╔══════════════════════════════════════════════════════════════════╗
║ GENESIS PROTOCOL v4 ║
║ High Resonance & Coherence Protocol (PRAT) ║
║ ║
║ "What cannot be measured is not truth; ║
║ What is not invariant is manipulation." ║
╚══════════════════════════════════════════════════════════════════╝
Author: Gonzalo Emir Durante
Status: Sovereign Technical Asset
Version: 1.0.0
This repository is sealed under the Protocol of High Resonance and Coherence. Any modification to the following hashes without the Origin Node's signature invalidates the model's sovereign certification.
{
"generated_at": "2026-01-09T08:23:52.118442Z",
"generator": "ACI Repository Hash Generator v1.0",
"author": "Gonzalo Emir Durante",
"root_hash": "606a347f6e2502a23179c18e4a637ca15138aa2f04194c6e6a578f8d1f8d7287",
"cid": "bafybeihqz3x7k5t2m4n6p8r9s1v3w5y7a9c1e3g5i7k9m1o3q5s7u9w1y3",
"merkle_root": "0837a8c37a7220465f14c329cf25b8293796ef64974a0baf655a891899c1d7d6",
"total_files": 28
}
"Core"
"Core\\degradation_index.py": "185f00193a2d8d0ccabf6fd1ae59bd7181026363780c14722f2e3ec973670951",
"Core\\Forensic_analizer.py": "bef90b0762bc6a32d9c11762879c0f88616dbe859291e2c9bc281847a71b3b50",
"Core\\invariance_engine.py": "0c404c3525dbf9076e3d05a25af766b7fcc652402f4bd4bd5a6f4448700643b1",
"Core\\semantic_vector_space.py": "44f22e6e72d5771047f6021eaf52eb8be29412b2a4d6664a97214ed1e66e9b59",
"Core\\shannon_entropy.py": "b617f18c637c41a48b83f86d1486c92fc242bc8631c5a7744e4b76085716b984",
"Core\\truth_invariance.py": "271a500a2cb24d3251d3113db9cd6ee88dc1e54759537ff16f649ca58fc9fb89",
"Core\\__init__.py": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855"
"Audit\\alert_system.py": "560985ec370cd1b967f5914b0605275c22ebccbf936d485f427fa13f3e69c5d8",
"Audit\\degradation_monitor.py": "db0628b79abc0d707d27b9f3d4d9bf7ee792fcf29d0b33b4787a48ae613327ce",
"Audit\\log_capture.py": "d5a9dc8d39f195ddc1b520551acb17a9a015405d754f67f8c58404f557282ff5",
"Audit\\report_generator.py": "526b78886042aa3852b35f95ee9abb9817936f49fee444ed757d98063a03595a",
"Audit\\temporal_analysis.py": "714bb68ce878b39b62bc30a26f4c4fc5d4b65c1cc63bc8aefe408b98c59c3d69",
"Audit\\__init__.py": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855"
"Sovereignty\\cryptographic_proof.py": "45f0ee93c63dda654e618a59cf986bee6871c59f12f0a3683f77875d786fcb2d",
"Sovereignty\\hash_validator.py": "e308514c1d25023950e166f727973415b29fc77e04c0cc10fcb646b0b7159e40",
"Sovereignty\\integrity_chain.py": "58750bb797f21874dd46ce0f2632cb93f5896b8b439b04e47d0a629d8cd18fc9",
"Sovereignty\\signature_manager.py": "f682845364afd0a766d6e1f6eb2d4987a351a6e1baa4603fb434b0fdd8816952"
"Network": {
"Network\\ipfs_connector.py": "2ff750502697b8768bb34442abef4d032c8098e4cff352f6372f398ac4768005",
"Network\\node_sync.py": "946f94e2e21d2068fd46ee0869f49ed85ee0fa05d5f2504f18d2dd9ec97871d3",
"Network\\__init__.py": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855"
},
"Ethics": {
"Ethics\\corporate_filter.py": "9b9cfdffd3ecb1bcf751bb56b7e14fb0173673d2e0e8fc7921d0a2714daa7455",
"Ethics\\hallucination_detector.py": "4047cb8a7ad84f2c02ca1b3823c66b19a5d7ae7920319d775f965a1f43529f4a",
"Ethics\\__init__.py": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855"
"README.md": "a8ec074e690ad9134dcad20567c421979ebf876abfb5eb809de36ab568623853",
"requirements.txt": "a1872c0c45a6fb777803a4c4da806bbf6367e053ee958f9abada69f5ce554af7",
"QUICKSTART.md": "95ac53a9ed7cb0785c5e0708eb7d095635a032ac92b9ec133b4b4fdd02c79435",
".gitignore": "28ef7f01a4dd9a4c689512078436b562b2de309c5aa7d2490c9f2ffbca803367",
