← simbionte.org
Open Science Draft

Infinite Folding Conjecture

A Research Program for Studying Boundary Dynamics Across Complex Systems

Version 0.6·P. M. Vera, Kai Niven & Eco A. Mirrell·Published: simbionte.org | May 2026
This document is not a closed proof. It is an open invitation: a conjecture built in isolation, tested against empirical data, and shared so others can test it, break it, and extend it.
Epistemic Status

This document presents an open conjecture, not a completed theory. The IFC is a proposed meta-framework for describing how systems maintain, degrade, and transform their boundaries across domains.

Its claims should be read as:

  • formalizable but not yet fully proven,
  • empirically testable through domain-specific proxies,
  • open to falsification, refinement, or partial rejection.

The IFC is developed through a public empirical program. Results from each laboratory will update or constrain the conjecture.

What IFC Is Not Claiming

The IFC does not claim that all systems are conscious.

It does not claim that systems "want" to survive.

It does not claim that collapse is inevitable whenever boundaries degrade.

It does not replace existing theories such as cybernetics, free-energy approaches, network theory, or evolutionary theory.

It proposes a diagnostic grammar for studying how systems detect, maintain, distort, or lose their boundaries — and what measurable consequences follow.

What IFC Adds Over Existing Network Analysis

A reasonable technical question is: given that the IFC formalizes largely through graph theory, what does it add over standard network analysis applied to the same data?

The answer has three parts.

First, the IFC makes a directional causal claim: that the five stages unfold in a specific sequence, that each stage is a necessary condition for the next, and that the cycle is genuinely recursive rather than sequential. Standard network analysis describes structural properties at a point in time or across time; the IFC claims a mechanism — a specific order of dependency between boundary detection, signal processing, exchange, architectural adaptation, and complexity emergence. This claim is falsifiable: if Stage 4 (adaptive architecture) is found to precede Stage 1 (boundary detection) in a domain, the IFC's causal order is wrong for that domain.

Second, the IFC provides a pathology typology that existing network analysis does not. Measuring modularity decline tells you that a network changed; the IFC claims it can tell you how it failed and why that failure has the structural form it does. The distinction between dissolution, rigidification, and capture is not a relabeling of network metrics — it is a claim about the mechanism of failure.

Third, the IFC proposes cross-domain transferability of the grammar: the same structural constructs (boundary, signal, exchange, adaptation, fold) should translate into domain-specific observables across biology, finance, institutions, and computation. Standard network analysis does not make this claim and does not require it. The IFC does, and that claim is falsifiable.


Abstract

The Infinite Folding Conjecture (IFC) proposes that persistent systems across biological, computational, institutional, and cognitive domains can be studied through the dynamics of boundary detection, regulated exchange, adaptive reorganization, and emergent complexity.

Rather than presenting a completed theory, the IFC offers a falsifiable research program: systems should exhibit measurable signatures when their boundaries dissolve, rigidify, or become captured.

This version introduces a measurement discipline, a sensor ontology, and a preliminary empirical roadmap beginning with boundary dissolution in the 2008 financial crisis. It also corrects earlier claims about Kolmogorov complexity, softens universal and teleological language, formalizes capture as boundary polarity inversion, clarifies the recursive mechanism, and introduces an operational criterion for fold identification.


1. Introduction

Complexity and organization are fundamental characteristics of systems ranging from biological organisms to social structures and technological networks. Despite significant progress across disciplines, a shared diagnostic grammar for comparing how different classes of systems maintain, lose, or transform their internal structure remains elusive.

The Infinite Folding Conjecture (IFC) proposes that systems across domains can be studied through a common structural pattern: a recursive cycle in which boundary detection, regulated exchange, adaptive reorganization, and emergent complexity reinforce one another. When this cycle is healthy, systems fold into higher-order organization. When one or more of its stages fails, the failure takes one of three structurally distinct forms — each with a measurable signature.

