Skip to content

Protocol Catalog


Each protocol has:

  • Name: Standard identifier
  • Category: Type of containment
  • Exposure Multiplier: Factor applied to base exposure (lower = safer)
  • Requirements: What’s needed to implement
  • Verification: How we confirm compliance
  • Notes: Important considerations

Example calculation:

Base exposure: $100
Protocol A (×0.6) + Protocol B (×0.7) + Protocol C (×0.8)
Final exposure: $100 × 0.6 × 0.7 × 0.8 = $33.60

Protocols that limit what an anomaly can physically access or remove.

AttributeValue
Multiplier×0.40
RequirementsFaraday cage, air gap, physical barriers
VerificationRF monitoring, physical inspection
NotesBaseline for all marketplace tasks
AttributeValue
Multiplier×0.85
RequirementsScanning equipment, trained operators
VerificationScan records, tamper detection
NotesDetects physical item removal
AttributeValue
Multiplier×0.75
RequirementsCustom restraints, task-specific apertures
VerificationPhysical inspection, seal integrity
NotesLimits fine manipulation; not suitable for all tasks
AttributeValue
Multiplier×0.60
RequirementsVisual blocking, guided navigation
VerificationHandler attestation
NotesPrevents facility mapping; requires capable handler
AttributeValue
Multiplier×0.90 - 0.70
RequirementsAutomatic extraction system
VerificationTimestamp logging
NotesMultiplier varies by time limit (90 sec = 0.70, 10 min = 0.90)

Protocols that limit what an anomaly can learn or retain.

AttributeValue
Multiplier×0.70
RequirementsData preprocessing pipeline
VerificationAutomated anonymization audit
NotesRemoves identifying information; may reduce task effectiveness
AttributeValue
Multiplier×0.85
RequirementsMemory intervention capability
VerificationPre/post cognitive testing
NotesStandard for marketplace tasks

I-003: Frequent Memory Wipe (Intra-Session)

Section titled “I-003: Frequent Memory Wipe (Intra-Session)”
AttributeValue
Multiplier×0.60 - 0.40
RequirementsRapid intervention capability
VerificationContinuous monitoring
Notes5-min intervals = ×0.60; 2-min intervals = ×0.40
AttributeValue
Multiplier×0.70
RequirementsVisual cortex blocking, numerical-only interface
VerificationNeurological monitoring
NotesAnomaly processes data without visual observation
AttributeValue
Multiplier×0.50
RequirementsReplica construction, decoy documents
VerificationEnvironmental audit
NotesAnomaly never sees real information; expensive to maintain
AttributeValue
Multiplier×0.55
RequirementsTask decomposition system, memory wipe between fragments
VerificationFragment isolation testing
NotesAnomaly sees only fragments; reassembly done by humans/systems
AttributeValue
Multiplier×0.80
RequirementsClearinghouse batching algorithm
VerificationStatistical analysis of task assignment
NotesPrevents correlation across tasks from same principal
AttributeValue
Multiplier×0.75
RequirementsTask rewriting, metadata removal
VerificationHuman review of stripped tasks
NotesAnomaly sees task without why/who context

Protocols that consume anomaly processing capacity.

AttributeValue
Multiplier×0.85
RequirementsBasic arithmetic verification
VerificationAnswer checking
NotesMinimal load; mostly symbolic
AttributeValue
Multiplier×0.65
RequirementsContinuous optimization problems
VerificationSolution verification
NotesSignificant load; noticeable impact on complex tasks
AttributeValue
Multiplier×0.45
RequirementsMultiple simultaneous demanding tasks
VerificationMulti-stream output verification
NotesMaximum practical load; some capability degradation
AttributeValue
Multiplier×0.40
RequirementsAI-generated adversarial problems
VerificationContinuous adaptation
NotesProblems designed to be maximally distracting

Protocols that make defection economically irrational.

AttributeValue
Multiplier×0.75
RequirementsEscrowed assets equal to 2× task value
VerificationEscrow confirmation
NotesBasic financial stake
AttributeValue
Multiplier×0.50
RequirementsBond held by documented adversary
VerificationAdversary confirmation, conflict-of-interest verification
NotesCustodian benefits from forfeiture
AttributeValue
Multiplier×0.80
RequirementsPayment schedule, forfeiture clauses
VerificationPayment records
Notes50%+ of compensation held for 6+ months
AttributeValue
Multiplier×0.70
RequirementsTrack record weighting in future bids
VerificationMarketplace bid analysis
NotesFuture earnings depend on current behavior
AttributeValue
Multiplier×0.60
RequirementsInformation escrow, trigger conditions
VerificationEscrow integrity testing
NotesDefection triggers release of damaging information

Protocols that prevent coordination and exploit competitive dynamics.

