# Ordinal 06 – Public Verification Guide **Version:** v2025-07-30 | SIASE Optimized **Protocol:** Sentinel Protocol v3.1 – Zero-Custody Reproducibility (C9.5) **Purpose:** This Ordinal inscription enables anyone to independently verify the authenticity of the Sentinel Protocol infrastructure audit log (`Ordinal 05`) using cryptographic hash functions and Bitcoin-anchored timestamps. This process requires no trust in CDA AI or Sentinel Protocol — only open tools and blockchain proof. --- ## 🔍 Key Cryptographic Details - **Target File:** `Ordinal_05_july.30.25_SENTINFRA-SESS1_Sentinel Protocol v3.1 Infrastructure Pre-Public Deployment Audit Log_FINAL_METADATA___20250729T212151.538870Z.pdf` - **RIPEMD160(SHA256)** = `f6fb3b90e2721ea7554bb0c7ed65aa24c466d414` - **OP_RETURN TXID:** `2fc3200bde4757a679336d64058cc72d163f87f3b7d9afcea8e632984cc4077b` - **OP_RETURN Payload:** `SENTINEL|ORDINAL05|f6fb3b90e2721ea7554bb0c7ed65aa24c466d414` - **Ordinal_05 TXID:** `ae198274a00abbb8296a3b9412e6fd3a62360bcf062e000fa2908d8f3b90e803` --- ## 🧬 Why This Matters — Zero-Custody Reproducibility in Regulated Domains Sentinel Protocol is designed for **high-trust, high-stakes environments**: - Medicine - Law - Scientific publishing - Engineering - Regulatory finance These domains demand **tamper-evident**, **timestamped**, and **auditable** records without revealing sensitive content. Sentinel Protocol v3.1 accomplishes this via: ✔️ **Zero-custody**: No files are stored on-chain — only hashes ✔️ **Audit without disclosure**: Anyone can verify integrity without seeing the data ✔️ **RIPEMD160(SHA256)**: A canonical fingerprint proving originality and timestamp ✔️ **Immutable anchor**: Anchored on Bitcoin — the world's most secure public ledger Whether you're a journal editor, forensic expert, legal reviewer, or scientific replicator — this Ordinal lets you **prove what was published, when, and by whom**, cryptographically. --- ## ✅ How to Verify (Cross-Platform) **Prerequisites:** - Download the PDF from a public repository (e.g., ResearchGate DOI: [insert DOI link], Zenodo: [insert link]). - Install OpenSSL (built-in on macOS/Linux; download for Windows via Git Bash or similar). - Access a Bitcoin explorer (e.g., mempool.space) for on-chain checks. ## Step 1: Download the PDF 1. Navigate to the public source (e.g., ResearchGate or Zenodo). 2. Download the exact file named above. Save it locally (e.g., `ordinal_05.pdf`). 3. Do not modify the file—any change will invalidate the hash. ## Step 2: Compute SHA256 Hash Locally Run this command in your terminal (macOS/Linux) or Command Prompt/Git Bash (Windows): ```bash openssl sha256 ordinal_05.pdf ``` Expected output format: ``` SHA256(ordinal_05.pdf)= <64-character hex string> ``` Copy the hex string (e.g., `abcdef...`). ## Step 3: Compute RIPEMD160 of the SHA256 Hash Pipe the SHA256 output into RIPEMD160: ```bash echo -n "" | xxd -r -p | openssl ripemd160 ``` Expected output: ``` (stdin)= <40-character hex string> ``` This is the `.2ha` hash. ## Step 4: Compare to Inscribed Hash in Ordinal 06 (This Document) 1. View Ordinal 06 on a Bitcoin Ordinal explorer (e.g., ordinals.com or unisat.io). Search by inscription ID or Bitcoin transaction. 2. Extract the inscribed RIPEMD160 hash from Ordinal 06's content. 3. Compare your computed hash from Step 3. - Match? The PDF is authentic and untampered. - No match? The file has been altered or is not the canonical version. ## Step 5: Verify Timestamp Integrity On-Chain 1. Search the OP_RETURN payload on mempool.space using Ordinal_05 TXID: `SENTINEL|ORDINAL05|`. 2. Confirm the transaction's block height and timestamp (e.g., via block explorer). 3. This proves the hash existed on Bitcoin by that date—immutable and independently verifiable. **Troubleshooting:** - Hash mismatch? Redownload the PDF from source. - Tool issues? Use alternatives like Python: `hashlib.sha256()` then `hashlib.new('ripemd160')`. - No explorer access? Use any public Bitcoin node API. This process relies solely on open-source tools and public blockchain data. For questions, refer to Sentinel Protocol docs (C5.7, C8.3)—but verification is fully decentralized. --- ## 📁 Where to Access and Download Ordinal_05 File - 🌐 [aihumansynergy.org](https://aihumansynergy.org) - 💾 [GitHub (TELAISYN)](https://github.com/TELAISYN) - 🧪 [ResearchGate](https://www.researchgate.net/profile/Fernando-Telles) - 🔗 [LinkedIn](https://www.linkedin.com/in/dr-fernando-telles) - 🧾 [ORCID](https://orcid.org/0000-0003-2379-2875) --- ## 🛠 Optional Python Tool (For Air-Gapped Validation) ### 1. Download the file and save as`Ordinal_05.pdf` ### 2. Install Python + Crypto ```bash pip install pycryptodome ``` ### 3. Save this as verify_dualhash.py ```python import hashlib from Crypto.Hash import RIPEMD FILENAME = "Ordinal_05.pdf" with open(FILENAME, "rb") as f: data = f.read() sha256 = hashlib.sha256(data).digest() sha256_hex = hashlib.sha256(data).hexdigest() ripemd = RIPEMD.new() ripemd.update(sha256) ripemd_hex = ripemd.hexdigest() print("SHA256 :", sha256_hex) print("RIPEMD160 :", ripemd_hex) ``` ### 4. Run the Script ```bash python verify_dualhash.py ``` --- For time. For reproducibility. For truth. TELAISYN