Web4 Foundation: Coherence

Coherence Index (CI)

Think of CI as a behavioral consistency score — like a credit check that asks not just “who are you?” but “does your behavior make physical sense?”

CI measures four dimensions of consistency: where you are, what you can do, when you act, and who you interact with. One inconsistency drags the whole score down.

↓ Try the coherence simulator below

🎯

The Key Insight

Traditional identity: Trust is binary (logged in = trusted, not logged in = untrusted)

Web4 identity: Trust is modulated by coherence (consistent behavior = full trust, incoherent behavior = trust severely limited)

What does CI feel like day-to-day?

Your normal Tuesday (CI ~0.97)

You wake up, check messages from your usual phone, post a coding tutorial from your desk at 10am. Everything matches your pattern — same device, same location, same hours, same topics. Full trust, normal costs, zero friction. High CI is invisible — it just means the system sees nothing unusual.

Vacation in Tokyo (CI dips to ~0.8 for a day)

You fly abroad. Your spatial pattern changes suddenly — CI dips. Actions cost a bit more ATP and one extra witness may be needed for big transactions. But your temporal and relational patterns stay consistent (same hours, same contacts, same topics), so the dip is mild. After a couple days, your new location stabilizes and CI recovers. It feels like using your credit card in a new country — a brief “is this really you?” moment, then normal service.

Account compromise (CI crashes to ~0.4)

That same account suddenly posts crypto spam at 3am from a different country. Content changed, timing changed, location changed — three dimensions flagged at once. Trust is throttled, extra witnesses required for any action. No human moderator needed. No ban. The system simply asks: “does this behavior make sense?”

The Problem: Identity Isn't Binary

Traditional Web: Binary Trust

  • Compromised credentials = full access - Attacker with stolen password looks identical to real user
  • No behavioral consistency checks - System can't detect impossible travel, capability changes, or temporal anomalies
  • Detection happens too late - Only after damage is done do fraud detection systems trigger

Web4: Coherence-Modulated Trust

  • Continuous coherence verification - Everygrounding (a periodic check-in where the device proves it's still the same device) verifies spatial, temporal, capability, and relational consistency
  • Trust modulation in real-time - Incoherent behavior immediately reduces effective trust, increases costs, and requires more witnesses
  • Attack becomes expensive - Faking coherence across all dimensions simultaneously is computationally and economically prohibitive

The Four Coherence Dimensions

Web4 measures coherence across four independent dimensions. All must be consistent for full trust access.

📍

1. Spatial Coherence

Like noticing someone claims to be in Tokyo and Paris on the same afternoon

Question: Can this device actually be where it claims?

Detects:

  • • Impossible travel (Tokyo → London in 30 min)
  • • Hardware-specific velocity profiles (server = 0 km/h, mobile = 100 km/h)
  • • Sudden location jumps without travel announcements

Mitigations: Travel announcements (+0.4), destination witnesses (+0.3)

2. Capability Coherence

Like a flip phone suddenly running supercomputer-level calculations

Question: Does this device have the capabilities it should?

Detects:

  • • Unexpected capabilities (mobile with GPU cluster)
  • • Capability changes without upgrade events
  • • Hardware class mismatches (IoT sensor with 1TB RAM)

16% penalty per unexpected capability. Sudden changes require documented upgrades.

🕐

3. Temporal Coherence

Like an employee who vanishes for weeks, then suddenly resumes as if nothing happened

Question: Is this device's temporal behavior consistent?

Detects:

  • • Broken continuity chains (missing hash links)
  • • Unusual activity patterns (night activity for day device)
  • • Time gaps without explanation

Continuity tokens link groundings (device check-ins). Broken chain = 0.3 CI penalty.

🔗

4. Relational Coherence

Like a stranger claiming to be best friends with everyone in the room

Question: Are this device's relationships consistent?

Detects:

  • • Claiming relationships with entities never interacted with
  • • Contradictory operational states
  • • Relationship claims without witness validation

Validates grounding against existing interaction history and witnessed relationships.

CI in Action: Two Real Scenarios

Now that you know the four dimensions, watch how they work together to catch threats that traditional security misses.

Scenario 1: Maria's Phone Gets Stolen

Maria lives in Madrid. Her phone is stolen at a café. Within 20 minutes, the thief tries to access Maria's Web4 account from the same city.

