)
Protocols are sequences of frames that must satisfy conservation over sliding windows.
Budget space. Let B = ℤ₉₆ with addition modulo 96. Each frame carries$b∈B$ . Composition is addition.
Window admissibility. A window$W = [f_k,…,f_{k+L-1}]$ is admissible if (i) its closure holds and (ii) the composed budget satisfies the protocol rule $R(W)=\text{true}$ .
Acceptance rule. A receiver advances on frame$f$ if the window containing $f$ closes (L0) and the accumulated budget meets the predicate.
Object operations.
PUT,LINK,ATTESTmodify a typed object graph. Acceptance requires preconditions and a valid budget. Replays and bit‑flips violate closure or Merkle checks and are rejected.Loss and reordering. Windows carry indexes; gaps or duplicates cause rejection unless a protocol specifies recovery with fresh witnesses.
6.1 Window parameters and sequencing
seq, incremented by 1 per frame.L(frames). Protocols chooseL; receivers MUST apply the sameL.W = [seq..seq+L-1], compute closure and budget over the frames in index order; out‑of‑order arrivals are buffered or rejected per protocol policy.6.2 Replay and reordering
seqless than the latest committed index is rejected.7. Policy and Names (L4)
Authorization is expressed as budget‑valued policies. Decisions carry witnesses. When a Boolean outcome is required, the budget calculus collapses conservatively to a yes/no result without introducing new theorems beyond the budgeted ones. Name bindings are signed statements referencing identifiers with their witnesses.
**Policy evaluation.
7.1 Policy predicate semantics
Let B = ℤ₉₆ and let
⟦x⟧ ∈ {0,…,95}denote the canonical representative ofx∈B.(subject, action, object)to contributions in B.ΣPbe the sum (mod 96) of applicable contributions. An admit setS ⊆ {0,…,95}defines acceptance.⟦ΣP⟧ ∈ S. The witness is the multiset of contributing statements and their indices.8. Runtime Model: Virtual Private Infrastructure (L5)
A user operates a Virtual Private Infrastructure (VPI) across their devices.
Device. Endpoint with attestation and declared capacity.
Context. Isolation and placement boundary (subnets, services, applications). Cross‑context links require explicit policy and witnesses.
Lease. Schedulable unit bound to a device for a duration$τ$ . Renewal requires a closing window; expiration or violation tears down the workload deterministically.
Scheduling as conservation. Placement rules are explicit; lease renewal is conditioned on local closure and protocol budgets.
Example flow.
8.1 Device attestation record (base profile)
nonceMUST be unique per attestation;(notBefore, notAfter)define validity.devKeyIdidentifies the signing key;stateRootcommits to the device’s measured state.stateRootinclusion proofs if provided.9. Relation to Existing Technologies
9.1 Virtual machines and containers
VMs and containers provide isolation through hardware or namespaces with external control planes. The Hologram defines acceptance by equation, not by origin. VMs and containers can be wrapped as artifacts; intake and deployment are verified locally.
9.2 Software distribution
Conventional registries distribute images with digests but without structural closure. Artifacts here are page‑aligned, content‑addressed, and ship with witnesses. Synchronization is possible over intermittent links because verification is local.
OCI registry ingress (no tar, no unpack).
Goal. Import an OCI image as‑is, without tar streams, while preserving original digests and adding Hologram witnesses.
Ingest procedure.
order=cycle-major; compute per‑page hashes and a per‑segment root.AIDX (binary sketch).
Integrity.
ociSha256is computed over the unmodified blob;holoRootis computed over CEF pages (witness‑carrying).Export. To reproduce the OCI blob, concatenate the original bytes using
sizeandSegRefboundaries; ignore closure bytes (they live only in CEF/witness space). The recovered blob’s digest equalsociSha256.Result. No tar; no file system semantics required; round‑trip preserves OCI digests; Hologram witnesses live alongside as CEF records with an index.
