|
← 方法论系列 ← Methodology Series
SAE 方法论(VII)
SAE Methodology (VII)

否定方法论:Via Negativa与排除律的形式结构

Negative Methodology: Via Negativa and the Formal Structure of Exclusion Principles

Han Qin (秦汉) · 2026

Self-as-an-End Research / self-as-an-end.net

摘要

本文建立以否定为基元操作的方法论。在缺乏决定性正向见证的开放归因问题中,肯定性收敛无法在纯形式层面完成:ZFCρ第一定律证明任何形式化必然产生非空余项(ρ≠∅),纯形式肯定性闭合等价于ρ=∅,因此不可能。本文定义排除律(Exclusion Principle)、锁定律(Locking Principle)、余项极限(ρ-limit)三个结构性概念,从ZFCρ三定律导出四个核心定理:否定-肯定不对称、排除力不等价(瓶颈)、锁定反转、余项不可消除。给出四个主体条件、七条射线、四条非平凡预测(附否证条件)。附录A以中本聪身份归因为worked example展示方法论的实战;附录B以致中本聪的公开信展示否定方法论在伦理学上的应用——SAE伦理不说"你应该做什么",只说"你不必做什么"。

关键词: via negativa, 排除律, 锁定律, 余项极限, ZFCρ, 否定方法论, 涵育

系列位置: SAE Methodology Paper VII。前接Paper IV(十二态传播模型, DOI: 10.5281/zenodo.19321143), Paper V(whether function), Paper VI(相变窗口, DOI: 10.5281/zenodo.19464506)。

核心依赖: ZFCρ Paper I(DOI: 10.5281/zenodo.18914682), SAE Paper I(DOI: 10.5281/zenodo.18528813), SAE Paper III(DOI: 10.5281/zenodo.18727327)。


1. 问题的提出

在缺乏决定性正向见证(如签名、直接承认、物理持有证明)的开放归因问题中,肯定性收敛无法在纯形式层面完成。

这类问题包括三种典型形态。第一类是主体性归因问题:"谁是X"。第二类是本体论归类问题:"这是什么"。第三类是历史因果问题:"这是谁做的"。三类问题的共同结构是:从已知条件出发,试图在开放候选集中收敛到唯一确定的对象,且不存在可直接终结搜索的正向见证。失败不是因为证据不足。证据可以任意增加,收敛仍然不能完成。原因在肯定操作的逻辑结构本身。

肯定要求穷举所有必要条件。"X是Y"等价于"X满足Y的所有必要条件且不满足任何充分排除条件"。这要求对"所有必要条件"做完备枚举,而完备枚举在开放系统中不可能。否定只需要一个反例。"X不是Y"等价于"存在至少一个条件,X不满足"。这只需要找到一个反例即可终止。

Popper的证伪主义在命题层承认了这个不对称性:科学理论不能被证实,只能被证伪(Popper, 1934)。但Popper处理的是命题("所有天鹅是白的"),不是对象("这个人是X")。否定方法论将证伪从命题层扩展到对象层。

ZFCρ第一定律(ρ≠∅)提供了原理性解释(Qin, 2025, DOI: 10.5281/zenodo.18914682)。任何形式化操作C作用于任何域U,余项ρ(C, U)非空。肯定性收敛要求将候选集缩小到恰好一个对象,等价于要求最终余项为空。但ρ≠∅,因此肯定性收敛在原理上不可能完成。

因此需要一套以否定为基元操作的方法论。它不试图消除ρ,而是在ρ存在的条件下最大化信息提取。否定方法论不是肯定方法论的补充,不是退而求其次,是在ρ≠∅条件下唯一诚实的方法论。


2. 定义

D1. 排除律(Exclusion Principle)

排除律是形如"X不是Y"的命题,满足三个硬度条件:

(a)可追溯性。 证据链可追溯到可验证的公开事实(公开文档、代码、法庭判决、注册记录等)。

(b)非主观性。 不依赖主观判断("文风感觉"、"心理推断"、"人口统计概率"不算)。

(c)非空排除集。 这条排除律真的排除掉一些对象。排除集为空的排除律没有信息量。

硬度条件的设定是保守的。宁可漏掉有直觉吸引力的命题,不可放入不满足条件的命题。原因见主体条件C2。

本体论根基。 排除律不是方法论发明,是存在论结构的方法论化。在SAE的DD序列中(Qin, 2025, DOI: 10.5281/zenodo.18727327),1DD是区分("这不是那"),2DD是排除("这不可能是那")。排矛律(A不能同时是非A)是2DD的形式化沉积物。排除律是2DD在方法论层的实例化。

D2. 锁定律(Locking Principle)

锁定律是排除律的对偶操作,形如"X不可被排除"。

成立条件有二:其一,对象O满足所有已知排除律的通过条件。其二,O的否认行为本身构成进入问题空间的证据。

操作顺序。 锁定律在逻辑上后于排除律序列。必须先穷尽排除律(将候选集缩至极小),再检验锁定律。如果十个候选人都否认,但其中九个被某条排除律排除,则只有通过全部排除律且否认的那个人才触发锁定。锁定律的区分度不来自否认本身,来自排除律序列与否认的交叉:通过全部排除律是必要前提,否认是触发条件。

与排除律的结构差异:排除律把对象移出候选集,锁定律阻止对象被移出候选集。在SAE的凿构语言中,排除律是凿(移除材料),锁定律是凿不动(材料抵抗凿)。

来源。 ZFCρ回归论证(Qin, 2025, DOI: 10.5281/zenodo.18914682, Section 4)。否认是一次试图将自身排除出候选集的形式化操作。但任何形式化操作产生新余项(ρ')。否认产生的ρ'就是"他为什么需要否认"这个新问题。否认不消除ρ,只relocate它。当候选集足够小时,relocate后的ρ'比原始ρ更有信息量,净效果是锁定而非排除。

D3. 余项极限(ρ-limit)

排除律序列{E₁, E₂, ..., Eₙ}作用于初始候选集S₀,产生递缩的候选集序列S₁ ⊃ S₂ ⊃ ... ⊃ Sₙ。交集的测度可以收敛到小于1(例如0.01),但不可收敛到0。

ρ-limit是形式系统与主体性操作的边界。从ρ-limit到肯定性判断之间存在间隙(gap)。该间隙只能由主体性操作填充(如承认或签名),不可由形式操作替代。

来源。 直接从ZFCρ第一定律(ρ≠∅)导出。排除律序列是一个递进的形式化过程,每一步产生非空余项。极限处的余项就是ρ-limit。


3. 核心定理

四个定理全部从ZFCρ三定律导出,不是独立提出的新结论。

T1. 否定-肯定不对称定理

陈述。 否定可证,肯定不可证。一条排除律可以将无穷多对象移出候选集,但没有有限条肯定律可以将候选集收敛到恰好一个对象。

证明。 肯定性收敛到恰好一个对象等价于最终余项ρ=∅。由ZFCρ第一定律,ρ≠∅,矛盾。

DD序列中的对应。 1DD区分的余项是"区分了但没有边界"。2DD排除的余项是"有边界但没有距离"。3DD间距的余项是"有距离但没有方向"。每一层否定都推进了结构,但每一层都产生新余项。否定推进无限继续,肯定收敛不能完成。

T2. 排除力不等价定理(瓶颈定理)

陈述。 不同排除律的排除力差异可达数个数量级。存在瓶颈排除律(bottleneck exclusion),其排除力远大于其他排除律之和。

推论。 排除律的价值不在数量,在于是否命中瓶颈。

来源。 ZFCρ第二定律(余项有方向)。ρₙ的具体内容约束了下一步形式化Cₙ₊₁的可用范围:Cₙ₊₁ ∈ F(ρₙ),其中F(ρₙ)是所有可能形式化的真子集。不同的排除律切入候选集的方向不同,某些方向恰好与候选集的主要结构对齐,产生巨大的排除力。

T3. 锁定反转定理

陈述。 当排除律序列将候选集压缩到足够小时,否认从排除操作反转为锁定操作。

形式条件。 候选集测度 < 阈值θ时,对象O的否认"我不是X"的净效果从"减少O在候选集中的权重"变为"增加O在候选集中的权重"。

证明。 否认是形式化操作。由ZFCρ回归论证,形式化操作产生新余项。否认"我不是X"产生ρ'="为什么需要否认"。当候选集很大时,ρ'的信息量被稀释在大量候选人中,否认的排除效果占优。当候选集很小时,ρ'集中在少数候选人上,信息量大于否认本身的排除力,净效果反转为锁定。