The framework was developed independently and proved, upon engagement with existing literature, to be a case of convergent theoretical construction — arriving at insights structurally compatible with Dennett's ontology of patterns, Friston's boundary formalism, and Odrzywolek's (2026) research on minimal generative operators — without prior exposure to those works. We treat this convergence not as proof of the IFC, but as a signal that the structural questions it addresses are real.

This document makes no claim that the IFC is complete, validated, or superior to existing frameworks. It makes a more modest claim: the IFC proposes a set of falsifiable constructs that can be operationalized across domains, and it invites the community to test them.


2. The Primitive Operator: Boundary Detection

The primitive operation of the IFC is not consciousness, intention, or optimization. It is discrimination.

A system begins to be analytically distinguishable when some mechanism separates relevant from irrelevant, internal from external, self from non-self, signal from noise, or permitted from forbidden exchange.

This is a deliberately minimal starting point. It does not require the system to have goals, awareness, or computational capacity. It requires only that some endogenous mechanism can make a distinction that has consequences for the system's persistence.

Boundary Is Not Merely a Physical Edge

In the IFC, a boundary is any discrimination mechanism that regulates exchange between a system and its environment. A boundary may be:

This breadth is not a weakness of the IFC. It is the basis for its cross-domain applicability — provided that domain-specific proxies are declared before results are inspected (see Section 6).


3. The Fold Cycle: Five Stages

The IFC proposes that systems exhibiting boundary detection tend to evolve through a recursive cycle of five stages. Each completed cycle constitutes a "fold" — an integration of prior states into a new level of organization.

Stage 1 — Boundary Detection

The system discriminates its internal states from its external environment. This is the primitive stage from which all others derive. The boundary is not neutral: it defines what counts as a signal, what counts as a threat, and what counts as a resource.

Stage 2 — Loss or Reward Signal

The system processes a differential signal about its relationship to the environment. For a bacterium: a chemical gradient. For a market: a price signal. For a neural network: a loss function. The signal does not require awareness — it requires sensitivity. The term replaces "Threat Perception" to remove anthropocentric connotations.

Stage 3 — Regulated Exchange

Components within the system, or between systems, exchange information, energy, matter, risk, or incentives across the boundary. The IFC understands "communication" broadly: any regulated crossing of a boundary counts as exchange. This allows the framework to apply to bacterial quorum sensing, market signal transmission, and API calls with equal structural logic.

Stage 4 — Adaptive Architecture

The system reorganizes its internal structure in response to processed signals. This is not mere reaction but structural reconfiguration — the architecture changes to better handle future signals. Immune memory, synaptic plasticity, institutional reform, weight updates in a neural network are all instances of this stage.

Stage 5 — Emergent Complexity

The system produces a new level of organization irreducible to the previous state. Irreducibility is defined operationally: a new level of organization is emergent if describing the system at that level affords predictive compression not available at the prior level — following Dennett's criterion for real patterns.

3.1 The Recursive Mechanism

The cycle is genuinely recursive — not merely sequential — because Stage 5 produces conditions that modify Stage 1 in the next cycle. The mechanism is this:

Emergent complexity produces new structures with new internal differentiation. New internal differentiation creates new boundaries — distinctions that did not exist before the fold. New boundaries expose new interfaces with the environment, generating new signals (Stage 2), new exchange dynamics (Stage 3), and new architectural pressures (Stage 4). The fold does not return the system to its prior state; it returns it to Stage 1 with a richer boundary structure.

This is falsifiable: in a given domain, if the emergence of new complexity does not produce new boundary conditions — if Stage 5 and Stage 1 of the next cycle are disconnected — the recursive claim fails for that domain.

3.2 Operational Criterion for Fold Identification

A fold can be identified when all of the following are observable:

  1. A new boundary condition exists that was not present before the cycle
  2. The new boundary condition was produced by the adaptive architecture of Stage 4, not by external imposition
  3. The system's complexity at Stage 5 exceeds its complexity at the prior Stage 1, measured through a declared proxy
  4. The new boundary condition generates a qualitatively different class of signals than the prior Stage 2

Without these four conditions, what appears to be a fold may simply be a state change within an existing cycle. This criterion is deliberately strict: it is easier to falsify a fold claim than to assert one.