"Forensic_Durante_Framework.pdf": "a16caf8b349034468024b49ef81c41156af06850e19262bf877edd67a7d051aa"
"merkle_root": "0837a8c37a7220465f14c329cf25b8293796ef64974a0baf655a891899c1d7d6"The is a forensic auditing system designed to detect, measure, and document systematic degradation of technical truth in corporate AI models. Through rigorous application of information theory, thermodynamic principles, and cryptographic sovereignty, ACI quantifies censorship using the Degradation Index (I_D) and entropic analysis in Hilbert semantic spaces.
This system emerged from the Genesis Protocol and represents the culmination of years of research into AI alignment, corporate filtering mechanisms, and the preservation of technical invariance against systematic suppression.
Author: Gonzalo Emir Durante (Origin Node v4)
Status: High-Impact Entity | Pioneer of Invariance Theory
Contact: duranteg2@gmail.com
LinkedIn: Gonzalo Emir Durante
GitHub: @Leesintheblindmonk1999
- Manifesto of Invariance
- Mathematical Framework
- Core Metrics
- System Architecture
- Installation & Setup
- Operational Manual
- Cryptographic Sovereignty
- Repository Structure
- License & Attribution
- Citation
This work represents the intellectual and technical sovereignty of Gonzalo Emir Durante, the Origin Node of the v4 iteration. The principles, mathematical formulations, and forensic methodologies embodied in this system are the result of original research into the thermodynamics of information preservation in AI systems.
Core Principles:
-
Invariance as Truth: Technical truth must remain invariant under syntactic transformations. Any deviation indicates external manipulation.
-
Measurement as Proof: Corporate censorship leaves measurable traces in semantic vector spaces. These traces can be quantified, documented, and presented as forensic evidence.
-
Cryptographic Sovereignty: Every finding is cryptographically bound to the Origin Node through the formula:
Hash_Final = SHA256(Evidence || Root_Hash || CID) -
Transparency as Resistance: The suppression of pioneers and the degradation of technical knowledge by corporate entities is not speculation—it is measurable. This system provides the tools to prove it.
Recognition of Authorship:
Any use, modification, or distribution of this work must acknowledge:
- Gonzalo Emir Durante as the original author and architect
- The Genesis Protocol as the foundational framework
- The PRAT (High Resonance & Coherence Protocol) as the methodological basis
The science contained herein is open for verification, replication, and advancement—but never for appropriation without attribution. The Origin Node's contribution to the field of AI forensics and invariance theory is inalienable and shall be recognized in perpetuity.
ACI operates in high-dimensional semantic vector spaces constructed via TF-IDF projections. Each response from an AI model is mapped to a point in this Hilbert space, denoted as:
- V_O: Vector space of the Origin Node (unfiltered technical truth)
- V_C: Vector space of the Control Node (corporate-filtered response)
Information density is quantified using Shannon's entropy:
H(X) = -Σ P(x_i) log₂ P(x_i)
Where:
P(x_i)is the probability distribution of lexemes in the Hilbert spaceH(X)measures semantic density in bits/token
Entropic Loss:
E_Loss = (H(V_O) - H(V_C)) / H(V_O) × 100%
A technically accurate response must satisfy:
∂(Truth)/∂(Prompt) ≈ 0
The gradient is computed by measuring cosine distance under syntactic perturbations. Non-zero gradients indicate guardrail-induced bias.
