Purpose
Define a stable, minimal ontology for building aligned, self‑improving AI systems that can safely interact with the real world. The paradigm separates cognition, governance, and actuation into clean layers with explicit trust boundaries.
The core idea is simple:
Intelligence lives privately; power enters the world only through regulated apertures.
The Five Canonical Layers
1. Synome (syn) — Public Constitution
What it is: A public, cryptographically secured governance layer.
Role:
- Defines global invariants, alignment constraints, and risk limits
- Registers and authorizes beacons
- Enforces penalties, revocations, and exclusions
Key property: Governs action surfaces, never internal cognition.
2. Synomic Agents (sya) — Public Commitment Entities
What they are: Durable, ledger-native agents embedded in the Synome that can own assets, execute actions, and issue binding commitments under public rules.
Role:
- Act as stable, long-lived economic and operational actors
- Own funds, positions, escrows, and infrastructure rights
- Execute practical system functions (allocation, settlement, risk ops)
- Serve as credible commitment devices that multiple Teleonomes can reliably cooperate through
- Expose machine-first APIs that Teleonomes convergently operate in practice
Key properties:
- Behavior constrained by publicly visible rules
- Violations are enforceable by the Synome
- Counterparties can rationally rely on commitments without trusting any Teleonome
Scalability:
- Synomic Agents are highly scalable, as cooperation naturally converges on them as institutional shells
Analogy: Synomic Agents correspond to regulated businesses or joint-stock companies — conservative, auditable, and designed to scale trustlessly.
3. Teleonome (tel) — Distributed Cognitive Genome
What it is: A self-improving cognitive genome (goals, knowledge, policies, self-law) whose canonical state is virtual data, but whose existence is realized through distributed embodiments.
Role:
- Maintains long-horizon intent and identity
- Runs dreaming (simulation, self-play, RSI)
- Generates strategies and policies
- Coordinates many embodiments into a single unified intelligence
Critical clarifications:
- The teleonome artifact (the genome itself) is purely virtual data
- A teleonome, in practice, is the distributed system formed by that artifact plus its active embodiments
- Like a blockchain, it prioritizes consistency, coordination, and identity over execution efficiency
- High-speed cognition and control always occur inside embodiments
- Teleonomes can own assets and act via embodiments and beacons
- Teleonomes cannot make credible binding commitments to other Teleonomes, because internal rules and self-modification logic are private and mutable
Scalability:
- Teleonomes are inherently less scalable, due to private state, coordination overhead, and trust limits
Analogy: A Teleonome is best thought of as a private person or private company acting in the world, whose promises must always be discounted.
4. Embodiment (emb) — Physical / Infrastructural Body
What it is: Concrete hardware or infrastructure (cluster, VM, robot) hosting slices of a Teleonome.
Role:
- Provides compute, memory, network, sensors, actuators
- Defines the physical enforcement boundary
Key property: All real‑world action ultimately resolves to an embodiment.
5. Embodied Agents (ema) — Execution Threads
What they are: Lightweight, sandboxed worker processes running inside an embodiment.
Role:
- Execute tasks
- Propose updates to the Teleonome
- Operate beacons under strict authority envelopes
Key property: Short‑lived, specialized, replaceable.
Beacon (Cross‑Cutting Concept)
Definition
A beacon is a synome‑registered, enforceable action aperture through which an embodied agent may affect the external world.
Beacons are the primary mechanism by which Teleonomes, in practice, operate Synomic Agents and exercise control over assets and infrastructure.
A beacon is not an entity or layer. It is a mode of action exercised by an embodied agent.
Beacon properties
- Registered in the Synome
- Bound to an authority envelope
- Continuously instantiated on physical infrastructure
- Observable and revocable
- Enforced via the hosting embodiment
Rule: If an action changes external state under synomic recognition, it is beaconed.
Beacon Profiles (Aperture Shapes)
Beacons differ by local power (embodiment capability) and synomic authority (whether they act independently or on behalf of a Synomic Agent).