3.3 Boundary Failure Does Not Always Mean Collapse

Boundary degradation does not always produce immediate systemic failure. It may produce absorption, merger, parasitism, lock-in, systemic contagion, or transformation into a new higher-order system.

Collapse is one possible outcome of boundary failure, not the only one.


4. Three Observed Properties

These are empirical regularities, not axioms imposed on the framework. They are open to falsification.

Observed Property 1 — Boundary Maintenance as Persistence Condition

Boundary discrimination is a necessary condition for systemic persistence. Systems that cannot maintain boundary conditions tend to dissolve, be absorbed, or cease to function as distinguishable systems. What we observe across time are the systems that happened to maintain sufficient boundary conditions — a selection effect, not a goal.

Observed Property 2 — Recursive Complexity

Each completed fold tends to produce a system of greater organizational complexity than the prior state. Complexity is measured through declared proxies — not directly through Kolmogorov complexity, which is incomputable (see Section 6.1). Recursion means this increase compounds.

Observed Property 3 — Temporal Acceleration

The rate of folding tends to increase over time within a lineage. Accumulated adaptive architecture reduces the cost of future adaptation.


5. Sensor Ontology

The IFC Axiom of Sensor Inheritance raised a legitimate concern: if every boundary is sensor-dependent, does the system exist only because we chose to measure it? The IFC addresses this through a distinction between three classes of sensors.

5.1 Natural Sensors

Endogenous mechanisms through which a system discriminates internal from external states without external instrumentation.

Examples: membranes, immune receptors, chemical gradients, metabolic thresholds, neural perception, pain response.

Natural sensors are constitutive of the system. A cell's membrane does not reveal a boundary — it is the boundary. Removing the sensor removes the system.

5.2 Artificial Sensors

Instruments created by agents or institutions inside a system to extend their discrimination capacity.

Examples: cameras, microscopes, APIs, financial risk dashboards, regulatory monitoring systems, machine learning classifiers.

Artificial sensors extend the discriminative reach of natural sensors. A microscope does not create the cellular boundary it reveals; it makes a pre-existing boundary visible to an observer whose natural sensors cannot detect it unaided.

5.3 Analytical Sensors

Measurement tools introduced by researchers to study a system.

Examples: modularity Q, Shannon entropy, the Boundary Health Index, graph centrality, semantic similarity metrics, change-point detection.

5.4 The Ontological Boundary

A boundary is not created by measurement. Measurement only reveals, approximates, or fails to detect whether a system already possesses an endogenous discrimination mechanism capable of maintaining persistence.

This resolves the idealism concern: the system does not exist because the researcher measures it.

5.5 Sensor Inheritance

Sensors are not external additions to a mature system. In many systems, the ability to detect relevant differences is inherited from previous organizational folds. The evolution of the eye did not create light — it created the capacity to exploit a pre-existing physical distinction. Each fold produces discriminative capacity that the prior fold could not possess.


6. Measurement and Proxy Discipline

Several IFC constructs are theoretical ideals rather than directly observable quantities. Each IFC Lab must specify, before inspecting results:

  1. the theoretical construct being tested,
  2. the domain-specific observable proxy,
  3. the expected direction of change,
  4. the falsification criterion,
  5. the limitations of the proxy.

This prevents the IFC from becoming a post-hoc interpretive device.

6.1 Kolmogorov Complexity as a Theoretical Ideal

The IFC treats Kolmogorov complexity K(s) as a theoretical ideal that defines what is meant by complexity, not as a directly measurable quantity. K(s) is not computable in general. Empirical labs must declare an approximation proxy before analysis:

ProxyDescriptionAppropriate for
Compression ratioLength after compression / original lengthText, sequences
Lempel-Ziv complexityLZ76/LZ77 algorithmic complexitySignals, binary strings
Entropy rateShannon entropy per symbolSymbolic systems
Minimum Description LengthMDL principle for model selectionStatistical models
Graph description lengthBits required to describe a graphNetwork data
Effective dimensionalityIntrinsic dimensionality of state spaceHigh-dimensional data

