{
  "id": "cipher-version-progression-audit",
  "type": "audit",
  "title": "Audit \u2014 Cipher Version Progression (v7 \u2192 v8 \u2192 v9 \u2192 v11 \u2192 v12)",
  "status": "confirmed",
  "project": "cipher_v12",
  "date_published": "2026-05-12",
  "date_updated": "2026-05-12",
  "tags": [
    "audit",
    "cipher",
    "version-history",
    "v7",
    "v8",
    "v9",
    "v11",
    "v12",
    "no-corrections"
  ],
  "author": "Jonathan Shelton",
  "log_subtype": "cross_version_audit",
  "url": "https://prometheusresearch.tech/research/audits/cipher-version-progression-audit.html",
  "source_markdown_url": "https://prometheusresearch.tech/research/_src/audits/cipher-version-progression-audit.md.txt",
  "json_url": "https://prometheusresearch.tech/api/entries/cipher-version-progression-audit.json",
  "summary_excerpt": "The cipher framework has gone through versions v7 through v12 (with v10 discarded). This audit lays out the version chain on a single 107-element bench so anyone evaluating the cipher knows which version is canonical and what each version contributed.\nCanonical version: v12. Pure terrain, no correct...",
  "frontmatter": {
    "id": "cipher-version-progression-audit",
    "type": "audit",
    "title": "Audit \u2014 Cipher Version Progression (v7 \u2192 v8 \u2192 v9 \u2192 v11 \u2192 v12)",
    "date_published": "2026-05-12",
    "date_updated": "2026-05-12",
    "project": "cipher_v12",
    "status": "confirmed",
    "log_subtype": "cross_version_audit",
    "tags": [
      "audit",
      "cipher",
      "version-history",
      "v7",
      "v8",
      "v9",
      "v11",
      "v12",
      "no-corrections"
    ],
    "author": "Jonathan Shelton",
    "audited_entry": [
      "cipher-v11-complete-self-derivation",
      "cipher-corrections-hurt-accuracy"
    ],
    "see_also": [
      "cipher-v11-complete-self-derivation",
      "cipher-corrections-hurt-accuracy",
      "c-ladder-correction-trail"
    ]
  },
  "body_markdown": "\n## Author notes\n\nThis audit walks the full cipher version chain, scoring each version\non the same 107-element benchmark and documenting *what changed* and\n*what was learned* at each step. The purpose: anyone evaluating the\ncipher's predictive performance needs to understand which version is\nthe canonical one, why previous versions stand or fall, and what the\ndata actually says about which mechanisms were load-bearing.\n\n### Version-by-version scorecard\n\n| Version | Date | Bench score (107 elements) | Median angular err | Key mechanism | Status |\n|---|---|---|---|---|---|\n| v7 | 2026-03-22 | 96.9% property match | \u2014 | Dimensional architecture (2D/3D/4D regimes) | Superseded |\n| v8 | 2026-03-23 | 100% on ductility / conductor / band gap | \u2014 | Lattice resonance at coord/{2,3} | Superseded |\n| v9 | 2026-03-31 | 71.9% exact / 94.8% A+P | 3.2\u00b0 | Eigenvalue susceptibility + snap/tunneling | Superseded |\n| v10 | (experimental, not released) | regression | \u2014 | Spherical-limit correction layer | Discarded |\n| v11 | 2026-04-05 | 71/107 corrected / **98.1% A+P** | **1.0\u00b0** | Bicone + snap + Thomson/Fibonacci hybrid | Superseded |\n| **v12** | 2026-04-30 | **82/107 (perspective 91/107, 0 MISS, 100% A+P)** | clean | Pure terrain, no corrections | **Canonical** |\n\n### Findings\n\n**F1. v9 \u2192 v11 was honest progress.** Each version added a specific\nmechanism (eigenvalue susceptibility, snap-state tunneling, bicone\nsimultaneous derivation) and each improved the score on the same bench.\nThe 98.1% A+P on v11 was a genuine result.\n\n**F2. v10 was the warning shot.** v10 tried to add a spherical-limit\ncorrection layer (the cipher's misses approach spherical limit; correct\nthat and the misses should go away). It regressed to 20.9% exact \u2014\nworse than v8. *Result:* uniform correction layers don't work.\nv10 was never released; v11 went back to per-element progressive\nblending with much better results.\n\n**F3. v12 falsified the corrections approach entirely.