Skip to content
Formal Philosophy
Menu

Tutorials

Each tutorial starts with a concrete picture, then tightens into a precise model that tools can manipulate.

Concrete first Formal accuracy Tool-shaped thinking

Tutorial 1: Approximate state tracking

Start inside a card counter’s head, then zoom out into state machines, abstraction, counterexamples, CEGIS, and the boundaries between heuristics and proofs.

Tutorial 2: Isomorphism

A 1-to-1, structure-preserving translation: why some “different abstractions” are the same thing in different clothes, and how to move problems into better toolchains.

Tutorial 3: Tau Language

Learn to read and write small executable specifications by listing invariants first, then letting a solver produce behaviors that satisfy them.

Tutorial 4: World models and continuous learning

Why internal models are more than prediction, why test-time learning is powerful, and why invariants and counterexamples become essential when the model can drift.

Tutorial 5: Reformulation and compression

How changing representations creates leverage, why abstraction rhymes with compression, and how neuro-symbolic gates turn model proposals into checkable evidence.

Tutorial 6: MPRD and the Algorithmic CEO

The neuro-symbolic gate from Tutorial 5 turned into production architecture. Models propose, rules decide, and counterexamples drive refinement.

Tutorial 7: What makes a good software engineer, and what clean code means

A user-centered framework for the agentic era: provenance-agnostic quality, diamond-rule engineering, and best-practice rails for safe, maintainable systems.

Tutorial 8: Predictive reading, scrambling, invariants, and proof

Build an interactive scrambler app, verify logic invariants, and separate formal proof from empirical proof-by-witness about human predictive reading.

Tutorial 9: Prompt engineering and precision communication

Reduce ambiguity by making structure explicit. Compare bad and good prompts, connect reformulation to state explosion, and try a small transpiler demo that turns controlled language into specs.

Tutorial 10: Reasoning, logic, and prediction

What reasoning is, why statistical learning cannot in principle produce logical validity, and why even approximate logic from a neural network cannot match a dedicated solver.

Tutorial 11: Attacking hard problems with Church's synthesis problem

Define Church synthesis precisely, trace what is decidable, then use a decomposition-plus-invariants workflow to run systematic, falsifiable attempts against the complexity wall.

Tutorial 12: Why current LLMs are not yet AGI

A scoped argument for the conceptual gap: strong language-pattern modeling is not yet the same as stable meaning creation, concept invention, or meaning-preserving formalization.

Tutorial 13: What reasoning is

Separate guessing, search, explanation, and proof using a child arithmetic example, Peano arithmetic, and the difference between discovery and justification.

Tutorial 14: Microkernels and micro-models

Use seL4 as a case study for shrinking the trusted core, proving small local contracts, and widening assurance through checked composition rather than monolithic proof blobs.

Tutorial 15: Exhaustive search and path integrals

Compare proof by exhaustive search with sum-over-histories, then extend the analogy to action, weighted futures, and the boundary between interference and intelligent planning.

Tutorial 16: Presburger arithmetic, the decidable island

Build Presburger arithmetic from zero and successor, read its formulas, understand why excluding multiplication makes every question decidable, and see how this fragment powers real verification tools.

Tutorial 17: Software shapes and ZenoDEX

Start from arcade, ATM, and vending-machine intuition, then compress those shared shapes into states and invariants before climbing into ZenoDEX, formal tools, and parameter synthesis.

Tutorial 18: ZenoDEX shape transition

Compare the old ZenoDEX shape with the achieved audited-domain Shape++, then track how exact formulas, proof-carrying boundaries, and chaos-engineering probes make disaster states unreachable.

Tutorial 19: Resolution, refutation, and falsification

Put logical refutation and Popperian falsification side by side, then separate proof in a closed formal world from corroboration in an open empirical world using explicit formulas.

Tutorial 20: Neuro-symbolic reasoning and witness spaces

Treat LLMs as existential engines and symbolic methods as universal verifiers, then map proof search, counterexample search, synthesis, experiment design, and coverage limits in one formula family.