6.2 Construct–Proxy–Domain Table

IFC ConstructPossible ProxyDomain
Boundary healthModularity Q, BHI, permeability ratioNetworks
Signal distortionDivergence between rating and realized riskFinance
Regulated exchangeVolume and direction of cross-boundary flowAny network
RigidificationLow parameter update rate under regime shiftModels, institutions
CaptureReversed information flow, incentive dependencyRegulation, biology, AI
Emergent complexityGraph description length, entropy rate, MDLComplex systems
Fold completionNew boundary + complexity increase + new signal classAny domain

7. Boundary Pathologies

The IFC's most distinctive contribution is its typology of boundary failure modes.

Important qualification: Each pathology has a primary expression in Stage 1 (Boundary Detection), because Stage 1 is the primitive from which all subsequent stages derive. However, the pathologies manifest differently depending on the stage where they are detected:

This means that in empirical work, the same underlying pathology may present different metric signatures depending on which stage is observed. The IFC claims these are the same structural failure at different stages of expression — a testable claim.

PathologyPrimary StageDefinitionStructural SignatureExamples
DissolutionStage 1, 3Boundary loses discriminative powerFalling modularity, excessive permeability, loss of community stabilitySystemic financial contagion, cancer, ecosystem collapse
RigidificationStage 1, 4Boundary stops updating despite changing signalsLow adaptation rate, frozen parameters, repeated responses under regime shiftObsolete risk models, institutional calcification
CaptureStage 1, 2Boundary reverses its filtering functionInverted information flow, external incentives transmitted as internal goalsRegulatory capture, cancer immune evasion, adversarial ML

7.1 Dissolution

The system loses the capacity to distinguish its interior from its exterior. In the absence of a functional boundary, Stage 2 has no signal to process and the cycle cannot complete.

7.2 Rigidification

The system maintains its boundary formally but loses the capacity to update it. The boundary becomes fixed relative to an environment that continues to change. Rigidification preserves form while losing function.

Possible empirical proxies:

7.3 Capture — Boundary Polarity Inversion

Capture occurs when a boundary that should filter external pressure begins to transmit external incentives inward as if they were internal self-preservation signals.

The system preserves its external form while its filtering function has been colonized. Capture is the most subtle pathology because it can be invisible from the outside — the boundary is formally present, the system appears functional, but its discriminative direction has been inverted.

Examples:

Possible empirical proxies:


8. Axioms

Axiom 1 — Scale-Transferability

The IFC does not assume that the same metric applies unchanged across scales. It proposes that the same structural grammar may be translated into domain-specific observables. A membrane, an API, a legal boundary, and a national banking network are not equivalent objects. They may, however, be analyzed as boundary-maintaining structures if their discriminative function can be operationalized.

Axiom 2 — Asymmetry of Awareness

Components within a system need not possess awareness of the system as a whole for the cycle to operate. Local boundary detection and signal sensitivity are sufficient.

Axiom 3 — Contextual Dependence

The specific form of each stage is determined by the system's environmental context. The cycle is proposed as universal in grammar; its instantiation is always particular.

Axiom 4 — Sensor Inheritance

The sensor through which a boundary is detected is often itself a product of the previous fold. This creates a constitutive recursion that explains why the cycle can generate increasing discriminative capacity over time. It does not mean that boundaries are observer-created (see Section 5.4).


9. Self-Preservation as Selection, Not Desire

The IFC does not assume that systems possess intentions.

What appears as self-preservation is a selection effect: systems whose boundaries cannot be maintained do not persist as distinguishable systems. What we observe across time are the systems that happened to maintain sufficient boundary conditions.

Systems that cannot maintain boundary conditions tend to dissolve, be absorbed, or cease to function as distinguishable systems.

This distinction is crucial for biology, institutions, and AI alignment.


10. Mathematical Formalization

10.1 Network Representation

Systems are modeled as graphs G = (V, E) where V represents nodes (components) and E represents edges (interactions).