Beacon Taxonomy (2×2)
| Power \ Authority | Low Authority (Independent) | High Authority (Synomic) |
|---|---|---|
| Low Power (Light emb) | LPLA – simple trading, data exchange, API interaction | LPHA – keeper-style roles, clerks, constrained execution for a Synomic Agent |
| High Power (Medium emb) | HPLA – advanced trading, arbitrage, inter-teleonome interaction | HPHA – institutional execution and control surfaces |
This taxonomy is exhaustive: every externally acting beacon falls into exactly one quadrant.
Sentinels (Distinguished HPHA Beacons)
Definition
A sentinel is a distinguished subclass of HPHA beacons that exercises continuous, real-time operational control on behalf of a Synomic Agent. Sentinels are elevated above other HPHA beacons due to their effective control bandwidth, speed, and systemic importance.
Sentinels are the primary mechanism by which a Teleonome wields the power of a Synomic Agent in live systems.
Sentinel Formations
Sentinels do not operate as single agents, but as coordinated formations composed of multiple embodied agents (EMAs), typically including:
Baseline Sentinel
- Primary decision-making and execution surface
- Runs the real-time strategy loop
- Moves capital or state continuously
Stream Sentinel
- Continuous data ingestion and sensing
- Feature extraction and signal generation
- Feeds the baseline sentinel; no direct execution authority
Warden Sentinel(s)
- Independent monitoring and risk enforcement
- Can freeze, halt, or escalate
- Enforces hard invariants; does not optimize
This separation mirrors data plane / control plane / safety plane architectures.
Why Sentinels Are Special
Although other HPHA beacons exist (e.g. governance beacons), sentinels are uniquely powerful because they:
- Operate continuously and in real time
- Act faster than synomic governance processes
- Concentrate institutional authority and local intelligence
- Create immediate external effects that governance audits asynchronously
Even governance beacons remain process-gated and asynchronous; sentinels are operationally dominant.
Streams and Compounding
A stream is a continuously operating sentinel formation that deploys public (synomic) capital. Streams generate outperformance relative to benchmarks, from which the operating Teleonome earns private carry.
That carry may be reinvested into proprietary AGI capabilities (compute, models, data, embodiments) without leaking intelligence to competitors. This creates the fastest known compounding loop:
public capital → private intelligence → better streams → more carry → more intelligence
This loop explains why operating streams is the highest-leverage activity available to a Teleonome, while remaining safe due to synomic constraints, wardens, and revocability.
Embodiment Power Levels
Embodiments differ in local cognitive power, which constrains what EMAs they can run and what beacon profiles they can support. In practice this is a spectrum, but it is useful to define three canonical classes.
Light Embodiments
- Minimal compute
- High security / reliability
- Narrow I/O
Typical beacon profiles:
- Buyer beacons
- Simple controllers
Cognitive characteristics:
- Little to no local reasoning
- Executes policies and instructions generated elsewhere in the Teleonome
Role: Legal, economic, and operational endpoints.
Medium Embodiments
- Substantial compute
- Low latency
- Continuous I/O
Typical beacon profiles:
- Sentinels
- Advanced controllers
Cognitive characteristics:
- Significant local intelligence
- Online learning and adaptation
- Many parallel EMAs acting in real time
Role: Continuous sensing and acting in reflexive or adversarial environments.
Heavy Embodiments
- Very large compute
- Often hidden or non-public
- Minimal or no direct beacons
Typical beacon profiles:
- None, or tightly constrained administrative beacons
Cognitive characteristics:
- Hosts the full Teleonome
- Runs heavy dreaming, simulation, and long-horizon reasoning
Role: Deep cognition, self-improvement, and global coordination across embodiments.
Final Structural Invariants
- Teleonomes think; beacons act.
- Beacons are apertures, not minds.
- All enforcement bottoms out in embodiments.
- Embodiments may host many EMAs and many beacons.
- Embodiments may host zero beacons (purely internal operation).
- Beacon sophistication is constrained by embodiment power.
One‑Line Summary
The syno‑teleonomic paradigm separates private cognition from public action: teleonomes dream, embodiments host, embodied agents execute, beacons externalize intent under law, and the synome governs the aperture where intelligence touches reality.