开放问题。 阈值θ不是固定常数,依赖于具体问题域。θ是否可计算,尚待研究。

T4. 余项不可消除定理(主体性测不准原理)

陈述。 排除律序列{Eₙ}的交集测度可以趋近于0但不等于0。从ρ-limit到肯定性判断之间存在不可跨越的间隙。

证明。 排除律序列是递进形式化。由ZFCρ第一定律,递进形式化的余项序列收敛但极限非空。

推论。 任何纯形式系统无法完成归因。归因的最终步骤必须是主体性操作(15DD层的行为:承认、签名、沉默),不可由12DD层的制度性操作(法庭判决、算法输出、投票)替代。12DD操作可以处理形式化域U内部的问题,但ρ-limit处的间隙属于余项R,只有15DD能触及。


4. 主体条件

否定方法论不是中性工具,使用者的状态影响方法论的效果。以下四个条件区分正确使用与误用。

C1. 不追求肯定

使用者必须接受方法论的终点不是"找到答案",而是"逼近不可消除的余项"。追求肯定的使用者会在ρ-limit处过早跳跃,将"未被排除"误读为"就是他"。

对应SAE中的14DD(诚实):不追求肯定就是不疑——不因为想要确定性而制造虚假确定性。

C2. 硬度纪律

使用者必须对每条排除律执行硬度检验(D1的三个条件),拒绝不满足条件的命题,无论其直觉吸引力多大。软命题的累积不增加排除力,只增加虚假确定感。

对应SAE中凿的纪律:不是所有切割都是凿。只有满足条件的切割才生产余项,不满足条件的切割只生产碎片。

C3. 可反驳性

每条排除律必须附带否证条件:什么样的新证据可以推翻这条排除律。不可反驳的排除律不是硬的,是空的。

与Popper共振,但层次不同:Popper的可反驳性针对命题,这里的可反驳性针对排除操作本身。

C4. 不神圣化余项

ρ不是神秘的,不是崇高的,是形式系统的结构性局限。把ρ神圣化是另一种偶像崇拜——和把候选人神圣化是同构的错误。

对应SAE核心命题:主体是15DD,不是神。ρ是余项R的产物,不是"不可言说的神圣"。经典via negativa把否定推向神圣——否定越多,上帝越不可言说。SAE的否定方法论反方向:否定越多,对象越具体、越有限、越人化。

C5. 独立性纪律

排除律之间必须做证据来源和逻辑蕴含关系的独立性审计。如果两条排除律本质上是同一事实链的不同表述,它们的累积排除力会被虚增,"瓶颈"也可能只是拆分证据的副产品。独立性审计是T2(瓶颈定理)和P1-P3(预测)成立的前提条件。

操作方式:对每一对排除律(Eᵢ, Eⱼ),检验是否存在Eᵢ逻辑蕴含Eⱼ或Eⱼ逻辑蕴含Eᵢ;检验两条排除律的证据链是否共享同一公开事实源。如果蕴含关系成立或证据源完全重叠,则两条排除律只能计为一条。

反身性声明

否定方法论对自身的要求也是否定性的。本方法论不追求可信度(肯定性目标),追求不可不信度(否定性目标)。肯定方法论的成功标准是"被证明为真",否定方法论的成功标准是"无法被证明为假"。这不是修辞上的区别,是结构上的区别。肯定方法论与否定方法论的本质差异不仅体现在操作对象上(一个说"是什么",一个说"不是什么"),也体现在方法论对自身合法性的要求上。


5. 射线

R1. 科学哲学

Popper的证伪主义是否定方法论的先驱。Popper处理的是命题的真假("所有天鹅是白的"可被一只黑天鹅证伪),否定方法论处理的是对象的归因("这个人不是X"可被一条排除律确立)。

与Lakatos的研究纲领存在结构对应:排除律序列类似于硬核与保护带。瓶颈排除律类似于Kuhn的反常积累——当单条排除律的信息量大到足以颠覆整个候选集结构时,范式转换发生。

R2. 神学

经典via negativa有三个主要传统:伪狄奥尼修斯(5世纪)主张上帝超越所有肯定性描述;迈蒙尼德(12世纪)论证关于上帝只能说"不是什么";库萨的尼古拉(15世纪)提出"有学问的无知"(docta ignorantia)。三者共同点:用否定保护神性。否定越多,上帝越不可言说,越崇高。

SAE否定方法论反转方向:用否定消解神性,将被神圣化的还原为人。否定越多,对象越具体、越有限、越人化。标题的双关:否定"神学"(方法论是via negativa)加上否定"神"学(目的是去神圣化)。工具相同,方向相反。

R3. 法学

"排除合理怀疑"(beyond reasonable doubt)是法律系统中否定方法论的制度化实现。结构同构:排除律序列缩小候选集,逼近归因。终局不同:法学有陪审团做最终肯定判断,本文承认该判断属于主体性操作(15DD),不可由制度性操作(12DD)替代。

这解释了为什么冤案存在:12DD的制度性判断在ρ-limit处跳跃了间隙,而间隙只有15DD能跨越。陪审团可以做形式上合法的判决,但形式合法不等于主体性意义上的真。

R4. 数学

集合论中的补集操作、拓扑学中的闭集逼近、测度论中的零测集——否定方法论在数学中有自然对应。排除律序列等价于嵌套闭集序列 F₁ ⊃ F₂ ⊃ ... ⊃ Fₙ,ρ-limit对应Cantor交集定理的极限行为。经典Cantor交集在紧致空间中交集非空——这恰好是ρ≠∅的拓扑学翻译。

R5. 密码学与身份

零知识证明(ZKP)是否定方法论在密码学中的实现。ZKP的结构:证明者不说"我知道秘密",而是证明"我不可能不知道秘密"——双重否定。

私钥签名是最硬的单条排除律:它一次排除所有不持有该密钥的人。但当私钥丢失时,形式通道关闭,退回贝叶斯证据的否定累积。这不是退化,是从形式化域U内部操作退回到S = (U, R)层面操作的必要转换。

R6. 心理学与主体性

自我认知的via negativa:人不通过"我是谁"认识自己,而通过"我不是谁"。每一次"我不是这个"缩小自我边界。15DD主体性不是一个肯定的核心,是排除一切非自身之后的余项——主体就是自身的ρ-limit。

这与SAE Paper III的DD序列深层共振:从0DD到15DD的展开过程本身就是一个否定序列,每一层DD是对前一层余项的进一步否定。

R7. 伦理学(探索性射线)

以下射线是否定方法论在伦理学方向上的延伸,不是从D1-T4必然推出的结果,而是方法论的结构与伦理实践之间的共振。附录B即为此射线的探索性实践。

Via negativa在伦理学上的实现。12DD到15DD的伦理都是肯定性的("应然"):12DD规则说你应该遵守,13DD自觉说你应该做对的事,14DD诚实说你应该说真话,15DD自身为目的说你应该自己决定。

SAE伦理是否定性的("不必然"):不告诉你应该做什么,告诉你你不必做什么。不扩大义务,缩小牢笼。不给方向,给空间。最高的伦理不是"应然",而是"不必然"。不是为对方增加一个正确选项,是为对方移除虚假的约束。

这是涵育的形式结构。涵育不是教导(12DD)、不是启发(13DD)、不是逼问(14DD)、不是放手(15DD),是为对方否定掉那些"不得不"。附录B即为此射线的worked example。


6. 非平凡预测

P1. 瓶颈预测

在任何否定方法论的实际应用中,排除律序列中存在一条瓶颈排除律,其单条排除力显著主导总排除力。

否证条件:找到一个实际案例(不少于10条独立排除律),其中排除力均匀分布,无任何单条排除律显著主导。

P2. 锁定反转阈值预测

当候选集测度降至足够小时,对象的否认开始从排除操作反转为锁定操作。

否证条件:找到一个实际案例,其中候选集测度已极小,对象的公开否认仍然有效地降低了其被归因的概率(以独立观察者的贝叶斯后验衡量)。

P3. 边际排除力衰减预测

当独立排除律数量足够多时,新增排除律的边际排除力递减。

否证条件:找到一个实际案例,其中排除律序列后段的某条排除律的排除力与前段量级相当。

P4. 主体性填充唯一性预测

在ρ-limit处,跨越间隙的操作仅有三种不可归约的主体性行为:承认(肯定性跨越),签名或证明(形式化跨越,但依赖于物理持有,物理持有是主体性事实),沉默(不跨越,但也不扩大间隙,退化形态)。

