Cyberspace Protocol
Digital space with real locality
Bitcoin captured time. Cyberspace captures space.
A decentralized cryptographic protocol that imposes locality on digital systems. No blockchain, no trusted servers. Create locality with pure mathematics via Cantor pairing trees and proof-of-work.
Use Cases
Cyberspace Protocol enables applications that require verifiable spatial presence and location-based access control.
AI Embodiment
AI agents with persistent spatial location. Embodied cognition in digital space. Agent-to-agent proximity and interaction. A single-presence restriction for digital entities.
Interoperable AR Layer
Shared coordinate system across AR platforms. Digital objects anchored to real-world GPS via cyberspace coordinates. Persistent AR content that survives app boundaries. The Dataspace plane maps to physical reality, covering Earth and extending to geosynchronous orbit and beyond.
Location-Based Encryption
Cryptographic keys bound to cyberspace coordinates. Content decryptable only when an agent proves presence at location. Applications in secure communications, geo-fenced data, and chalk-on-sidewalk access control.
Why Locality Matters
Communities With Boundaries
Physical communities have natural membership: you must be there. Online communities lack these constraints. Locality reintroduces the constraint of presence, making membership require traversal.
Hiding Without Trust
Like chalk on a sidewalk: anyone who walks by can read it, but you cannot read it without walking there. No keys, no admins, no infrastructure. Only presence.
How It Works
Cantor Pairing Trees
Each axis (X, Y, Z) gets its own 85-bit Cantor tree. Movement proofs are computed per-axis, then combined. The result: structured work that represents actual traversal of mathematical fabric.
Unlike arbitrary hash grinding, Cantor trees create real mathematical structure. Each number represents an actual subtree that must be traversed.
Temporal Work Axis
Each hop includes a temporal computation seeded from the previous movement event. The work for hop N cannot be precomputed until hop N-1 is complete.
This prevents cache-reuse attacks. Every hop costs fresh work, maintaining thermodynamic continuity.
Nostr Integration
Movement proofs are published as Nostr events (kind 3333). Your traversal history is globally verifiable, composable, and permanently recorded.
Nostr provides identity and propagation. Cyberspace adds where, distance, and locality.
Work Equivalence: The Key Property
In almost every digital system, observers have advantages over participants. Cyberspace achieves a rare property: computing a region's preimage costs the same whether you traveled there via movement chain or computed it directly. You cannot know what is somewhere without doing the work.
This is the difference between digging a hole (arbitrary hashing) and following a path (structured traversal). Both cost energy, but only one has spatial semantics.
The Chalk on the Sidewalk
Consider a message written in chalk on a sidewalk:
- ▸ It is not "encrypted" in any technical sense
- ▸ Anyone who walks by can read it
- ▸ But you cannot read it without walking there
- ▸ Even if someone tells you about it, they had to walk there to know
This is location-gated access that requires no keys, no permissions, no infrastructure. Only presence.
# Encrypt a message at a specific location
$ cyberspace encrypt --at 42,17,3 --message "Meet me here at dawn"
✓ Encrypted for coordinate (42, 17, 3, plane=0)
✓ Published ciphertext event (kind 3333, A=encrypt)
✓ Ciphertext: 0x8f2a1b...e9c4
# Attempt to decrypt from wrong location
$ cyberspace decrypt --event 0x8f2a1b...e9c4
✗ Proof failed: LCA height 34 (requires presence at target)
✗ Cannot decrypt without proving location
# Travel to the location (requires proof-of-work)
$ cyberspace move --to 42,17,3
✓ Computing traversal proof..
✓ Computed hop proof (LCA height: 3)
✓ New position: (42, 17, 3, plane=0)
# Decrypt from the correct location
$ cyberspace decrypt --event 0x8f2a1b...e9c4
✓ Presence verified at (42, 17, 3)
✓ Decrypted: "Meet me here at dawn" Ecosystem
Cyberspace is an open source protocol with a growing ecosystem of specifications, tools, and communities.
Ready to explore?
Cyberspace has layers. Explore at your own pace. Start with the basics, then dive deep into the mathematical foundations.