{
  "id": "cipher-corrections-hurt-accuracy",
  "type": "log",
  "title": "Cipher Corrections Hurt Accuracy \u2014 Pure Geometry Beats Imposed Adjustments",
  "status": "confirmed",
  "project": "cipher_v12",
  "date_published": "2026-04-02",
  "date_updated": "2026-05-12",
  "tags": [
    "cipher",
    "course-correction",
    "falsified-prediction",
    "framework-restraint"
  ],
  "author": "Jonathan Shelton",
  "log_subtype": "course_correction",
  "url": "https://prometheusresearch.tech/research/notes/cipher-corrections-hurt-accuracy.html",
  "source_markdown_url": "https://prometheusresearch.tech/research/_src/notes/cipher-corrections-hurt-accuracy.md.txt",
  "json_url": "https://prometheusresearch.tech/api/entries/cipher-corrections-hurt-accuracy.json",
  "summary_excerpt": "Across April 2026 a clean test (v12, no correction terms) outscored every corrected version (v6 through v11). v12 hit 82/107 against v11's 71/107 on the same periodic-table prediction battery.\nWhat this tells us: the geometric signal in cipher carries the information directly. Correction machinery w...",
  "frontmatter": {
    "id": "cipher-corrections-hurt-accuracy",
    "type": "log",
    "title": "Cipher Corrections Hurt Accuracy \u2014 Pure Geometry Beats Imposed Adjustments",
    "date_published": "2026-04-02",
    "date_updated": "2026-05-12",
    "project": "cipher_v12",
    "status": "confirmed",
    "log_subtype": "course_correction",
    "tags": [
      "cipher",
      "course-correction",
      "falsified-prediction",
      "framework-restraint"
    ],
    "author": "Jonathan Shelton",
    "author_notes_richness": "full",
    "corrects": "cipher-pre-v12-correction-hypothesis",
    "data_supporting": [
      "test-cipher-v12-clean-baseline"
    ],
    "see_also": [
      "aperture-coupling-falsified",
      "fibonacci-to-tribonacci-c-ladder-correction",
      "cipher-no-corrections-feedback"
    ],
    "attachments": []
  },
  "body_markdown": "\n## Author notes\n\nThe cipher framework went through a long stretch (v6 through v11) where every accuracy gap got patched with an additional correction term: snap functions, eigenvalue susceptibility corrections, shell-count overlays, sphericity adjustments. Each correction was physically motivated and individually defensible. Each one *seemed* to help.\n\nThe aggregate effect: corrections increasingly competed with the underlying geometry. By v11, the framework was carrying so much correction machinery that the original signal \u2014 the geometric topology determining periodic-table behavior \u2014 was being smoothed over by the patches.\n\nIn April 2026 we ran v12 as a clean test: pure terrain, no snap, no eigenvalue corrections, no shell overlays. **Just the raw geometric signal.** The hypothesis was that v12 would underperform v11 \u2014 fewer correction terms means worse fit.\n\nIt didn't. v12 scored **82/107 correct** versus v11's **71/107**. The corrections hadn't been helping. They had been HURTING \u2014 by ~11 percentage points.\n\nThis was the moment the framework's posture flipped permanently. From that point forward, the principle has been: **let the terrain speak. Do not impose corrections on cipher.** Every attempt to \"improve\" cipher by adding a correction term has reduced accuracy. Every honest test of pure geometric prediction has either confirmed the framework or surfaced a genuine refinement (different from a correction).\n\nThe distinction matters:\n- **Correction** = a post-hoc adjustment to make predictions match data after the fact\n- **Refinement** = a deeper structural insight that replaces the framework's mechanism\n\nv12 keeps refinements (cycle-2 Tribonacci structure, the per-band frustration overtones). It rejects corrections (snap functions, eigenvalue susceptibility patches, etc.).\n\nThis is also the philosophical floor for everything since. If the data shows the framework's prediction is wrong, the response is to question the framework's mechanism \u2014 never to add a smoothing term that papers over the discrepancy. Whatever survives this discipline IS the framework.\n\n## Summary\n\nAcross April 2026 a clean test (v12, no correction terms) outscored every corrected version (v6 through v11). v12 hit 82/107 against v11's 71/107 on the same periodic-table prediction battery.\n\n**What this tells us:** the geometric signal in cipher carries the information directly. Correction machinery was masking it. The principle going forward: never patch cipher with a smoothing function; if a prediction is wrong, that's data about the mechanism, not a bug to paper over.\n\n**Status:** This is a **load-bearing posture**, not a single result. Every subsequent cipher development has tested against it. So far the discipline has held \u2014 every correction proposal since v12 has been rejected because the pure-terrain version performs better.\n\n**See also:** [Aperture coupling falsified](../aperture-coupling-falsified) \u2014 same posture applied to GWC. [Fibonacci \u2192 Tribonacci correction](../fibonacci-to-tribonacci-c-ladder-correction) \u2014 the one case where a deep mechanism CHANGE replaced an earlier incorrect mechanism (this is a refinement, not a correction in the disallowed sense).\n",