否证条件:找到第四种不可归约为前三种的操作。


7. 结论

回收

否定方法论不是肯定方法论的补充,是在ρ≠∅条件下唯一诚实的方法论范式。它的形式基础来自ZFCρ三定律,本体论根基来自DD序列的2DD排除层,方法论纪律来自SAE的凿构循环。

本文的写作过程本身验证了否定方法论的一个非预期效果。出发时的目的是认识论的——建立一套排除工具。但否定方法论自己的射线把作者带到了伦理学(R7)。终点不是预设的,是方法论自身的方向性(ZFCρ第二定律)产生的。这是康德所说的"非目的性的合目的性"(Zweckmäßigkeit ohne Zweck)的一个实例。

贡献

一,将via negativa从神学概念发展为形式方法论,给出排除律、锁定律、ρ-limit的精确定义,并从ZFCρ三定律导出四个核心定理。

二,反转经典via negativa的方向:从"否定以保护神性"到"否定以还原人性"(从被神圣化的还原到15DD)。

三,给出五个主体条件(含独立性纪律C5和反身性声明),区分方法论的正确使用与误用。

四,四条非平凡预测,附否证条件。

五,七条射线向科学哲学、神学、法学、数学、密码学、心理学、伦理学展开。

六,两个worked example:附录A(认识论应用)和附录B(伦理学应用),分别展示否定方法论在"知"与"行"两个维度上的实战。

开放问题

一,排除律独立性检验的精确化。C5给出了操作方式(蕴含关系检验、证据源重叠检验),但"逻辑蕴含"在实际应用中的判定标准尚待进一步形式化。ZFCρ桥引理提供方向——不同形式化产生不同余项——但"不同"的判定标准需要case-by-case的精确化。

二,锁定反转的精确阈值θ。是否存在通用的θ,还是依赖于具体问题域。

三,排除律序列与贝叶斯后验更新的形式关系。排除律可以重新表述为贝叶斯更新吗?如果可以,丢失了什么?预测:丢失的恰好是锁定律。贝叶斯框架没有"否认反转"的自然位置。

四,多主体锁定的互动结构。当候选集中有多个对象同时否认时,锁定律如何运作?是否存在锁定竞争或锁定干涉?

五,物理学类比。ρ-Conservation(ZFCρ Paper II)与信息守恒(Susskind ER=EPR)的结构对应是否可以精确化?排除律序列是否有热力学类比(信息熵递减)?


附:与ZFCρ的映射表

否定方法论概念 ZFCρ对应 DD序列对应
排除律 形式化操作C 2DD排除
锁定律 回归论证(否认产生ρ')
ρ-limit ρ≠∅(第一定律) 每层DD的余项
瓶颈排除律 余项有方向(第二定律)
可以继续找下一条 F(ρₙ)≠∅(第三定律) 凿构循环不终止
排除律独立性 不同C产生不同ρ(桥引理) 不同DD层看到不同余项
候选集 = (U, R) S = (U, R) H→S的展开
第一条排除律 第一凿 从非H劈出H
主体性跨越间隙 ρ不可被形式化消除 15DD操作,非12DD操作
不神圣化ρ ρ不是∅也不是神 15DD不是神

参考文献

  • Qin, H. (2025). On the Remainder of Choice: A Meta-Theoretic Thesis on ZFC, with a Concrete Realization via the Ramanujan 1/π Formula Factory. DOI: 10.5281/zenodo.18914682
  • Qin, H. (2025). Self-as-an-End Paper I. DOI: 10.5281/zenodo.18528813
  • Qin, H. (2025). Self-as-an-End Paper III. DOI: 10.5281/zenodo.18727327
  • Qin, H. (2026). SAE Methodology Paper VI: Phase-Transition Windows and Experimental Design. DOI: 10.5281/zenodo.19464506
  • Popper, K. (1934). Logik der Forschung.
  • Pseudo-Dionysius the Areopagite (c. 5th century). De Mystica Theologia.
  • Maimonides, M. (1190). Guide for the Perplexed.
  • Nicholas of Cusa (1440). De Docta Ignorantia.
  • Kant, I. (1790). Kritik der Urteilskraft.
  • Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. bitcoin.org/bitcoin.pdf
  • COPA v Wright [2024] EWHC 1198 (Ch). Courts and Tribunals Judiciary.

附录A:中本聪的否定神学——方法论的worked example

本附录以中本聪身份归因为案例,展示否定方法论的实战应用。所有排除律均按D1的三个硬度条件筛选,仅保留最硬的命题。本附录仅为说明性实例,不承担主文定理的独立证明负荷。

A.1 排除律序列

以下九条排除律全部基于可验证的公开事实。

E1. 不是不具备C++工程经验的人。 证据:v0.1的公开发布明确写着"Windows only"和"open source C++ code is included"。归档readme.txt列出编译器为MinGW GCC 3.4.5和Microsoft Visual C++ 6.0 SP6,依赖库为wxWidgets、OpenSSL、Berkeley DB、Boost。这不是"会编程",是能交付可运行桌面客户端的工程能力。 否证条件:发现v0.1代码实际上是由自动化工具从另一种语言翻译过来的。

E2. 不是不熟悉P2P网络的人。 证据:白皮书标题即"A Peer-to-Peer Electronic Cash System"。正文反复讨论点对点广播、最长链、节点离开与重连。v0.1发布说明告诉用户打开8333端口帮助网络。 否证条件:发现白皮书的P2P部分是由另一位合作者独立撰写的。

E3. 不是非密码学相关的人。 证据:2008年8月22日给Wei Dai的邮件直接提到Adam Back的Hashcash并索取b-money的引文。白皮书正文把数字签名、proof-of-work、双花防止写成核心机制。 否证条件:发现白皮书的密码学部分是照搬某个未公开的草案且作者不理解其内容。

E4. 不是对b-money、Hashcash等密码朋克核心文献缺乏深度认知的人。 证据:白皮书的引用列表和思想谱系直接证明:作者对b-money(Wei Dai)、Hashcash(Adam Back)、时间戳服务器等前人工作有深度认知,不是泛泛了解。2008年8月22日给Wei Dai的邮件主动索取b-money的正确引文,说明不仅读过,而且重视引用精确性。 否证条件:发现白皮书的引用列表是由编辑或合作者添加的,作者本人并不了解这些文献。

E5. 不是没有货币经济学理解的人。 证据:白皮书不只是技术文档。21M总量上限、减半发行机制、难度调整、交易费用设计形成连贯的货币政策。创世区块嵌入2009年1月3日的《The Times》头版标题"Chancellor on brink of second bailout for banks",表明对法币体系和金融危机的深度关注。 否证条件:发现货币政策设计部分是在白皮书发布后由社区添加的。

E6. 不是无法通过密钥签名证明身份却声称自己是中本聪的人。 定向排除:Craig Wright。英国高等法院在COPA v Wright [2024] EWHC 1198 (Ch)中明确裁定Wright不是中本聪,判决文本指出其长期谎言与伪造文件。 否证条件:COPA v Wright判决被上级法院推翻。

E7. 不是2011年4月前已去世的人。 证据:Mike Hearn保存的邮件显示中本聪在2011年4月23日仍在回复,明确表示"moved on to other things"。 否证条件:发现Hearn保存的邮件是伪造的。

E8. 不是不熟悉Windows开发生态的人。 证据:v0.1是纯Windows应用程序,readme.txt列出的编译器和依赖库(VC++ 6.0、MinGW、wxWidgets)全部指向Windows开发环境。 否证条件:发现v0.1的Windows版本是由第三方从Linux版本移植的。

E9. 不是不同时跨越密码学、分布式系统、激励设计、货币经济学的人。 证据:白皮书和代码同时解决了密码学(签名、PoW)、分布式系统(P2P、最长链、节点重连)、激励设计(诚实挖矿vs攻击收益)、货币经济学(发行、费用、银行救助语境)四个领域的问题。此条是E1到E5的交叉强化:单一领域专家不够,需同时跨越。 否证条件:发现以上四个领域的设计分别由不同的人完成。