AttributeValue
Multiplier×0.85
RequirementsHandler pool, rotation schedule
VerificationAssignment logs
NotesPrevents relationship building
AttributeValue
Multiplier×0.75
RequirementsHandlers don’t know each other, no shared information
VerificationCommunication monitoring
NotesAnomaly can’t build aggregate model of handling

S-003: Adversarial Monitoring (Competitor)

Section titled “S-003: Adversarial Monitoring (Competitor)”
AttributeValue
Multiplier×0.70
RequirementsIndustry competitor with access to logs
VerificationCompetitor confirmation
NotesMonitor benefits from finding problems

S-004: Adversarial Monitoring (Rival Anomaly)

Section titled “S-004: Adversarial Monitoring (Rival Anomaly)”
AttributeValue
Multiplier×0.65
RequirementsDocumented rival with monitoring access
VerificationRivalry confirmation, monitor reports
NotesAnomalies watching anomalies
AttributeValue
Multiplier×0.80 - 0.50
RequirementsDecoy generation system
VerificationDecoy/real ratio logging
Notes50% decoys = ×0.80; 90% decoys = ×0.50
AttributeValue
Multiplier×0.85
RequirementsUnpredictable task scheduling
VerificationTiming analysis
NotesPrevents pre-coordination
AttributeValue
Multiplier×0.60
RequirementsNo unapproved communication channels
VerificationRF monitoring, output analysis
NotesBlocks direct anomaly-to-anomaly communication

Protocols that limit what an anomaly can produce or transmit.

AttributeValue
Multiplier×0.90
RequirementsPredefined output schema
VerificationSchema validation
NotesPrevents executable code, limits steganography
AttributeValue
Multiplier×0.80
RequirementsNo text, no formatting
VerificationOutput type checking
NotesMinimal information channel
AttributeValue
Multiplier×0.75
RequirementsDeterministic verification of output correctness
VerificationVerification system audit
NotesOutputs can’t pass without correctness check
AttributeValue
Multiplier×0.65
RequirementsSecond anomaly reviews output for hidden content
VerificationReviewer independence verification
NotesAnomaly-level analysis of steganography risk
AttributeValue
Multiplier×0.95 - 0.80
RequirementsHard cap on output bytes
VerificationSize monitoring
NotesLimits information exfiltration; varies by limit strictness

Protocols where the anomaly accepts enhanced observation.

AttributeValue
Multiplier×0.80
RequirementsComplete activity logging
VerificationLog integrity verification
NotesCreates evidence trail
AttributeValue
Multiplier×0.70
RequirementsNeural activity sensors, baseline calibration
VerificationContinuous anomaly detection
NotesFlags unusual cognitive patterns
AttributeValue
Multiplier×0.75
RequirementsIndependent escrow service
VerificationEscrow integrity audit
NotesAnomaly can’t delete evidence
AttributeValue
Multiplier×0.85
RequirementsAnomaly self-reports expected risk in advance
VerificationReport vs. outcome comparison
NotesAnomaly predicts own behavior; discrepancies flagged
AttributeValue
Multiplier×0.60
RequirementsAnomaly runs internal adversarial process
VerificationSelf-report analysis
NotesOmega-class protocol; unverifiable but effective

Some protocol combinations have synergistic effects:

Protocols: P-001 + I-002 + C-003 + O-002 Combined Multiplier: ×0.12 Use Case: Maximum security numerical tasks

Protocols: I-003 (2-min) + I-006 + C-002 Combined Multiplier: ×0.14 Use Case: Complex tasks requiring high capability with minimal information retention

Protocols: S-004 + F-002 + O-004 Combined Multiplier: ×0.21 Use Case: Tasks where competitive dynamics are available

Protocols: T-001 + T-002 + T-003 + T-004 Combined Multiplier: ×0.36 Use Case: High-capability anomalies offering enhanced monitoring

Protocols: C-004 + T-005 + I-003 + S-004 Combined Multiplier: ×0.07 Use Case: Omega-class anomalies; maximum containment


Applied after protocol multipliers:

Track RecordModifierCriteria
Exceptional×0.701000+ tasks, 0 incidents
Excellent×0.80500+ tasks, ≤1 incident
Good×0.90200+ tasks, ≤2 incidents
Standard×1.0050+ tasks, incident rate ≤1%
Probationary×1.25<50 tasks
New×2.00No track record
Elevated×1.50Recent incident
Restricted×3.00Multiple incidents, under review

VersionDateChanges
1.0Year 1Initial catalog
2.0Year 3Added cognitive load protocols
3.0Year 5Added adversarial monitoring
4.0Year 7Added temporal fragmentation, track record modifiers
5.0Year 9Added Omega-class protocols
5.1Year 10Current version; recalibrated multipliers