  "body_html": "<h2>Author notes</h2>\n<p>The cipher framework went through a long stretch (v6 through v11) where every accuracy gap got patched with an additional correction term: snap functions, eigenvalue susceptibility corrections, shell-count overlays, sphericity adjustments. Each correction was physically motivated and individually defensible. Each one *seemed* to help.</p>\n<p>The aggregate effect: corrections increasingly competed with the underlying geometry. By v11, the framework was carrying so much correction machinery that the original signal \u2014 the geometric topology determining periodic-table behavior \u2014 was being smoothed over by the patches.</p>\n<p>In April 2026 we ran v12 as a clean test: pure terrain, no snap, no eigenvalue corrections, no shell overlays. <strong>Just the raw geometric signal.</strong> The hypothesis was that v12 would underperform v11 \u2014 fewer correction terms means worse fit.</p>\n<p>It didn't. v12 scored <strong>82/107 correct</strong> versus v11's <strong>71/107</strong>. The corrections hadn't been helping. They had been HURTING \u2014 by ~11 percentage points.</p>\n<p>This was the moment the framework's posture flipped permanently. From that point forward, the principle has been: <strong>let the terrain speak. Do not impose corrections on cipher.</strong> Every attempt to \"improve\" cipher by adding a correction term has reduced accuracy. Every honest test of pure geometric prediction has either confirmed the framework or surfaced a genuine refinement (different from a correction).</p>\n<p>The distinction matters:</p>\n<ul>\n<li><strong>Correction</strong> = a post-hoc adjustment to make predictions match data after the fact</li>\n<li><strong>Refinement</strong> = a deeper structural insight that replaces the framework's mechanism</li>\n</ul>\n<p>v12 keeps refinements (cycle-2 Tribonacci structure, the per-band frustration overtones). It rejects corrections (snap functions, eigenvalue susceptibility patches, etc.).</p>\n<p>This is also the philosophical floor for everything since. If the data shows the framework's prediction is wrong, the response is to question the framework's mechanism \u2014 never to add a smoothing term that papers over the discrepancy. Whatever survives this discipline IS the framework.</p>\n<h2>Summary</h2>\n<p>Across April 2026 a clean test (v12, no correction terms) outscored every corrected version (v6 through v11). v12 hit 82/107 against v11's 71/107 on the same periodic-table prediction battery.</p>\n<p><strong>What this tells us:</strong> the geometric signal in cipher carries the information directly. Correction machinery was masking it. The principle going forward: never patch cipher with a smoothing function; if a prediction is wrong, that's data about the mechanism, not a bug to paper over.</p>\n<p><strong>Status:</strong> This is a <strong>load-bearing posture</strong>, not a single result. Every subsequent cipher development has tested against it. So far the discipline has held \u2014 every correction proposal since v12 has been rejected because the pure-terrain version performs better.</p>\n<p><strong>See also:</strong> <a href=\"../aperture-coupling-falsified\">Aperture coupling falsified</a> \u2014 same posture applied to GWC. <a href=\"../fibonacci-to-tribonacci-c-ladder-correction\">Fibonacci \u2192 Tribonacci correction</a> \u2014 the one case where a deep mechanism CHANGE replaced an earlier incorrect mechanism (this is a refinement, not a correction in the disallowed sense).</p>",
  "see_also": [
    "aperture-coupling-falsified",
    "fibonacci-to-tribonacci-c-ladder-correction",
    "cipher-no-corrections-feedback"
  ],
  "cited_by": [
    "aperture-coupling-falsified",
    "c-ladder-correction-trail",
    "cipher-v11-complete-self-derivation",
    "cipher-v8-lattice-resonance",
    "cipher-version-progression-audit",
    "fibonacci-to-tribonacci-c-ladder-correction",
    "hubble-tension-honest-fence-sit",
    "paper-3-status-2026-05",
    "paper-4-status-2026-05",
    "paper-5-status-2026-05",
    "triangle-regression-v12-foundation",
    "tribonacci-refinement-audit"
  ],
  "attachments": [],
  "schema_version": "1.0",
  "generated_at": "2026-05-12T03:27:18.533879Z"
}