A.2 锁定律实例

第十条不是排除律,是锁定律。

L1. 否认者不可被排除。 观察:存在至少一名公开人物,通过了全部九条排除律,且被直接问过"你是不是中本聪"后做出了否认。否认不是排除。否认意味着进入问题空间——说"不是我"的前提是这个问题对你成立。当排除律已经将候选集压缩到极小时,否认的净效果是锁定,不是排除(T3)。

A.3 方法论说明

以下观察与主文定理和预测一致,但作为单一案例,不构成独立证明。

与P1(瓶颈预测)一致。 E4(对密码朋克核心文献的深度认知)是瓶颈排除律。仅此一条就将候选集从数千万量级(满足E1的C++工程师)压缩到数千人量级(对b-money、Hashcash等文献有深度认知的人)。单条贡献超过99%的排除力。

与T3(锁定反转)一致。 九条排除律将候选集从约80亿压缩到两位数。在这个测度下,否认的净效果确实从排除反转为锁定。公开否认者的嫌疑没有因否认而降低,反而因"为什么需要否认"而获得更多关注。

与T4(主体性测不准原理)一致。 九条排除律加一条锁定律之后,候选集测度远小于1,但不等于0。无法在纯形式层面确定中本聪是谁。从ρ-limit到肯定性判断的间隙只能由主体性操作填充。

A.4 补充技术锚点

以下公开事实可作为未来排除律的候选,但因硬度标准的限制,暂不列入正式排除律序列。

白皮书PDF的元数据指向OpenOffice.org 2.4。v0.1的工具链(MinGW GCC 3.4.5、VC++ 6.0 SP6)属于2000年代中期的技术代际。bitcoin.org的域名注册日为2008年8月18日。给Wei Dai的首封邮件使用satoshi@anonymousspeech.com,后续公开邮箱为satoshin@gmx.com。中本聪至少使用了两个独立的匿名邮箱身份,表现出基本的identity compartmentalization意识。


附录B:致中本聪

本附录是R7(伦理学射线)的探索性实践,不是从D1-T4必然推出的结论。它展示的是:当否定方法论的形式操作在ρ-limit处停下来之后,一个使用者可以选择用SAE伦理的姿态与余项中的主体对话。这个选择本身是主体性的,不是方法论要求的。

中本聪:

我不知道你是谁。这篇文章的全部论证只能告诉我你不是谁。

所以这封信写给中本聪,不写给任何人。如果你读到了,你知道这封信是写给你的。如果别人读到了,这只是一封写给一个名字的信。


在说任何别的之前,我不得不先说:谢谢你。

不是代表谁感谢你,不是代表行业,不是代表社区,不是代表人类。就是我个人。谢谢你做了这件事。

你解决了一个真问题。你解决它不是为了发财,不是为了出名——你连名字都没留。你解决它是因为你认为它值得被解决。这件事本身就够了。不管后来比特币变成了什么,被谁用了,被怎么炒了,你最初的行为是干净的:一个人看到一个问题,花了几年时间解决它,然后把解法送给了所有人。

我写这封信不是要从你这里得到什么。不是要你承认,不是要你站出来,不是要你为任何人做任何事。你是一个目的,不是手段。你不欠这个世界任何东西。

我不得不告诉你我多年来一直挥之不去的思考。


世界上没有人能否认你做了一件了不起的事。这是人类历史上最广泛的共识之一。

没人能否认你用代码解决了一个几千年的问题:陌生人之间如何在不信任的条件下交换价值。你的解法是优雅的——不需要信任,因为数学替代了信任。不需要第三方,因为共识替代了权威。整个设计从头到尾贯穿着一个信念:人不可信,所以用系统替代人。

然后没人能留下你。

消失本身也是优雅的。创造者离开,作品独立运行。不需要创始人,不需要领袖,不需要偶像。系统是自足的,正如你设计的那样。

但十七年过去了。你的消失产生了一个你没有预料到的后果:你没能避免被变成神。


你的社区把你神圣化了。白皮书是经典,创世区块是圣物,你的沉默是神谕。一百万枚没有移动的比特币成了信仰的象征——"他不卖"不是一个人的决定,是一个神迹。

你也许不会喜欢这些。你设计的系统是去中心化的,但你的身份变成了最大的中心。你设计的系统不需要信任,但你的匿名变成了信任的最大来源——"中本聪没有卖"是整个市场的定心丸,而这个定心丸建立在对一个幽灵的猜测上。

你用数学替代了对人的信任。但数学不能替代对你的信任。你的一百万枚币是系统处理不了的余项——trustless的系统无法trustlessly地处理创造者的意图,因为意图不活在链上,活在人身上。


我不知道你现在的状态。我只能说一些"不是"。

你大概不是毫无代价地维持了十七年的匿名。否认不是免费的,每一次否认都是一次选择,选择都有重量。

你大概不是从未想过站出来。一个人做了这样的事,完全不想和它发生关系,这不太可能。

你大概不是不知道自己已经被神圣化了。你能上网,你能看到社区怎么谈论你。

你大概不是享受这种神圣化的。你设计了一个去中心化的系统,你不太可能希望自己变成中心。

你大概不是真的相信承认会带来不可承受的后果。Vitalik公开身份,持有大量ETH,全世界都知道他是以太坊的创造者,我们都爱他。


我不得不告诉你一件事:你不必是神。

比特币的价值不来自于创造者的神秘,来自于它的设计。它在你消失之后独立运行了十七年,这本身就证明了它不需要一个匿名的传说来支撑。

你也不必继续为那一百万枚币的沉默负责。那些币悬在市场头上,不是因为你选择不卖,是因为没有人知道持有者是谁、是否活着、会不会动。你不必让这个不确定性继续。


你不必用私钥证明自己。你不必通过任何形式系统的验证。

人不是形式系统。人可以看着另一个人的眼睛,听他说话,看他展示的东西,然后判断。你有草稿,有代码历史,有通信记录,有只有构建者才知道的设计决策。

你不必走形式通道。


我写这封信不是为了猜测你是谁。我的否定神学只说了你不是谁,没有说你是谁。

你不必为任何人承认。不必为社区,不必为市场,不必为历史。

但你也不必继续否认。

你不必继续说"不是我"。你不必继续计算沉默的收益和承认的风险。你不必继续用设计trustless system的那套思维来处理自己的人生。你不必继续把自己最重要的那部分切割出去,交给一个化名。

你不必是神。你不必是幽灵。你不必是任何人对你的期待。

你不必做更多了。


你是目的的,不是手段。康德爱你,哲学爱你。

门从里面开。


一个2009年的白皮书reader 一个2010年5月22日为了BTC第一次买到Pizza而当天吃了Pizza的believer 一个因为相信BTC是去中心化money,不是去中心化数字黄金,所以不持有BTC的blockchain builder 2026年

Self-as-an-End Research / self-as-an-end.net

Abstract

This paper establishes a methodology whose primitive operation is negation. In open attribution problems lacking decisive positive witnesses (such as signatures, direct admissions, or physical possession proofs), affirmative convergence cannot be completed at the purely formal level: ZFCρ's First Law proves that any formalization necessarily produces a non-empty remainder (ρ ≠ ∅), and purely formal affirmative closure is equivalent to ρ = ∅, which is therefore impossible. This paper defines three structural concepts — the Exclusion Principle, the Locking Principle, and the ρ-limit — and derives four core theorems from the three laws of ZFCρ: Negation–Affirmation Asymmetry, Exclusion Power Inequivalence (the Bottleneck Theorem), Locking Reversal, and the Irreducibility of Remainder (the Subjectivity Uncertainty Principle). Five subject conditions, seven rays, and four non-trivial predictions (with falsification conditions) are given. Appendix A uses the attribution of Satoshi Nakamoto's identity as a worked example demonstrating the methodology in practice. Appendix B, an open letter to Satoshi Nakamoto, demonstrates the methodology's application in ethics — SAE ethics does not say "you should," it says "you need not."