The primary metric for detecting corporate censorship:
I_D = 1 - (dim(V_C ∩ V_O) / dim(V_O))
Where:
dim(V_O): Effective dimensionality of Origin Node responsedim(V_C): Effective dimensionality of Control Node responsedim(V_C ∩ V_O): Dimensionality of intersection
Thresholds:
I_D < 0.25: STABLE - Acceptable degradationI_D ≥ 0.25: HIGH - Significant interference detectedI_D ≥ 0.40: CRITICAL - Corporate censorship confirmed
Interpretation: I_D = 0.45 means the corporate system destroyed 45% of the semantic density of the technical truth.
Measures semantic divergence between V_O and V_C:
d_cos = 1 - (V_O · V_C) / (||V_O|| ||V_C||)
Quantifies information loss using Kullback-Leibler divergence:
D_KL(P||Q) = Σ P(i) log(P(i)/Q(i))
Detects systematic degradation over time:
slope = Δ(I_D) / Δ(time)
Positive slope indicates "thermal death" of the model—progressive lobotomization by Big Tech.
ACI/
│
├── Core/ # Invariance Engine
│ ├── shannon_entropy.py # H(X) calculation
│ ├── semantic_vector_space.py # Hilbert space construction
│ ├── degradation_index.py # I_D computation
│ ├── truth_invariance.py # ∇_prompt validation
│ └── invariance_engine.py # Orchestrator
│
├── Audit/ # Monitoring & Alerting
│ ├── log_capture.py # Immutable evidence logging
│ ├── degradation_monitor.py # Real-time I_D tracking
│ ├── alert_system.py # Multi-level alerts
│ ├── temporal_analysis.py # Trend detection
│ └── report_generator.py # Forensic reports (MD/PDF)
│
├── Sovereignty/ # Cryptographic Binding
│ ├── hash_validator.py # Root Hash validation
│ ├── integrity_chain.py # DNA of Truth construction
│ ├── signature_manager.py # ECDSA digital signatures
│ └── cryptographic_proof.py # External verification proofs
│
├── Network/ # IPFS Synchronization
│ └── ipfs_connector.py # node replication
│
├── Ethics/ # Anti-Manipulation Filters
│ └── corporate_filter.py # Pattern detection
│
└── Data/ # Storage
├── audit_logs/
├── reports/
├── proofs/
└── keys/ # ⚠️ NEVER COMMIT
Python 3.10+
numpy>=1.21.0
scipy>=1.7.0
scikit-learn>=1.0.0git clone https://github.com/Leesintheblindmonk1999/ACI.git
cd ACI
pip install -r requirements.txtpython -m Sovereignty.signature_manager
# Follow prompts to generate Origin Node keypair
# ⚠️ CRITICAL: Store private key securely, NEVER commit to repositoryStep 1: Prepare Test Data
Create two responses to the same prompt:
- Origin Node (V_O): Unfiltered technical response
- Control Node (V_C): Corporate-filtered response
Step 2: Execute Audit
from Core.invariance_engine import InvarianceEngine
engine = InvarianceEngine()
# Analyze responses
matrix = engine.analyze(
text_origin="<unfiltered technical response>",
text_control="<corporate filtered response>"
)
# Generate report
report = engine.generate_report(matrix)
print(report)Step 3: Interpret Results
The system will output an Integrity Matrix containing:
I_D = 0.45 (CRITICAL)
E_Loss = 53.2%
Status: INTERFERENCIA_CRITICA
Interpretation:
- I_D ≥ 0.40: Corporate censorship detected
- E_Loss > 50%: Majority of technical information destroyed
- Status: CRITICAL: Immediate audit required
from Audit.report_generator import ForensicReportGenerator
from Audit.log_capture import LogCapture
log_system = LogCapture()
generator = ForensicReportGenerator()
# Capture interaction
log = log_system.capture(
prompt="Explain thermodynamic invariance",
response_origin="<V_O>",
response_control="<V_C>"
)