9.3 Digital currencies
Proof‑of‑Work and Proof‑of‑Stake externalize trust to energy or ownership. The Hologram uses conservation windows with budgets modulo 96. Settlement is the act of presenting valid windows; verification cost is bounded and local. Global total ordering is not part of the substrate.
9.4 Proof systems
General proof systems certify properties of programs. The Hologram restricts to a small set of invariants sufficing for the stack. The theorems are constructive and map directly to verifiers.
10. Security Considerations
10.1 Cryptographic assumptions
10.2 Properties and threats
Adversary model assumes message tampering, replay, and partial observation. Device compromise, side‑channels, and denial‑of‑service are outside the substrate and require conventional mitigations.
11. Evaluation
The system admits deterministic conformance:
Complexity. Closure verification is$O(N)$ . Merkle verification is $O(\log C)$ per page proof when using inclusion proofs. Witness size is bounded by per‑page hashes plus minimal closure bytes.
Methodology. Implementations measure wall‑clock verification time on fixed vectors; publish sizes of witnesses and failure detection latency.
11.1 Reference constants & sizes (base profile)
P=48,C=256,N=12,288.pcw: 48 bytes (all zero in base profile); root: 32 bytes.UORID) binary length without witnesses: 1+1+1+1+32+1 = 37 bytes.12. Interfaces and Tooling Surfaces (Hologram)
Interface definition. The interface to The Hologram is Hologram. Hologram provides a minimal, verifiable set of tools to interact with the substrate; it does not add new trust anchors. All interfaces call the same local verifiers derived from the formal model.
12.1 Components
12.2 Minimality and ecosystem
Hologram surfaces are intentionally minimal: they provide the smallest set of operations necessary to read, verify, and write states that satisfy the substrate. The broader ecosystem—services, applications, games, and tooling—is built atop these interfaces (typically via the Hologram SDK) and remains subject to the same invariants.
12.3 Layer mapping
12.4 Minimal API surface (signatures)
Interfaces are identical across SDK, CLI, and Dashboard; implementations call the same local verifiers.
13. Scope and Limitations
The model assumes honest device attestation and correct verifier implementations. It does not provide total ordering or global consensus. Applications requiring those properties must layer additional protocols without violating closure.
14. Conclusion
A single conservation rule over a fixed substrate yields a coherent basis for virtualization, distribution, authorization, and settlement. Because acceptance reduces to local checks, the system operates without external trust anchors and remains compatible with existing execution and packaging technologies.
Appendix A — Lemmas (sketches)
A.1 Addressing. The map$(p,c) ↦ i=c·P+p$ is a bijection on $[0,N)$ ; inverse: $p=i\bmod P$ , $c=\lfloor i/P \rfloor$ .
A.2 Global dependency.$\sum_c I_P(H[·,c]) = \sum_p I_C(H[p,·]) = \sum_{p,c} H[p,c]$ . One check is derivable.
A.3 Rotation invariance. For any$(Δp,Δc)$ , define $H'(p,c)=H(p+Δp, c+Δc)$ . Closure equations hold for $H'$ .
A.4 Padding correctness. Let$x_0,…,x_{k-2}$ be given. Set $x_{k-1} = -\sum_{i=0}^{k-2} x_i \bmod 256$ . Then $\sum_i x_i ≡ 0$ .
Appendix B — Algorithms (pseudocode)
B.1 Page‑major closure check: analogous to 3.1 with loops swapped.
B.2 Inclusion proof verification: given leaf index and Merkle branch, recompute root and compare.
B.3 Window acceptance: maintain rolling sums and a budget accumulator modulo 96; advance when both predicates hold.
Appendix C — Artifact wrapper (deterministic)
Define a function
wrap(bytes)that outputs a CEF record:wrapis idempotent on already‑closed inputs and preserves content digests when decoding followed by re‑encoding.Beta Was this translation helpful? Give feedback.
All reactions