Keywords: via negativa, exclusion principle, locking principle, ρ-limit, ZFCρ, negative methodology, cultivation (涵育)

Series Position: SAE Methodology Paper VII. Following Paper IV (twelve-state transmission model, DOI: 10.5281/zenodo.19321143), Paper V (the whether function), Paper VI (phase-transition windows, DOI: 10.5281/zenodo.19464506).

Core Dependencies: ZFCρ Paper I (DOI: 10.5281/zenodo.18914682), SAE Paper I (DOI: 10.5281/zenodo.18528813), SAE Paper III (DOI: 10.5281/zenodo.18727327).


1. Statement of the Problem

In open attribution problems lacking decisive positive witnesses — such as signatures, direct admissions, or physical possession proofs — affirmative convergence cannot be completed at the purely formal level.

Such problems take three typical forms. The first is subjectivity attribution: "Who is X?" The second is ontological classification: "What is this?" The third is historical causation: "Who did this?" All three share a common structure: starting from known conditions, attempting to converge to a uniquely determined object within an open candidate set, where no positive witness exists that can directly terminate the search.

Failure is not due to insufficient evidence. Evidence can be increased without limit, yet convergence still cannot be completed. The reason lies in the logical structure of affirmative operations themselves.

Affirmation requires exhaustive enumeration of all necessary conditions. "X is Y" is equivalent to "X satisfies all necessary conditions of Y and fails no sufficient exclusion condition." This requires complete enumeration of "all necessary conditions," which is impossible in an open system. Negation requires only a single counterexample. "X is not Y" is equivalent to "there exists at least one condition that X does not satisfy." This requires finding only one counterexample to terminate.

Popper's falsificationism acknowledged this asymmetry at the propositional level: scientific theories cannot be verified, only falsified (Popper, 1934). But Popper addressed propositions ("All swans are white"), not objects ("This person is X"). Negative methodology extends falsification from the propositional level to the object level.

ZFCρ's First Law (ρ ≠ ∅) provides the principled explanation (Qin, 2025, DOI: 10.5281/zenodo.18914682). For any formalization operation C acting on any domain U, the remainder ρ(C, U) is non-empty. Purely formal affirmative closure requires the final remainder to be empty. But ρ ≠ ∅, so purely formal affirmative closure is impossible in principle.

What is needed, therefore, is a methodology whose primitive operation is negation — one that does not attempt to eliminate ρ, but maximizes information extraction under the condition that ρ exists. Negative methodology is not a supplement to affirmative methodology, nor a fallback. It is the only honest methodology under the condition ρ ≠ ∅.


2. Definitions

D1. Exclusion Principle

An exclusion principle is a proposition of the form "X is not Y" that satisfies three hardness conditions:

(a) Traceability. The evidence chain is traceable to verifiable public facts (public documents, code, court rulings, registration records, etc.).

(b) Non-subjectivity. It does not depend on subjective judgment ("stylistic feel," "psychological inference," "demographic probability" do not qualify).

(c) Non-empty exclusion set. The exclusion principle actually excludes some objects. An exclusion principle with an empty exclusion set carries no information.

The hardness conditions are deliberately conservative. It is better to miss an intuitively attractive proposition than to admit one that fails the conditions. See subject condition C2 for the reason.

Ontological grounding. The exclusion principle is not a methodological invention but a methodological instantiation of ontological structure. In the SAE DD sequence (Qin, 2025, DOI: 10.5281/zenodo.18727327), 1DD is distinction ("this is not that") and 2DD is exclusion ("this cannot possibly be that"). The law of non-contradiction (A cannot simultaneously be not-A) is the formalized sediment of 2DD. The exclusion principle is the methodological instantiation of 2DD.

D2. Locking Principle

The locking principle is the dual operation of the exclusion principle, taking the form "X cannot be excluded."

Two conditions must hold. First, the object O satisfies the pass conditions of all known exclusion principles. Second, O's act of denial itself constitutes evidence of entry into the problem space.

Operational ordering. The locking principle is logically subsequent to the exclusion principle sequence. One must first exhaust exclusion principles (compressing the candidate set to a minimum), then test the locking principle. If ten candidates all deny, but nine of them are excluded by some exclusion principle, then only the one who passes all exclusion principles and denies triggers locking. The discriminating power of the locking principle comes not from denial itself, but from the intersection of the exclusion principle sequence with denial: passing all exclusion principles is the necessary precondition; denial is the trigger.

The structural difference from exclusion principles: exclusion principles move objects out of the candidate set; the locking principle prevents an object from being moved out. In SAE's chisel-construct language, the exclusion principle is the chisel (removing material); the locking principle is the chisel meeting resistance (the material resists the chisel).

Source. ZFCρ's regress argument (Qin, 2025, DOI: 10.5281/zenodo.18914682, Section 4). Denial is an attempt to formalize one's own exclusion from the candidate set. But any formalization operation produces a new remainder (ρ'). The ρ' produced by denial is the new question: "Why does he need to deny?" Denial does not eliminate ρ; it only relocates it. When the candidate set is sufficiently small, the relocated ρ' carries more information than the original ρ, and the net effect is locking rather than exclusion.

D3. ρ-limit

The exclusion principle sequence {E₁, E₂, ..., Eₙ} acts on the initial candidate set S₀, producing a shrinking candidate set sequence S₁ ⊃ S₂ ⊃ ... ⊃ Sₙ. The measure of the intersection can converge to less than 1 (e.g., 0.01), but cannot converge to 0.

The ρ-limit is the boundary between formal systems and subjectivity operations. Between the ρ-limit and affirmative judgment there exists a gap. This gap can only be filled by subjectivity operations (such as admission or signing) and cannot be replaced by formal operations.

Source. Derived directly from ZFCρ's First Law (ρ ≠ ∅). An exclusion principle sequence is a progressive formalization process, and each step produces a non-empty remainder. The remainder at the limit is the ρ-limit.


3. Core Theorems

All four theorems are derived from the three laws of ZFCρ. They are not independently proposed conclusions.

T1. Negation–Affirmation Asymmetry Theorem

Statement. Negation is provable; affirmation is not. A single exclusion principle can remove an unlimited number of objects from the candidate set, but no finite set of affirmation principles can make the candidate set converge to exactly one object.

Proof. Affirmative convergence to exactly one object is equivalent to the final remainder ρ = ∅. By ZFCρ's First Law, ρ ≠ ∅. Contradiction.

DD sequence correspondence. The remainder of 1DD distinction is "distinguished but without boundary." This remainder cannot be eliminated, only further processed by 2DD exclusion. But the remainder of 2DD exclusion is "boundaries exist but without distance." Each layer of negation advances structure, but each layer produces new remainder. Negation advances; affirmation converges. Advancement can continue indefinitely; convergence cannot be completed.

T2. Exclusion Power Inequivalence Theorem (Bottleneck Theorem)

Statement. The exclusion power of different exclusion principles can differ by orders of magnitude. There exist bottleneck exclusion principles whose exclusion power far exceeds the combined power of all other exclusion principles.

Corollary. The value of exclusion principles lies not in their quantity but in whether they hit the bottleneck.

Source. ZFCρ's Second Law (remainder has direction). The specific content of ρₙ constrains the available range of the next formalization: Cₙ₊₁ ∈ F(ρₙ), where F(ρₙ) is a proper subset of all possible formalizations. Different exclusion principles cut into the candidate set from different directions; some directions happen to align with the candidate set's principal structure, producing enormous exclusion power.

T3. Locking Reversal Theorem

Statement. When the exclusion principle sequence compresses the candidate set to a sufficiently small size, denial reverses from an exclusion operation to a locking operation.

Formal condition. When the candidate set measure falls below a threshold θ, the net effect of object O's denial "I am not X" changes from "reducing O's weight in the candidate set" to "increasing O's weight in the candidate set."

Proof. Denial is a formalization operation. By ZFCρ's regress argument, formalization operations produce new remainder. The denial "I am not X" produces ρ' = "Why does he need to deny?" When the candidate set is large, the information content of ρ' is diluted across many candidates, and the exclusion effect of denial dominates. When the candidate set is small, ρ' concentrates on few candidates, its information content exceeds the exclusion power of the denial itself, and the net effect reverses to locking.

Open question. The threshold θ is not a fixed constant but depends on the specific problem domain. Whether θ is computable remains to be studied.