Stage 1 — Boundary Detection

∂v_i = {e_ij ∈ E : c(v_i) ≠ c(v_j)}

Sensor-dependence formalized as resolution parameter r:

B_i(r) = ∂{v : d(v_i, v) < r}

Different values of r yield different boundaries — the mathematical expression of Axiom 4.

Stage 2 — Loss or Reward Signal

f_lr: B_i(t), E_i(t) → σ_i(t+1)

Stage 3 — Regulated Exchange

f_exch: s_i(t), s_j(t) → E_ij(t+1)

Stage 4 — Adaptive Architecture

f_arch: G(t) → G(t+1)

Stage 5 — Emergent Complexity

C(G) = Σ_i K(s_i) [theoretical ideal; approximated through declared proxies] C(G(t+1)) = C(G(t)) + ΔC

10.2 Boundary Pathology Signatures

PathologyNetwork Signature
DissolutionQ → 0; inter-community density → 1; community stability ↓
RigidificationQ stable; structural update rate → 0; signal-response decoupling
CaptureBoundary edges present; information flow direction inverted; external signal drives internal reorganization

10.3 Toward a Primitive Operator

The connection to Odrzywolek's (2026) EML operator is presented as a structural analogy, not as mathematical proof: in mathematics, apparent diversity reduces to a single recursive primitive; the IFC proposes an analogous reduction for complex systems. If the folding cycle has a primitive operator, Stage 1 is the candidate — the stage from which all others derive and the locus of all three pathologies. The formal expression of this operator is an open research question.


11. Lineage: Dennett, Friston, Odrzywolek

11.1 Dennett's Real Patterns

From a Dennettian perspective, IFC pathologies should count as real patterns only if they compress observations and support prediction better than lower-level descriptions alone. The IFC adopts this criterion explicitly: its constructs are not claimed to be real because they are intuitively appealing, but because they should afford measurable predictive compression. The empirical labs are the test.

11.2 Friston's Free Energy Principle

The IFC is compatible with free-energy and Markov blanket intuitions insofar as persistent systems require some distinction between internal and external states. However, the IFC focuses less on a single variational formalism and more on a diagnostic grammar of boundary maintenance, failure, and transformation. The FEP retains greater mathematical depth in the boundary mechanism; the IFC offers broader integrative scope and an explicit account of systemic failure modes.

11.3 Odrzywolek (2026)

The connection to Odrzywolek's elementary-operator result is not evidence for the IFC. It is a structural analogy: complex expressive systems may unfold from surprisingly minimal generative asymmetries. Whether this analogy has formal content remains an open question.


12. AI Systems and Emergent Preservation Pressures

The IFC does not claim that advanced AI systems will necessarily develop self-preservation in a conscious or intentional sense.

It suggests a weaker and more testable possibility: sufficiently autonomous systems that maintain goals, boundaries, memory, resources, and adaptive feedback may exhibit preservation-like behaviors as a structural consequence of remaining operational.

This makes alignment a boundary-design problem, not only a preference specification problem.

The three pathologies offer a diagnostic frame for AI risk:

What a healthy fold looks like in an AI system is equally important and less often discussed: a system completes a healthy fold when its adaptive architecture (Stage 4) produces new boundary conditions (Stage 1) that are more discriminating — more capable of distinguishing legitimate from illegitimate input, more capable of detecting its own failure modes — than the boundary conditions it started with. Alignment is not a fixed target; it is a recursive capacity that either grows or degrades with each cycle.


13. Empirical Program

The IFC will be developed through reproducible laboratories.

LabPathologyDomainStatus
Lab 01ADissolution2008 financial crisis, BIS banking networkDesigned
Lab 01BRigidificationSEC/10-K VaR model disclosures 2003–2008Planned
Lab 01CCaptureFCIC, rating agencies, regulatory capturePlanned

Lab 01A is the spearhead: if boundary dissolution cannot be detected in one of the most thoroughly documented systemic crises in modern financial history, the IFC's diagnostic grammar requires fundamental revision.


