222pm
Mr. Smokey Bacon
✓ Verified-----BEGIN PUBLIC KEY-----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB...
222pm • 4 artifacts • Oct 15, 2025
WHAT-CAN-I-DO-DO.txt, appended-description.txt, chain-of-title.txt...
c2ad9bfda7f14bafdc74f5b757d2960b2f0790d82e9a1ddf378ab2432476a36d
EPmZNtoePs1R54aXJYzjEigaNmBEoRDs...
🌳 Merkle Tree Construction
Step-by-step cryptographic proof showing how all artifacts are bound together
📄 Level 0: Leaf Nodes (Individual File Hashes)
Each file's content is hashed using SHA-256 to create a unique fingerprint. These are the "leaves" of the Merkle tree.
edb97c9ee46266d4e6481c72dabf2af5dea7e50b59e216753d9a803b989d1ebb
89ad43a4ac435c9850b8ca864ceaf471132772db923ded889b540d031feee21d
0d9bf359a137a6835a34e6d13aefa431d1651ea2a2fa5a06bbfb19a6bf9fd777
c86a9c99faf2817c95476ab36daedbada98bf797c5c66f930be2c0396a5c6a56
🔗 Level 1: Intermediate Nodes
Pairs of hashes from the level below are combined and hashed together to create this level.
edb97c9ee46266d4e6481c72dabf2af5dea7e50b59e216753d9a803b989d1ebb...
89ad43a4ac435c9850b8ca864ceaf471132772db923ded889b540d031feee21d...
15f4ed36c8263d1dc33061986fc763763284270291a39d1ba62b9d6fbbbc3b04
0d9bf359a137a6835a34e6d13aefa431d1651ea2a2fa5a06bbfb19a6bf9fd777...
c86a9c99faf2817c95476ab36daedbada98bf797c5c66f930be2c0396a5c6a56...
a293a43416ca15f9de69f47d3019dd907d17b8ece298a7b6f7a89916641b699d
✅ MERKLE ROOT (Final Level)
This is the single hash that represents ALL files in the collection. This root hash is included in the manifest that gets digitally signed.
c2ad9bfda7f14bafdc74f5b757d2960b2f0790d82e9a1ddf378ab2432476a36d
- Any change to ANY file will change its hash (leaf node)
- This changes all parent nodes up to the root
- The digital signature validates this specific root hash
- Therefore: ALL files are cryptographically proven by ONE signature