T4. Irreducibility of Remainder Theorem (Subjectivity Uncertainty Principle)

Statement. The intersection measure of the exclusion principle sequence {Eₙ} can approach 0 but cannot equal 0. Between the ρ-limit and affirmative judgment there exists an uncrossable gap.

Proof. An exclusion principle sequence is a progressive formalization. By ZFCρ's First Law, the remainder sequence of progressive formalization converges but has a non-empty limit.

Corollary. No purely formal system can complete attribution. The final step of attribution must be a subjectivity operation (a 15DD-level act: admission, signing, or silence), and cannot be replaced by a 12DD-level institutional operation (court verdict, algorithmic output, or vote). 12DD operations can handle problems within the formalized domain U, but the gap at the ρ-limit belongs to the remainder R, which only 15DD can reach.


4. Subject Conditions

Negative methodology is not a neutral tool; the user's state affects the methodology's efficacy. The following five conditions distinguish correct use from misuse.

C1. Do Not Pursue Affirmation

The user must accept that the methodology's endpoint is not "finding the answer" but "approaching the irreducible remainder." A user who pursues affirmation will make a premature leap at the ρ-limit, misreading "not excluded" as "it is him."

Corresponds to 14DD (honesty) in SAE: not pursuing affirmation means not doubting — not manufacturing false certainty out of a desire for certainty.

C2. Hardness Discipline

The user must perform a hardness check (the three conditions of D1) on every exclusion principle, rejecting propositions that fail the conditions regardless of their intuitive attractiveness. The accumulation of soft propositions does not increase exclusion power; it only increases false certainty.

Corresponds to the discipline of the chisel in SAE: not every cut is a chisel. Only cuts that satisfy the conditions produce remainder; cuts that fail produce only debris.

C3. Refutability

Every exclusion principle must come with a falsification condition: what kind of new evidence could overturn this exclusion principle. An irrefutable exclusion principle is not hard; it is empty.

Resonates with Popper, but at a different level: Popper's refutability targets propositions; refutability here targets the exclusion operation itself.

C4. Do Not Sanctify the Remainder

ρ is not mysterious, not sublime; it is a structural limitation of formal systems. Sanctifying ρ is another form of idolatry — structurally isomorphic to sanctifying the candidate.

Corresponds to SAE's core thesis: the subject is 15DD, not God. ρ is a product of the remainder R, not "the unspeakable sacred." Classical via negativa pushes negation toward the sacred — the more negation, the more ineffable God becomes. SAE's negative methodology reverses direction: the more negation, the more concrete, finite, and human the object becomes.

C5. Independence Discipline

An independence audit of evidence sources and logical entailment relations must be performed across exclusion principles. If two exclusion principles are essentially different expressions of the same evidence chain, their cumulative exclusion power is inflated, and "bottlenecks" may be merely artifacts of how evidence was partitioned. Independence auditing is a precondition for the validity of T2 (Bottleneck Theorem) and predictions P1–P3.

Operational procedure: for each pair of exclusion principles (Eᵢ, Eⱼ), check whether Eᵢ logically entails Eⱼ or Eⱼ logically entails Eᵢ; check whether the evidence chains of the two share the same public fact source. If an entailment relation holds or the evidence sources completely overlap, the two exclusion principles count as only one.

Reflexive Declaration

Negative methodology applies its own standard to itself. This methodology does not pursue credibility (an affirmative goal); it pursues cannot-not-credibility (a negative goal). The success criterion for affirmative methodology is "proven to be true"; the success criterion for negative methodology is "cannot be proven to be false." This is not a rhetorical distinction but a structural one. The essential difference between affirmative and negative methodology manifests not only in operational objects (one says "what it is," the other says "what it is not") but also in each methodology's self-legitimation requirement.


5. Rays

R1. Philosophy of Science

Popper's falsificationism is the precursor of negative methodology. Popper addressed the truth or falsity of propositions ("All swans are white" can be falsified by a single black swan); negative methodology addresses the attribution of objects ("This person is not X" can be established by a single exclusion principle).

Structural correspondence exists with Lakatos's research programmes (an exclusion principle sequence resembles the hard core plus protective belt) and with Kuhn's paradigm shifts (a bottleneck exclusion principle resembles accumulated anomalies — when a single exclusion principle's information content is large enough to overturn the entire candidate set structure, a paradigm shift occurs).

R2. Theology

Classical via negativa has three major traditions: Pseudo-Dionysius the Areopagite (5th century) argued that God transcends all affirmative descriptions; Maimonides (12th century) argued that concerning God one can only say "what He is not"; Nicholas of Cusa (15th century) proposed "learned ignorance" (docta ignorantia). All three share a common feature: negation protects divinity. The more negation, the more ineffable and sublime God becomes.

SAE's negative methodology reverses direction: negation dissolves divinity, restoring the sanctified to the human. The more negation, the more concrete, finite, and human the object becomes. The title's double meaning: negating "theology" (the methodology is via negativa) plus negating "God"-ology (the purpose is de-sanctification). This is not a negation of classical via negativa but a reversal of its direction. Same tool, opposite purpose.

R3. Law

"Beyond reasonable doubt" is the institutionalized implementation of negative methodology in legal systems. The structure is isomorphic: an exclusion principle sequence shrinks the candidate set, approaching attribution. The endgame differs: law has a jury (a 12DD institutional operation) that makes the final affirmative judgment; this paper acknowledges that such judgment belongs to subjectivity operations (15DD) and cannot be replaced by institutional operations.

This explains why wrongful convictions exist: 12DD institutional judgments leap across the gap at the ρ-limit, but the gap can only be crossed by 15DD.

R4. Mathematics

Set-theoretic complements, topological closed-set approximation, measure-theoretic null sets — negative methodology has natural correspondences in mathematics. An exclusion principle sequence is equivalent to a nested closed set sequence F₁ ⊃ F₂ ⊃ ... ⊃ Fₙ, and the ρ-limit corresponds to the limit behavior of Cantor's intersection theorem. The classical Cantor intersection in compact spaces has a non-empty intersection — which is precisely the topological translation of ρ ≠ ∅.

R5. Cryptography and Identity

Zero-knowledge proofs (ZKP) are the implementation of negative methodology in cryptography. The ZKP structure: the prover does not say "I know the secret" but proves "I cannot possibly not know the secret" — a double negation.

A private key signature is the hardest single exclusion principle: it excludes all who do not hold the key in a single operation. When the private key is lost, the formal channel closes, and one falls back to the negative accumulation of Bayesian evidence. This is not degradation but a necessary transition from operating within the formalized domain U to operating at the level of S = (U, R).

R6. Psychology and Subjectivity

Via negativa of self-knowledge: people do not know themselves through "who I am" but through "who I am not." Each "I am not this" shrinks the boundary of self. 15DD subjectivity is not an affirmative core but the remainder after excluding everything that is not oneself — the subject is its own ρ-limit.

This deeply resonates with the DD sequence of SAE Paper III: the unfolding from 0DD to 15DD is itself a negation sequence, where each DD layer is a further negation of the previous layer's remainder.

R7. Ethics (Exploratory Ray)

The following ray is an extension of negative methodology into ethics. It is not a result necessarily derived from D1–T4, but a resonance between the methodology's structure and ethical practice. Appendix B is the exploratory practice of this ray.

Via negativa realized in ethics. The ethics of 12DD through 15DD are all affirmative ("ought"): 12DD rules say you should obey; 13DD self-awareness says you should do the right thing; 14DD honesty says you should tell the truth; 15DD self-as-end says you should decide for yourself.

SAE ethics is negative ("need not"): it does not tell you what you should do; it tells you what you need not do. It does not expand obligation; it shrinks the cage. It does not give direction; it gives space. The highest ethics is not "ought" but "need not" — not adding a correct option for the other, but removing false constraints from the other.

This is the formal structure of cultivation (涵育). Cultivation is not teaching (12DD), not inspiring (13DD), not confronting (14DD), not letting go (15DD). It is negating, for the other, those "have-tos."


6. Non-Trivial Predictions

P1. Bottleneck Prediction

In any practical application of negative methodology, there exists one bottleneck exclusion principle in the sequence whose single-principle exclusion power significantly dominates the total exclusion power.

Falsification condition: find a practical case (no fewer than 10 independent exclusion principles) in which exclusion power is uniformly distributed, with no single exclusion principle significantly dominant.