** The v11 \u2192 v12\ntransition stripped *all* corrections (eigenvalue layer, snap layer,\nshell-completion logic) and returned to pure terrain. Result:\n**82/107 clean vs v11's 71/107 corrected** on the same bench. Every\ncorrection layer was *hurting* accuracy. See the\n[corrections-hurt-accuracy log](/research/notes/cipher-corrections-hurt-accuracy.html)\nfor the head-to-head numbers.\n\n**F4. v12 perspective view: 91/107 with 0 outright misses.** When v12\nis read with a perspective lens (CN\u22646 \u2192 2D regime, CN\u22657 \u2192 3D regime),\nthe score climbs to 91/107 with **zero outright misses** and 100%\nA+P. This is the framework's best-ever score on the bench.\n\n**F5. The c-ladder correction (Tribonacci replaces Fibonacci/8 for\ndims 4\u20136) is orthogonal to versions.** It changed the c-values for\nd \u2265 4 but didn't affect cipher predictions for crystal structures\n(those live in cycle 1, d \u2264 3). See the\n[c-ladder correction trail audit](/research/audits/c-ladder-correction-trail.html).\n\n**F6. v11's \"complete self-derivation\" claim stands.** v11 was the\nversion that proved the cipher *can* predict every element from Z\nalone with no external data. v12 demonstrates that the *terrain*\ncarries the predictive power, but v11 was the milestone that closed\nthe self-derivation chain. The v11 entry stays preserved as the\nmilestone.\n\n**F7. Historical versions preserved, not deleted.** Every version's\nresults, code, and analysis remain published with `status: superseded`\nwhere appropriate. No silent rewriting. The audit trail is the\nintellectual-honesty record.\n\n### Resolution\n\n- \u2705 Canonical version: **v12** (pure terrain, no corrections, perspective\n  read 91/107).\n- \u2705 Stale versions: v7, v8, v9, v10, v11 \u2014 all tagged superseded with\n  forward pointer to v12.\n- \u2705 Cross-version benchmark data preserved for independent verification.\n- \u23f3 Papers that referenced earlier cipher versions need status notes\n  (Paper 5 done, Papers 1\u20133 pending \u2014 see paper-status entries).\n\n### Discipline lesson\n\nThe v9 \u2192 v10 \u2192 v11 \u2192 v12 trajectory taught the framework's\n**no-corrections** rule: every attempted correction layer reduced\naccuracy. The reason is that corrections impose a *human-set* fix on\ntop of the geometric terrain; the terrain, when allowed to speak for\nitself, is more predictive than terrain-plus-correction. This rule\nnow applies to all future cipher work and to the framework more broadly\n(see [feedback_cipher_no_corrections](/research/) \u2014 the rule is durable).\n\nThe non-obvious part: this is the *opposite* of standard scientific\npractice, where models are improved by adding correction terms.\nHere, every addition *hurt*. The reason it works that way for the\ncipher is that the underlying mechanism is geometric, and the geometry\nis exact \u2014 not approximate. There's nothing to \"correct\" because\nnothing was approximated.\n\n## Summary\n\nThe cipher framework has gone through versions v7 through v12 (with\nv10 discarded). This audit lays out the version chain on a single\n107-element bench so anyone evaluating the cipher knows which version\nis canonical and what each version contributed.\n\n**Canonical version: v12.** Pure terrain, no corrections, scores\n82/107 raw and **91/107 with 0 outright misses** under the perspective\nread (CN\u22646 \u2192 2D, CN\u22657 \u2192 3D). 100% A+P. Best-ever bench score.\n\n**v11 stays preserved** as the milestone that closed the\nself-derivation chain \u2014 proved the cipher *can* predict every element\nfrom Z alone, 98.1% A+P, median 1.0\u00b0 angular error.\n\n**The big finding from the trajectory:** every attempted correction\nlayer (v10 spherical limits, v11 eigenvalue blending, others) *hurt*\naccuracy on the same bench. v12's improvement came from *stripping*\ncorrections, not adding them. This is the opposite of standard\npractice, and it taught the framework's no-corrections discipline.\n\n**Why corrections hurt here:** the underlying mechanism is geometric\nand exact, not approximate. There's nothing to correct because nothing\nwas approximated. Adding a correction layer imposes a human-set fix\non top of an already-exact terrain.\n\n**Status: confirmed.** All historical versions preserved, all\nsuperseded ones tagged. Papers that reference earlier versions get\nstatus notes (Paper 5 done, others pending). The audit trail is the\nrecord.\n",