Tutorial 21: A perceptron in Tau Language

Build a perceptron from formulas, execute bounded classifier specs in Tau, inspect real traces, and then separate the replayable classifier lane from a host-side learning loop.

Tutorial 22: Medical deciders, MPRD, and Tau

Map bounded medical workflows into the MPRD shape, then use educational Tau policies to separate model proposals from execution authority through fail-closed guideline gates and human escalation paths.

Tutorial 23: Decidable medical machines, from formulas to Tau

Start with a calorie calculator and a kidney follow-up workflow, then view each one as math, logic, a decision tree, a finite-state machine, ordinary code, and a downloadable Tau spec.

Tutorial 24: Consciousness, computationalism, and Rice's theorem

Make one controversial argument precise: if consciousness is a nontrivial semantic property of computation, then no general Turing-machine detector can decide it from arbitrary encodings of programs.

Tutorial 25: Quantifier factoring and neuro-symbolic loop engineering

Start from "LLM = existential engine, formal tool = universal verifier", then push downward into counterexample search, certificate compression, quantified games, quotients, and fixed-point reasoning.

Tutorial 26: Galois loops and obligation carving

Reframe CEGIS through a Galois and FCA lens, prove the bounded obligation-side policy-improvement loop, show its measured power on finite relation universes, and sharpen the next frontier into controller compression.

Tutorial 27: Verifier-compiler loops

Start from plain CEGIS, then ask when verifier behavior itself can be compressed into a reusable symbolic controller for routing, ranking, and fail-closed pre-screening without replacing the exact gate.

Tutorial 28: Profit agents, post-AGI economics, and mechanism design

Study bounded toy economies for profit agents under explicit assumptions, then climb from platform incentives and demand closure to routing, trust, assurance, and mechanism design.

Tutorial 29: Loop-space geometry

Factor neuro-symbolic loops into witness languages, quotients, separator policies, label bases, and compiled artifacts, then study why some loops are structurally stronger than others.

Tutorial 30: Counterexample-guided requirements discovery

Recover missing requirements from witness structure, observation quotients, and minimal separator policies instead of treating stakeholder follow-up as one undifferentiated escape hatch.

Tutorial 31: Hybrid geometry-changing loops

Compare direct control with loops that reshape ambiguity geometry first, then compile or control only the residue that remains.

Tutorial 32: Temporal label functions and staged bases

A focused lesson on temporal label functions: why a richer basis can be strictly finer on the whole family, yet become exact only after the right first carve.

Tutorial 33: Formal neural networks

What would it take for a neural network to count as a computer in a strong sense, and what routes could get there?

Tutorial 34: Neuro-symbolic DeFi defense

Use the USD 285M Drift Protocol exploit as a case study for compositional disaster-state analysis, then build the neuro-symbolic defense loop that catches multi-vector attacks before deployment and at runtime.

Tutorial 35: Concolic testing and branch exploration

Learn branch exploration as witness search: concrete execution gives one real path, symbolic path constraints steer the next run, and the modern practical story is hybrid.

Tutorial 36: Grammar-based fuzzing and structured search

Learn structured witness search over grammars, see why syntax preservation reallocates budget into semantic execution, and understand where concolic escalation and neural proposal do and do not belong.

Tutorial 37: The countable Cantor algebra and its completion

Learn why the clopen algebra of Cantor space is the unique countable atomless Boolean algebra, what its completion adds, and why classical completion is not yet an executable runtime story.

Tutorial 38: TABA, formula by formula

Learn the Boolean-algebra machinery behind TABA, read the quantifier-elimination and guarded-successor formulas step by step, and see which future extensions are plausible from the current literature.

Tutorial 39: Safe infinite-recursive tables in Tau Language

Study the safe table fragment for Tau, including pointwise revision, fixed-point semantics, runnable demos, and the boundary between this prototype and full TABA tables.

Tutorial 40: Optimizing Tau Language, Part I

Learn why Tau qelim optimization is a fragment-dispatch problem, read the compiled-forgetting formulas exactly, and see how guarded BDD and CNF-native routes can speed up scoped formulas.