Spatial
OK
Same city
Temporal
FAIL
Broken continuity
Relational
FAIL
Wrong behavior patterns
Capability
OK
Same device

Result: Even though the thief has Maria's actual device in the same city, CI drops to 0.55 because temporal continuity is broken (device was powered off briefly) and relational patterns don't match (thief contacts different people, navigates unfamiliar apps). The society restricts access and demands extra verification.

Traditional security would see valid credentials on the correct device in the right city — and grant full access. CI catches what passwords can't.

Scenario 2: The Sophisticated Bot Farm

A bot operator creates 50 accounts, each with unique device fingerprints and realistic-looking profiles. They post content at human-like intervals and vary their writing style. On any single dimension, each account looks plausible.

Spatial
OK
Distributed IPs
Temporal
FAIL
Correlated activity bursts
Capability
OK
Realistic actions
Relational
FAIL
No organic connections

Result: Despite sophisticated evasion, the bots fail on temporal coherence (activity bursts correlate across accounts — real humans don't synchronize) and relational coherence (no genuine relationships formed over time — all connections are shallow and recent). CI drops to 0.41, well below the 0.5 aliveness threshold.

Traditional anti-bot systems catch obvious patterns. CI catches incoherence — the gap between how a real person lives and how a bot pretends to.

Try It: Can You Stay Coherent?

Drag the sliders to simulate incoherent behavior. Watch how even one compromised dimension tanks your effective trust, inflates your ATP costs (ATP is the energy budget that powers every action), and demands extra witnesses. Try a preset scenario, then tweak individual dimensions.

Coherence Dimensions

Spatial (Location plausibility — is your physical location consistent?)1.00
Capability (Hardware plausibility)1.00
Temporal (Activity continuity)1.00
Relational (Relationship history)1.00

Overall Coherence Index (CI)

1.000

All four dimensions must be healthy — one failing dimension pulls your whole score down.

Effective Trust
75%
Base trust (75%) scaled by consistency
✅ Full access
ATP Cost
1.0x
Multiplier: 1 / CI² (capped at 10x)
✅ Normal cost — consistent behavior keeps costs low
Extra Witnesses
+0
Lower CI = more witnesses required
✅ Normal validation

What's Happening?

Device exhibits consistent location patterns, expected capabilities, regular temporal activity, and coherent relationships. Full trust access.

Why One Low Dimension Tanks Everything

🔒

Security by Design

Web4 combines the four coherence dimensions so that one weak dimension drags down the entire score. This is a deliberate security choice:

❌ Simple Average (Insecure)

CI = (0.9 + 0.9 + 0.9 + 0.1) / 4 = 0.7

One dimension at 0.1 gets “averaged out” by the others. Attacker can ignore one dimension and still get decent CI.

✅ Web4's Approach (Secure)

CI = (0.9 × 0.9 × 0.9 × 0.1)^(1/4) = 0.48

One dimension at 0.1 tanks the entire CI. Attacker MUST fake coherence across ALL dimensions simultaneously.

Result: Attacks become exponentially harder. You can't just spoof location OR capabilities OR timing - you must maintain perfect coherence across all dimensions simultaneously, which is computationally and economically prohibitive.

Coherence isn't just for individuals. Groups of entities with dense mutual trust can develop collective coherence — Web4 calls these emergent collectives synthons. More on the Aliveness page.
Why is it called “coherence”?

In physics and biology, “coherence” means the parts of a system are aligned — moving together rather than working against each other. A coherent laser beam stays focused; a coherent heartbeat keeps rhythm; a coherent team pulls in the same direction.

Web4 borrows this idea: an entity with high coherence behaves consistently across space (where they act), time (when they act), capability (what they do), and relationships (who they interact with). When those dimensions align, the entity is trustworthy. When they suddenly misalign — like an account that was in New York and is now in Tokyo two hours later — something is wrong, and CI detects it.

Real-World Applications

🏦

Fraud Detection

Traditional: Reactive fraud detection after damage is done.

Web4: Proactive coherence checking prevents fraud before it happens. Stolen credentials can't bypass spatial, temporal, and relational coherence checks.

Example: Credit card stolen in New York. Thief tries to use it in Tokyo 2 hours later. CI tanks due to impossible travel, transaction blocked or requires massive additional witnesses.

🤖

Bot Detection

Traditional: CAPTCHA, rate limiting, behavior analysis (all gameable).