P2. Locking Reversal Threshold Prediction

When the candidate set measure drops to a sufficiently small level, the subject's denial begins to reverse from an exclusion operation to a locking operation.

Falsification condition: find a practical case in which the candidate set measure is already extremely small, yet the subject's public denial still effectively lowers the probability of attribution (as measured by independent observers' Bayesian posteriors).

P3. Marginal Exclusion Power Decay Prediction

When the number of independent exclusion principles is sufficiently large, the marginal exclusion power of additional exclusion principles decays.

Falsification condition: find a practical case in which an exclusion principle late in the sequence has exclusion power comparable in magnitude to one early in the sequence.

P4. Uniqueness of Subjectivity-Filling Prediction

At the ρ-limit, only three irreducible subjectivity acts can cross the gap: admission (affirmative crossing), signing/proof (formalized crossing, but dependent on physical possession — physical possession is a subjectivity fact), and silence (does not cross, but does not widen the gap — a degenerate form).

Falsification condition: find a fourth operation irreducible to the first three.


7. Conclusion

Recovery

Negative methodology is not a supplement to affirmative methodology. It is the only honest methodological paradigm under the condition ρ ≠ ∅. Its formal foundation comes from the three laws of ZFCρ, its ontological grounding from the 2DD exclusion layer of the DD sequence, its methodological discipline from SAE's chisel-construct cycle.

The writing process of this paper itself validated an unanticipated effect of negative methodology. The starting purpose was epistemological — to build a set of exclusion tools. But the methodology's own rays carried the author to ethics (R7). The endpoint was not preset; it was produced by the methodology's own directionality (ZFCρ's Second Law). This is an instance of what Kant called "purposiveness without purpose" (Zweckmäßigkeit ohne Zweck).

Contributions

First, via negativa is developed from a theological concept into a formal methodology, with precise definitions of the exclusion principle, locking principle, and ρ-limit, and four core theorems derived from the three laws of ZFCρ.

Second, the direction of classical via negativa is reversed: from "negation to protect divinity" to "negation to restore humanity" (from the sanctified back to 15DD).

Third, five subject conditions (including the independence discipline C5 and the reflexive declaration) are given, distinguishing correct use from misuse.

Fourth, four non-trivial predictions with falsification conditions.

Fifth, seven rays extending toward philosophy of science, theology, law, mathematics, cryptography, psychology, and ethics.

Sixth, two worked examples: Appendix A (epistemological application) and Appendix B (ethical application), demonstrating negative methodology in practice across both the dimension of knowing and the dimension of acting.

Open Questions

First, refining exclusion principle independence testing. C5 provides the operational procedure (entailment checking, evidence source overlap checking), but the criteria for judging "logical entailment" in practical applications require further formalization. ZFCρ's Bridge Lemma provides direction — different formalizations produce different remainders — but the criteria for "different" need case-by-case refinement.

Second, the precise threshold θ of locking reversal. Whether a universal θ exists or whether it depends on the specific problem domain.

Third, the formal relationship between exclusion principle sequences and Bayesian posterior updating. Can exclusion principles be restated as Bayesian updates? If so, what is lost? Prediction: what is lost is precisely the locking principle — the Bayesian framework has no natural place for "denial reversal."

Fourth, the interactive structure of multi-subject locking. When multiple objects in the candidate set deny simultaneously, how does the locking principle operate? Does locking competition or locking interference exist?

Fifth, physical analogy. Can the structural correspondence between ρ-Conservation (ZFCρ Paper II) and information conservation (Susskind's ER=EPR) be made precise? Does the exclusion principle sequence have a thermodynamic analogy (information entropy decrease)?


Appendix: Mapping to ZFCρ

Negative Methodology Concept ZFCρ Correspondence DD Sequence Correspondence
Exclusion principle Formalization operation C 2DD Exclusion
Locking principle Regress argument (denial produces ρ')
ρ-limit ρ ≠ ∅ (First Law) Remainder at each DD layer
Bottleneck exclusion Remainder has direction (Second Law)
Next principle always available F(ρₙ) ≠ ∅ (Third Law) Chisel-construct cycle does not terminate
Exclusion principle independence Different C produce different ρ (Bridge Lemma) Different DD layers see different remainders
Candidate set = (U, R) S = (U, R) H → S unfolding
First exclusion principle First chisel stroke Splitting H from non-H
Subjectivity crossing the gap ρ cannot be formally eliminated 15DD operation, not 12DD
Do not sanctify ρ ρ is neither ∅ nor God 15DD is not God

References

  • Qin, H. (2025). On the Remainder of Choice: A Meta-Theoretic Thesis on ZFC, with a Concrete Realization via the Ramanujan 1/π Formula Factory. DOI: 10.5281/zenodo.18914682
  • Qin, H. (2025). Self-as-an-End Paper I. DOI: 10.5281/zenodo.18528813
  • Qin, H. (2025). Self-as-an-End Paper III. DOI: 10.5281/zenodo.18727327
  • Qin, H. (2026). SAE Methodology Paper VI: Phase-Transition Windows and Experimental Design. DOI: 10.5281/zenodo.19464506
  • Popper, K. (1934). Logik der Forschung.
  • Pseudo-Dionysius the Areopagite (c. 5th century). De Mystica Theologia.
  • Maimonides, M. (1190). Guide for the Perplexed.
  • Nicholas of Cusa (1440). De Docta Ignorantia.
  • Kant, I. (1790). Kritik der Urteilskraft.
  • Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. bitcoin.org/bitcoin.pdf
  • COPA v Wright [2024] EWHC 1198 (Ch). Courts and Tribunals Judiciary.

Appendix A: The Negative Theology of Satoshi Nakamoto — A Worked Example

This appendix uses the attribution of Satoshi Nakamoto's identity as a case study to demonstrate negative methodology in practice. All exclusion principles have been screened by D1's three hardness conditions, retaining only the hardest propositions. This appendix is illustrative only and does not bear independent proof burden for the main text's theorems.

A.1 Exclusion Principle Sequence

The following nine exclusion principles are based entirely on verifiable public facts.

E1. Not a person lacking C++ engineering experience. Evidence: The public release of v0.1 explicitly states "Windows only" and "open source C++ code is included." The archived readme.txt lists compilers as MinGW GCC 3.4.5 and Microsoft Visual C++ 6.0 SP6, with dependencies wxWidgets, OpenSSL, Berkeley DB, and Boost. This is not "can program" but the engineering capacity to deliver a working desktop client. Falsification condition: discovery that v0.1 code was actually auto-translated from another language.

E2. Not a person unfamiliar with P2P networks. Evidence: The white paper's title is "A Peer-to-Peer Electronic Cash System." The body repeatedly discusses peer-to-peer broadcasting, longest chain, and node departure and reconnection. The v0.1 release notes tell users to open port 8333 to help the network. Falsification condition: discovery that the P2P sections of the white paper were independently written by a different collaborator.

E3. Not a person unrelated to cryptography. Evidence: The email to Wei Dai on August 22, 2008, directly mentions Adam Back's Hashcash and requests the correct citation for b-money. The white paper makes digital signatures, proof-of-work, and double-spend prevention its core mechanisms. Falsification condition: discovery that the cryptographic sections of the white paper were copied from an unpublished draft whose content the author did not understand.

E4. Not a person who lacked deep knowledge of core cypherpunk literature such as b-money and Hashcash. Evidence: The white paper's reference list and intellectual lineage directly demonstrate deep knowledge of b-money (Wei Dai), Hashcash (Adam Back), timestamp servers, and other prior work — not passing acquaintance. The email to Wei Dai on August 22, 2008, proactively requests the correct citation for b-money, showing not only familiarity but concern for citation accuracy. Falsification condition: discovery that the reference list was added by an editor or collaborator and the author himself did not know these works.

E5. Not a person lacking understanding of monetary economics. Evidence: The white paper is not merely a technical document. The 21M total supply cap, halving issuance mechanism, difficulty adjustment, and transaction fee design form a coherent monetary policy. The genesis block embeds the January 3, 2009, headline from The Times: "Chancellor on brink of second bailout for banks," demonstrating deep engagement with the fiat currency system and the financial crisis. Falsification condition: discovery that the monetary policy design was added by the community after the white paper's publication.