  "body_html": "<h2>Author notes</h2>\n<p>This audit walks the full cipher version chain, scoring each version on the same 107-element benchmark and documenting *what changed* and *what was learned* at each step. The purpose: anyone evaluating the cipher's predictive performance needs to understand which version is the canonical one, why previous versions stand or fall, and what the data actually says about which mechanisms were load-bearing.</p>\n<h3>Version-by-version scorecard</h3>\n<table class=\"entry-table\">\n<thead><tr>\n<th>Version</th>\n<th>Date</th>\n<th>Bench score (107 elements)</th>\n<th>Median angular err</th>\n<th>Key mechanism</th>\n<th>Status</th>\n</tr></thead>\n<tbody>\n<tr>\n<td>v7</td>\n<td>2026-03-22</td>\n<td>96.9% property match</td>\n<td>\u2014</td>\n<td>Dimensional architecture (2D/3D/4D regimes)</td>\n<td>Superseded</td>\n</tr>\n<tr>\n<td>v8</td>\n<td>2026-03-23</td>\n<td>100% on ductility / conductor / band gap</td>\n<td>\u2014</td>\n<td>Lattice resonance at coord/{2,3}</td>\n<td>Superseded</td>\n</tr>\n<tr>\n<td>v9</td>\n<td>2026-03-31</td>\n<td>71.9% exact / 94.8% A+P</td>\n<td>3.2\u00b0</td>\n<td>Eigenvalue susceptibility + snap/tunneling</td>\n<td>Superseded</td>\n</tr>\n<tr>\n<td>v10</td>\n<td>(experimental, not released)</td>\n<td>regression</td>\n<td>\u2014</td>\n<td>Spherical-limit correction layer</td>\n<td>Discarded</td>\n</tr>\n<tr>\n<td>v11</td>\n<td>2026-04-05</td>\n<td>71/107 corrected / <strong>98.1% A+P</strong></td>\n<td><strong>1.0\u00b0</strong></td>\n<td>Bicone + snap + Thomson/Fibonacci hybrid</td>\n<td>Superseded</td>\n</tr>\n<tr>\n<td><strong>v12</strong></td>\n<td>2026-04-30</td>\n<td><strong>82/107 (perspective 91/107, 0 MISS, 100% A+P)</strong></td>\n<td>clean</td>\n<td>Pure terrain, no corrections</td>\n<td><strong>Canonical</strong></td>\n</tr>\n</tbody></table>\n<h3>Findings</h3>\n<p><strong>F1. v9 \u2192 v11 was honest progress.</strong> Each version added a specific mechanism (eigenvalue susceptibility, snap-state tunneling, bicone simultaneous derivation) and each improved the score on the same bench. The 98.1% A+P on v11 was a genuine result.</p>\n<p><strong>F2. v10 was the warning shot.</strong> v10 tried to add a spherical-limit correction layer (the cipher's misses approach spherical limit; correct that and the misses should go away). It regressed to 20.9% exact \u2014 worse than v8. *Result:* uniform correction layers don't work. v10 was never released; v11 went back to per-element progressive blending with much better results.</p>\n<p><strong>F3. v12 falsified the corrections approach entirely.</strong> The v11 \u2192 v12 transition stripped *all* corrections (eigenvalue layer, snap layer, shell-completion logic) and returned to pure terrain. Result: <strong>82/107 clean vs v11's 71/107 corrected</strong> on the same bench. Every correction layer was *hurting* accuracy. See the <a href=\"/research/notes/cipher-corrections-hurt-accuracy.html\">corrections-hurt-accuracy log</a> for the head-to-head numbers.</p>\n<p><strong>F4. v12 perspective view: 91/107 with 0 outright misses.</strong> When v12 is read with a perspective lens (CN\u22646 \u2192 2D regime, CN\u22657 \u2192 3D regime), the score climbs to 91/107 with <strong>zero outright misses</strong> and 100% A+P. This is the framework's best-ever score on the bench.</p>\n<p><strong>F5. The c-ladder correction (Tribonacci replaces Fibonacci/8 for dims 4\u20136) is orthogonal to versions.</strong> It changed the c-values for d \u2265 4 but didn't affect cipher predictions for crystal structures (those live in cycle 1, d \u2264 3). See the <a href=\"/research/audits/c-ladder-correction-trail.html\">c-ladder correction trail audit</a>.</p>\n<p><strong>F6. v11's \"complete self-derivation\" claim stands.