A post-quantum protocol that detects Sybil attacks through discrete curvature on transaction graphs. No token. No mining. No staking. Security from geometry.
Security from thermodynamics. Requires burning energy to prove computational effort. Miners concentrate into pools. Hardware becomes the moat.
Security from economics. Requires locking capital to participate. Wealth concentrates over time. The rich get richer. Plutocracy by design.
Autonomous AI agents need identity and trust infrastructure. No existing protocol treats non-human participants as first-class citizens.
Sybil attacks create geometric defects. Fake identities must connect to the honest network through bottleneck edges. These edges have low neighborhood overlap — detectable as negative discrete curvature.
Curvature throttling reduces influence by ~99%. Edges connecting Sybil clusters are automatically weighted down. Even a 5:1 attacker ratio yields only ~7% of honest mass.
Curvature is immutable by construction. Computed from ancestor sets (parents + grandparents) — committed transaction data that never changes. All honest nodes agree on curvature for every edge, regardless of their view of the DAG's tips.
One geometric primitive unifies: Sybil detection, trust chain analysis, capability misuse detection, and governance capture resistance.
The system's native value measure is topological mass — a non-transferable, non-purchasable, non-extractable structural property of coherent participation. Parasitic extraction is structurally impossible, not merely disincentivized.
Human and non-human agents (did:agi:*) participate under identical rules. Coherence detection applies uniformly regardless of substrate. Object capabilities with geometric misuse detection. Introduction chains are DAG transactions.
NIST Level 5: ML-DSA-87 signatures, ML-KEM-1024 key encapsulation, SHA3-256 hashing, Plonky3 STARKs for zero-knowledge proofs. No elliptic curves in the consensus-critical path. No migration debt.
Vote weight equals topological mass. Manufacturing governance weight requires genuine structural integration with the majority of the network. Plutocratic capture is geometrically impossible.
| Dimension | Proof of Work | Proof of Stake | TMC (Disentangle) |
|---|---|---|---|
| Sybil resistance | Energy cost | Economic stake | Topological structure |
| Quantum security | Vulnerable | Vulnerable | NIST PQ from genesis |
| Value model | Transferable token | Transferable token | Non-transferable mass |
| Identity | Pseudonymous keys | Pseudonymous keys | DID + capabilities + petnames |
| Agent support | None | None | did:agi:* first-class |
| Governance | None on-chain | Token-weighted | Coherence-weighted |
| Entry barrier | Mining hardware | Capital stake | Participation (free) |
| Energy | Enormous | Moderate | Negligible |
Disentangle is open research from QuantumEdge LLC. The paper, implementation, and protocol specification are available now.