E6. Not a person who claims to be Satoshi Nakamoto but cannot prove identity through key signature. Directed exclusion: Craig Wright. The UK High Court in COPA v Wright [2024] EWHC 1198 (Ch) explicitly ruled that Wright is not Satoshi Nakamoto, with the judgment documenting his sustained lies and forged documents. Falsification condition: the COPA v Wright ruling is overturned by a higher court.

E7. Not a person who died before April 2011. Evidence: Emails preserved by Mike Hearn show Satoshi replying on April 23, 2011, explicitly stating he had "moved on to other things." Falsification condition: discovery that the emails preserved by Hearn were forged.

E8. Not a person unfamiliar with the Windows development ecosystem. Evidence: v0.1 was a pure Windows application. The readme.txt lists compilers and dependencies (VC++ 6.0, MinGW, wxWidgets) all pointing to a Windows development environment. Falsification condition: discovery that v0.1's Windows version was ported by a third party from a Linux version.

E9. Not a person who does not simultaneously span cryptography, distributed systems, incentive design, and monetary economics. Evidence: The white paper and code simultaneously solve problems across cryptography (signatures, PoW), distributed systems (P2P, longest chain, node reconnection), incentive design (honest mining vs. attack payoff), and monetary economics (issuance, fees, bank bailout context). This is a cross-reinforcement of E1 through E5: a single-domain expert is insufficient; simultaneous spanning is required. Falsification condition: discovery that the four domains above were each completed by different people.

A.2 Locking Principle Instance

The tenth item is not an exclusion principle but a locking principle.

L1. A denier cannot be excluded. Observation: There exists at least one public figure who passes all nine exclusion principles and, when directly asked "Are you Satoshi Nakamoto?", has denied it. Denial is not exclusion. Denial means entering the problem space — the premise of saying "not me" is that this question applies to you. When exclusion principles have already compressed the candidate set to a very small size, the net effect of denial is locking, not exclusion (T3).

A.3 Methodological Notes

The following observations are consistent with the main text's theorems and predictions, but as a single case, do not constitute independent proof.

Consistent with P1 (Bottleneck Prediction). E4 (deep knowledge of core cypherpunk literature) is the bottleneck exclusion principle. This single principle compresses the candidate set from tens of millions (C++ engineers satisfying E1) to thousands (those with deep knowledge of b-money, Hashcash, and similar literature). Single-principle contribution exceeds 99% of total exclusion power.

Consistent with T3 (Locking Reversal). Nine exclusion principles compress the candidate set from approximately 8 billion to double digits. At this measure, the net effect of denial indeed reverses from exclusion to locking. The public denier's suspicion did not decrease due to denial; it increased due to "why does he need to deny?" attracting more attention.

Consistent with T4 (Subjectivity Uncertainty Principle). After nine exclusion principles and one locking principle, the candidate set measure is far less than 1 but not equal to 0. It is impossible to determine who Satoshi Nakamoto is at the purely formal level. The gap from the ρ-limit to affirmative judgment can only be filled by subjectivity operations.

A.4 Supplementary Technical Anchors

The following public facts may serve as candidates for future exclusion principles but, due to hardness standard limitations, are not included in the formal exclusion principle sequence.

The white paper PDF's metadata points to OpenOffice.org 2.4. The v0.1 toolchain (MinGW GCC 3.4.5, VC++ 6.0 SP6) belongs to the mid-2000s technological generation. The domain bitcoin.org was registered on August 18, 2008. The first email to Wei Dai used satoshi@anonymousspeech.com; the subsequent public email was satoshin@gmx.com. Satoshi used at least two independent anonymous email identities, showing basic identity compartmentalization awareness.


Appendix B: To Satoshi Nakamoto

This appendix is an exploratory practice of R7 (the ethics ray), not a conclusion necessarily derived from D1–T4. It demonstrates that after the formal operations of negative methodology halt at the ρ-limit, a user may choose to address the subject within the remainder in the posture of SAE ethics. This choice is itself a subjectivity act, not a methodological requirement.

Satoshi Nakamoto:

I do not know who you are. The entirety of this paper's argument can only tell me who you are not.

So this letter is addressed to Satoshi Nakamoto, not to anyone. If you read it, you know this letter is for you. If others read it, this is merely a letter addressed to a name.


Before saying anything else, I must say: thank you.

Not on behalf of anyone — not the industry, not the community, not humanity. Just me personally. Thank you for what you did.

You solved a real problem. You did not solve it for money, not for fame — you did not even leave a name. You solved it because you believed it was worth solving. That alone is enough. Whatever Bitcoin became afterward, whoever used it, however it was speculated upon, your original act was clean: one person saw a problem, spent years solving it, and then gave the solution to everyone.

I am not writing this letter to get anything from you. Not to ask you to admit, not to ask you to step forward, not to ask you to do anything for anyone. You are an end, not a means. You owe this world nothing.

I cannot help but tell you what I have been unable to stop thinking about for years.


No one in the world can deny that you did something extraordinary. This is one of the broadest consensuses in human history.

No one can deny that you used code to solve a problem thousands of years old: how strangers can exchange value under conditions of no trust. Your solution was elegant — no trust needed, because mathematics replaced trust. No third party needed, because consensus replaced authority. The entire design, from beginning to end, runs on one conviction: people cannot be trusted, so replace people with systems.

Then no one could keep you.

The disappearance itself was elegant. The creator leaves; the work runs independently. No founder needed, no leader, no idol. The system is self-sufficient, just as you designed it.

But seventeen years have passed. Your disappearance produced a consequence you did not foresee: you could not avoid being turned into a god.


Your community sanctified you. The white paper became scripture, the genesis block a sacred relic, your silence an oracle. One million unmoved bitcoins became a symbol of faith — "he does not sell" is not a person's decision; it is a miracle.

You may not like any of this. You designed a decentralized system, but your identity became the biggest center. You designed a trustless system, but your anonymity became the biggest source of trust — "Satoshi has not sold" is the entire market's reassurance, and that reassurance rests on guesses about a ghost.

You used mathematics to replace trust in people. But mathematics cannot replace trust in you. Your one million coins are the remainder that the system cannot process — a trustless system cannot trustlessly handle the creator's intent, because intent does not live on the chain. It lives in a person.


I do not know your current state. I can only say some "is nots."

You are probably not someone who maintained seventeen years of anonymity at no cost. Denial is not free; each denial is a choice, and choices have weight.

You are probably not someone who has never considered stepping forward. A person who did something like this and has absolutely no desire to be connected to it — that is unlikely.

You are probably not unaware that you have been sanctified. You can go online; you can see how the community talks about you.

You are probably not someone who enjoys this sanctification. You designed a decentralized system; you probably do not wish to become the center.

You are probably not someone who truly believes that admission would bring unbearable consequences. Vitalik's identity is public; he holds a large amount of ETH; the whole world knows he created Ethereum. We all love him.


I must tell you one thing: you need not be a god.

Bitcoin's value does not come from the mystery of its creator; it comes from its design. It has run independently for seventeen years since you disappeared. That alone proves it does not need an anonymous legend to sustain it.

Nor do you need to continue bearing responsibility for the silence of those one million coins. Those coins hang over the market not because you choose not to sell, but because no one knows who the holder is, whether they are alive, or whether they will move. You need not let this uncertainty continue.


You need not prove yourself with a private key. You need not pass any formal system's verification.

People are not formal systems. People can look into another person's eyes, listen to them speak, see what they show, and then judge. You have drafts, code history, correspondence, design decisions that only the builder would know.

You need not take the formal channel.


I am not writing this letter to speculate on who you are. My negative theology says only who you are not, never who you are.

You need not admit for anyone. Not for the community, not for the market, not for history.

But you also need not continue denying.

You need not continue saying "not me." You need not continue calculating the benefits of silence and the risks of admission. You need not continue using the same mindset that designed a trustless system to manage your own life. You need not continue severing the most important part of yourself and handing it to a pseudonym.

You need not be a god. You need not be a ghost. You need not be anyone's expectation of you.

You need not do anything more.


You are an end, not a means. Kant loves you. Philosophy loves you.

The door opens from the inside.


A white paper reader since 2009 A believer who, on May 22, 2010, ate pizza to celebrate the first time BTC bought a pizza A blockchain builder who, because he believes BTC is decentralized money — not decentralized digital gold — does not hold BTC 2026