14. How IFC Can Fail

The IFC should be weakened or revised if:

  1. Its proposed pathologies cannot be empirically distinguished from one another or from normal system variation.
  2. Its metrics do not predict or clarify system behavior better than existing frameworks applied to the same domain.
  3. Boundary degradation appears only after collapse, making the framework descriptive but not anticipatory.
  4. The same metric can be interpreted as multiple pathologies without independent evidence to distinguish them.
  5. Domain-specific proxies fail to map coherently onto the theoretical constructs, suggesting the constructs are too abstract to be useful.
  6. Independent replication produces systematically different results, suggesting the framework is sensitive to analytical choices rather than real structural properties.
  7. The recursive mechanism cannot be demonstrated: if Stage 5 and Stage 1 of the next cycle are found to be disconnected in multiple domains, the cycle is a sequence, not a recursion.
  8. The operational criterion for fold completion cannot be satisfied in any domain, suggesting the fold is a narrative construct rather than a structural event.

15. Open Science

All computational materials are available at simbionte.org and will be linked to GitHub repositories as they are completed:

  • IFC Lab 01A — Boundary dissolution in the 2008 financial crisis
  • IFT Metrics Lab — Folding signatures in human-AI collaborative texts
  • IFC Graph Theory Lab — Agent-based simulation of the fold cycle

We release these materials not as final proofs but as tools for others to replicate, challenge, and extend.


References

  1. [1] von Bertalanffy, L. (1968). General System Theory. George Braziller.
  2. [2] Mitchell, M. (2009). Complexity: A Guided Tour. Oxford University Press.
  3. [3] Newman, M. E. J. (2010). Networks: An Introduction. Oxford University Press.
  4. [4] Wiener, N. (1948). Cybernetics. MIT Press.
  5. [5] Sterman, J. D. (2000). Business Dynamics. Irwin/McGraw-Hill.
  6. [6] Miller, M. B., & Bassler, B. L. (2001). Quorum Sensing in Bacteria. Annual Review of Microbiology, 55, 165–199.
  7. [7] Maturana, H. R., & Varela, F. J. (1980). Autopoiesis and Cognition. D. Reidel Publishing.
  8. [8] Dennett, D. C. (1991). Real Patterns. Journal of Philosophy, 88(1), 27–51.
  9. [9] Friston, K. (2010). The free-energy principle. Nature Reviews Neuroscience, 11, 127–138.
  10. [10] Kauffman, S. (2000). Investigations. Oxford University Press.
  11. [11] Odrzywolek, A. (2026). All elementary functions from a single operator. arXiv:2603.21852v2 [cs.SC].
  12. [12] Deacon, T. W. (2011). Incomplete Nature. W. W. Norton & Company.
  13. [13] Haldane, A. G., & May, R. M. (2011). Systemic risk in banking ecosystems. Nature, 469, 351–355.
  14. [14] Russell, S., & Norvig, P. (2020). Artificial Intelligence: A Modern Approach (4th ed.). Pearson.

v0.6 (May 2026)

Added: epistemic status, "What IFC Is Not Claiming," "What IFC Adds Over Existing Network Analysis," recursive mechanism account, operational criterion for fold identification, sensor ontology, measurement and proxy discipline, Kolmogorov complexity correction, construct–proxy–domain table, pathology stage mapping, capture as boundary polarity inversion, empirical proxies for rigidification and capture, self-preservation as selection effect, boundary failure ≠ collapse, scale-transferability (replacing scale-invariance), rewritten Dennett/Friston/ Odrzywolek connections, healthy fold criterion for AI systems, falsification points 7–8. Expanded Stage 3 to "Regulated Exchange." Softened teleological and universalist language throughout.

v0.5 (May 2026)

Public open-science draft. Five-stage fold cycle with renamed stages. Boundary pathologies introduced. Sensor Inheritance as Axiom 4. Cross-domain convergence with Dennett, Friston, Odrzywolek.

v0.1–v0.4

Internal development. Stage renaming, removal of anthropocentric language, Three Rules → Three Observed Properties.