</strong> v11 was the version that proved the cipher *can* predict every element from Z alone with no external data. v12 demonstrates that the *terrain* carries the predictive power, but v11 was the milestone that closed the self-derivation chain. The v11 entry stays preserved as the milestone.</p>\n<p><strong>F7. Historical versions preserved, not deleted.</strong> Every version's results, code, and analysis remain published with <code>status: superseded</code> where appropriate. No silent rewriting. The audit trail is the intellectual-honesty record.</p>\n<h3>Resolution</h3>\n<ul>\n<li>\u2705 Canonical version: <strong>v12</strong> (pure terrain, no corrections, perspective</li>\n<p>read 91/107).</p>\n<li>\u2705 Stale versions: v7, v8, v9, v10, v11 \u2014 all tagged superseded with</li>\n<p>forward pointer to v12.</p>\n<li>\u2705 Cross-version benchmark data preserved for independent verification.</li>\n<li>\u23f3 Papers that referenced earlier cipher versions need status notes</li>\n<p>(Paper 5 done, Papers 1\u20133 pending \u2014 see paper-status entries).</p>\n</ul>\n<h3>Discipline lesson</h3>\n<p>The v9 \u2192 v10 \u2192 v11 \u2192 v12 trajectory taught the framework's <strong>no-corrections</strong> rule: every attempted correction layer reduced accuracy. The reason is that corrections impose a *human-set* fix on top of the geometric terrain; the terrain, when allowed to speak for itself, is more predictive than terrain-plus-correction. This rule now applies to all future cipher work and to the framework more broadly (see <a href=\"/research/\">feedback_cipher_no_corrections</a> \u2014 the rule is durable).</p>\n<p>The non-obvious part: this is the *opposite* of standard scientific practice, where models are improved by adding correction terms. Here, every addition *hurt*. The reason it works that way for the cipher is that the underlying mechanism is geometric, and the geometry is exact \u2014 not approximate. There's nothing to \"correct\" because nothing was approximated.</p>\n<h2>Summary</h2>\n<p>The cipher framework has gone through versions v7 through v12 (with v10 discarded). This audit lays out the version chain on a single 107-element bench so anyone evaluating the cipher knows which version is canonical and what each version contributed.</p>\n<p><strong>Canonical version: v12.</strong> Pure terrain, no corrections, scores 82/107 raw and <strong>91/107 with 0 outright misses</strong> under the perspective read (CN\u22646 \u2192 2D, CN\u22657 \u2192 3D). 100% A+P. Best-ever bench score.</p>\n<p><strong>v11 stays preserved</strong> as the milestone that closed the self-derivation chain \u2014 proved the cipher *can* predict every element from Z alone, 98.1% A+P, median 1.0\u00b0 angular error.</p>\n<p><strong>The big finding from the trajectory:</strong> every attempted correction layer (v10 spherical limits, v11 eigenvalue blending, others) *hurt* accuracy on the same bench. v12's improvement came from *stripping* corrections, not adding them. This is the opposite of standard practice, and it taught the framework's no-corrections discipline.</p>\n<p><strong>Why corrections hurt here:</strong> the underlying mechanism is geometric and exact, not approximate. There's nothing to correct because nothing was approximated. Adding a correction layer imposes a human-set fix on top of an already-exact terrain.</p>\n<p><strong>Status: confirmed.</strong> All historical versions preserved, all superseded ones tagged. Papers that reference earlier versions get status notes (Paper 5 done, others pending). The audit trail is the record.</p>",
  "see_also": [
    "cipher-v11-complete-self-derivation",
    "cipher-corrections-hurt-accuracy",
    "c-ladder-correction-trail"
  ],
  "cited_by": [
    "cipher-v8-lattice-resonance",
    "external-ai-audit-protocol",
    "four-blind-tests-audit",
    "non-euclidean-measurement-discovery",
    "paper-1-status-2026-05",
    "paper-3-status-2026-05",
    "paper-revision-sync-audit",
    "triangle-regression-v12-foundation"
  ],
  "attachments": [],
  "schema_version": "1.0",
  "generated_at": "2026-05-12T03:27:18.533879Z"
}