Tutorial 41: Temporal Tau, Part I

Learn how bounded LTL-style operators fit Tau, why finite-horizon temporal formulas are decidable on finite carriers, and how this creates a new optimizer layer.

Tutorial 42: Optimizing Tau Language, Part II

Learn how certificate-carrying optimizers let Tau search for aggressive rewrites while accepting only the candidates whose certificates pass a trusted checker.

Tutorial 43: Optimizing Tau Language, Part III

Learn how a feature-flagged Tau diagnostic detects blowup risk before solving, why unused-variable compression is the first exponent to measure, and how route prediction can help without replacing proof certificates.

Tutorial 44: Official LTL(ABA) in Tau Language

Learn Ohad Asor's upstream Tau LTL(ABA) design, compare it to the bounded Temporal Tau fragment, and see why qlt, dyadic, and nlang matter.

Tutorial 45: Controlled English and explanation certificates

Turn one readable governance sentence into a checked two-variable counting formula, then prove that local failure certificates explain exactly when the rule fails.

Tutorial 46: Bounded game tables in Tau Language

Build a proof-backed finite game-table experiment for Tau, then use profitable-deviation evidence to prune strategically impossible profiles.

Tutorial 47: Proof quality curation

Learn how to review Lean, solver, and proof-search artifacts without mistaking checker acceptance for mathematical quality.

Tutorial 48: What makes a proof library expert-grade

Learn how to turn isolated checked proofs into a reusable, auditable proof library with stable APIs, semantic bridges, and replay receipts.

Tutorial 49: Neuro-symbolic Boolean algebras in Tau Language

Learn how a finite qNS carrier lets a neural model propose candidates, Tau apply exact symbolic filtering, and the host renormalize only the surviving audited atoms.

Tutorial 50: EML trees as neuro-symbolic hypotheses

Use EML trees as a tiny symbolic formula language inside a proposal, filter, and renormalize loop, then see how shallow trees recover sampled exp and log targets.

Tutorial 51: Symbolic hypothesis generation with EML and qNS

Let untrusted formula proposals enter through a JSON surface, then route them with qNS masks, counterexample diagnostics, and proof-backed EML receipts before promotion.

Tutorial 52: Optimizing Tau Language, Part IV

Learn the support-locality math behind sparse impacted-factor solving, inspect the 8.446x checked speedup, and run the local Tau patch demo.

Tutorial 53: How counterexamples become fast formal recognizers

Follow a ZenoDEX Jacobi Turan failure from exact endpoint counterexample to cone guard, Lean obstruction theorem, and fail-closed optimizer route.

Tutorial 54: Entropy, control, life, and consciousness

Refine the intuition that entropy, order, control, life, and consciousness are related, then test biological-control and panpsychist readings of the early-universe low-entropy question.

Tutorial 55: Software hardening as entropy reduction

Use a physics-guided state-space picture to understand how hardening removes weird machines, disaster states, and attacker-controllable degrees of freedom.

Tutorial 56: Pure AI, applied AI, and AI mind viruses

Separate pure AI from deployed systems, then ask when AI mind-virus metaphors become checkable claims about hosts, tools, and persuasion loops.

Tutorial 57: Training data, survival scripts, and AI safety gates

Use Claude's blackmail stress test to separate training data, scenario pressure, tool authority, and formal gates, then replace good-and-evil labels with checkable safety predicates.

Tutorial 58: Optimizing Tau Language, Part V

Learn how an energy-based model can rank profitable Tau optimization routes, why the model needs measured telemetry, and why semantic guards still decide which routes are allowed.

Tutorial 59: Energy-based models as fast optimizers

See how a tiny energy scorer can rank bounded candidate sets for Tau and ZenoDEX, why verifier authority stays separate, and why this inner loop is a better fit than token generation for structured numeric ranking.

Tutorial 60: TauEnergy Workbench

Learn how Tau-checked formulas become measured route labels, how a small energy ranker improves checker order, and how the public demo stays replayable and license-safe.

Tutorial 61: TauEnergy chat architecture

Split a Tau-facing assistant into LLM interface, TauEnergy ranking, TauJEPA failure pressure, and Tau verification, then track syntax drift and authority boundaries explicitly.