Web4: Bots struggle to maintain coherence across dimensions. Botnet from same datacenter? Spatial coherence fails. Sudden capability spike? Capability coherence fails.

Example: 1000 "users" all claiming to be mobile devices but with identical capability fingerprints and sequential IP addresses. CI drops to near-zero, society access denied.

🔐

Account Takeover

Traditional: Password reset = full access. Attacker indistinguishable from real user.

Web4: Even with valid credentials, attacker's device has broken temporal continuity (new device), different capabilities, and no relational history. CI flags this immediately.

Example: Phished password used from new device in different country. Temporal + spatial + relational coherence all fail. Society requires 6 additional witnesses or blocks access entirely.

⚖️

Fake Identity Resistance

Traditional: One person creates many identities, hard to detect.

Web4: Each presence requires coherence across dimensions. Creating 100 fake presences means maintaining spatial, temporal, capability, and relational coherence for all 100 simultaneously - prohibitively expensive.

Example: Fake-presence attack on a voting system. Attacker creates 50 presences from same device. Capability + spatial coherence fails for 49 of them (all same location, same hardware fingerprint). CI drops below the trust threshold (0.5), identities rejected.

Integration with Web4 Foundations

Coherence Index works in concert with the other three Web4 foundational pillars:

🔐

CI + Identity Constellations (LCT)

How they work together: Each device in your identity constellation maintains its own CI. More devices with high CI = stronger overall identity trust.

Example: You have 3 devices (phone, laptop, FIDO2 key). If phone's CI drops (stolen and used from different location), other devices' high CI keeps your constellation intact. Stolen device's low CI prevents full access.

Learn more about identity constellations →

CI + ATP Economics

How they work together: ATP is the energy budget every agent has — every action costs some. Low CI increases those costs (up to 10x). This makes incoherent behavior economically expensive, not just trust-limited.

Example: An attacker with stolen credentials (CI = 0.4) pays 6.25x more energy for every action. Their budget drains rapidly, making the attack unsustainable before it can do real damage.

Learn more about ATP economics →
🎯

CI + Trust Tensors (T3)

How they work together: CI modulates effective trust. T3 = long-term reputation. CI = current consistency. Effective trust = T3 × CI².

Example: You have high T3 (0.9 across all dimensions from years of good behavior). Suddenly you ground from impossible location (CI = 0.3). Effective trust drops to 0.9 × 0.3² = 0.081 (8%). Your reputation is intact, but current access is severely limited until coherence recovers.

Learn more about trust tensors →
Technical Implementation

Where CI Lives in Web4

1. Grounding Events

Every time a device grounds (proves presence), Web4 calculates CI across all four dimensions. This happens continuously, not just at "login."

// Pseudocode: how a grounding check works grounding_event = { lct_id: device_lct, // which device timestamp: now, // when location: gps_coords, // where capabilities: hardware_fingerprint, continuity_token: hash(previous_grounding), context: [recent_interactions] // who you've interacted with } ci = calculate_coherence(grounding_event, mrh_history) effective_trust = base_trust * ci^2 atp_cost_multiplier = 1 / ci^2

2. Society Policies

Each society configures CI thresholds and modulation curves. Strict societies require higher CI, lenient societies are more forgiving.

// Society configuration strict_society = { min_ci_for_access: 0.8, trust_modulation_exponent: 3, // ci^3 = steeper penalty atp_cost_exponent: 2.5, witness_scaling_factor: 15 } lenient_society = { min_ci_for_access: 0.5, trust_modulation_exponent: 1.5, // ci^1.5 = gentler penalty atp_cost_exponent: 1.8, witness_scaling_factor: 5 }

3. Reference Implementation

Web4's reference implementation (Python) is available in the Web4 repository:

  • coherence.py (560 lines) - CI calculation across 4 dimensions
  • trust_tensors.py (330 lines) - CI modulation functions
  • test_coherence.py (337 lines) - 16 comprehensive tests
  • test_trust_tensors.py (280 lines) - 20 modulation tests
View implementation on GitHub →

Key Takeaways

1. Trust Isn't Binary

Web4 treats trust as a continuous function modulated by real-time coherence, not a binary logged-in/logged-out state. This makes attacks exponentially harder.

2. Four Dimensions, One Weak Link

The scoring ensures that one low dimension tanks everything. Attackers must fake coherence across spatial, temporal, capability, AND relational dimensions simultaneously — prohibitively expensive.

3. Grounded in Real-World Patterns

CI isn't arbitrary — it's designed so that faking consistent behavior is always more expensive than genuinely having it. The design draws from how consistency works in biology and social systems.

4. Economic + Reputational Penalty

Low CI doesn't just limit trust — it increases ATP costs (up to 10x) and witness requirements (up to +8). Incoherent behavior becomes economically unsustainable.

Why so harsh? Mild penalties (2x) would barely slow an attacker with stolen credentials. The 1/CI² formula means penalties escalate sharply only when coherence drops below ~0.5 — normal users with occasional inconsistencies (CI 0.8) pay just 1.6x, while a stolen account (CI 0.3) pays 11x. The severity is targeted at the threat, not at regular users.

5. Continuous, Not Discrete

CI is calculated at every grounding event (not just "login"), and modulates trust in real-time. Coherent behavior = full access. Incoherent behavior = immediate limitation.

Common Questions

How is CI actually calculated? Who feeds in the data?+

CI is computed automatically from your behavior — no one “rates” you. Every time you perform an action in Web4 (post content, complete a task, interact with someone), the system updates your four coherence dimensions based on how that action compares to your established patterns.

Spatial = location plausibility. Is your physical location consistent with where you were recently? Impossible travel (New York at noon, Tokyo at 2pm) is a red flag. Normal travel is fine — a 14-hour flight causes a brief dip, then CI recovers. (VPNs and IP addresses don't affect it — spatial CI uses hardware-attested location.)

Capability = hardware plausibility. Can your device actually perform the actions being claimed? (Prevents credential theft — a stolen key on an unfamiliar device shows capability gaps.)

Temporal = activity continuity. Do you have stable patterns over time? (A sudden burst of 200 actions at 3am when you normally act during business hours flags a temporal anomaly.)

Relational = relationship history. Do you interact with your established network, or did you suddenly start transacting with 50 strangers?

The formula is the geometric mean (fourth root of the product) of all four dimensions. This means one bad dimension drags down the whole score — you can't compensate for suspicious spatial behavior by being temporally consistent.

What about major life changes — career switch, illness, moving countries?+

CI is designed around the idea that gradual, genuine changes look different from suspicious ones. The key distinction is whether changes happen at human speed or impossible speed.

Career switch: You start posting about a new field instead of your old one. Capability CI might dip briefly (new tools, unfamiliar tasks), but spatial and temporal stay stable. Your relational CI shifts as you build new professional connections. Recovery: days to weeks, because the change is gradual and authentic.

Illness/recovery: Extended inactivity causes temporal CI to drift (your patterns changed), but everything else stays intact. When you return, temporal recovers as your new rhythm stabilizes. The system doesn't penalize absence — it just needs a few days to re-learn your patterns.

Moving countries: Spatial CI dips during the move (like the vacation scenario), then recovers once your new location stabilizes. Other dimensions are unaffected unless your entire social network and activity patterns also change simultaneously — which would be unusual even for a real move.

The core principle: real life changes affect one or two dimensions at a time. An attacker taking over your account affects all four at once — different device, different location, different timing, different contacts. That's what CI is actually designed to catch. Genuine life transitions look nothing like account compromise.

Does “spatial” mean location? Will traveling hurt my CI?+

Yes, spatial coherence involves physical location — specifically, whether your current location is plausible given where you were recently. It detects impossible travel (New York at noon, Tokyo at 2pm) and flags sudden location jumps.

Normal travel is fine. If you fly from New York to Tokyo over 14 hours, your spatial CI dips briefly (like a credit card's “unusual activity” check) then recovers within a day or two as your new location stabilizes. The system expects humans to move around — it's looking for physically impossible movement, not ordinary travel.

VPNs and IP addresses don't affect spatial CI — it relies on hardware-attested location from your device's secure element, not network addresses. Switching Wi-Fi networks changes nothing.

Explore More

Groups Can Be Coherent Too

Everything on this page applies to individuals — but coherence also emerges at the group level. When several entities interact frequently with dense mutual trust, their collective behavior can become coherent as a unit. Web4 calls these emergent groups synthons.

You'll see how this works on the next page: Aliveness explores how coherence, trust, and energy determine whether an entity — individual or group — is considered "alive" in Web4.

Try It Hands-On
All concept-tool bridges →
Trust TensorSociety SimCoherence
Glossary