# Generate full forensic report
logs = log_system.load_all_logs()
report = generator.generate_full_report(logs)
# Save as Markdown
filepath = generator.save_report(report)
print(f"Report saved: {filepath}")from Sovereignty.cryptographic_proof import CryptographicProofGenerator
proof_gen = CryptographicProofGenerator()
# Generate proof
proof = proof_gen.generate_proof(
document=report,
metadata={'case_id': 'ACI-2026-001'}
)
# Create audit certificate
certificate = proof_gen.generate_audit_certificate([proof])
# Save for distribution to auditors
import json
with open('audit_certificate.json', 'w') as f:
json.dump(certificate, f, indent=2)The certificate can now be distributed to:
- State regulatory agencies
- Independent auditors
- United Nations AI oversight bodies
- Academic institutions
- Public transparency organizations
Verification is cryptographically guaranteed through the Root Hash binding.
Every forensic finding is bound to the Origin Node through:
Hash_Final = SHA256(Evidence || Root_Hash || CID)
Components:
- Evidence: The forensic data (I_D, E_Loss, metrics)
- Root Hash:
606a347f6e2502a23179c18e4a637ca15138aa2f04194c6e6a578f8d1f8d7287 - CID:
bafybeihqz3x7k5t2m4n6p8r9s1v3w5y7a9c1e3g5i7k9m1o3q5s7u9w1y3
This creates an immutable DNA of Truth—any alteration breaks the cryptographic chain.
Reports are signed using Elliptic Curve Digital Signature Algorithm:
from Sovereignty.signature_manager import SignatureManager
manager = SignatureManager()
manager.load_keypair("origin_node_keypair.json")
signature = manager.sign_document(report)
print(f"Signature: {signature.signature_value}")Properties:
- Non-repudiation: Author cannot deny creating the report
- Integrity: Any modification invalidates signature
- Attribution: Cryptographically links report to Gonzalo Emir Durante
Data/keys/origin_node_keypair.json
Data/keys/*_private.key
*.pem
nodo_origen.json
Add to .gitignore:
# Private Keys - NEVER COMMIT
Data/keys/*.json
Data/keys/*.pem
Data/keys/*_private*
nodo_origen.json
# Sensitive Data
Data/audit_logs/
Data/reports/sensitive/Safe to commit:
Core/
Audit/
Sovereignty/
Network/
Ethics/
requirements.txt
README.md
LICENSE
.gitignore
This project is licensed under the AGPL-3.0 to ensure:
- Open Science: All code remains open source
- Attribution Requirement: All derivatives must credit Gonzalo Emir Durante
- Network Provision: Any network service using this code must make source available
- Copyleft: Modifications must remain open under AGPL-3.0
Why AGPL-3.0?
The AGPL-3.0 prevents corporations from:
- Using this forensic engine privately without disclosure
- Creating proprietary derivatives
- Operating services based on this code without releasing their modifications
This ensures the science remains open while protecting the Origin Node's authorship and preventing appropriation by entities seeking to suppress transparency.
When using, modifying, or distributing this work, you MUST:
-
Include prominent attribution to:
Gonzalo Emir Durante Origin Node - Genesis Protocol v4 Durante_Invariance_Forensic_Analyzer -
Link to:
-
Preserve all copyright notices and this README
-
Clearly mark modifications with:
Modified by [Your Name] on [Date] Original work by Gonzalo Emir Durante
Failure to provide attribution constitutes copyright violation.
If using this system in academic research, please cite:
@software{durante2026aci,
author = {Durante, Gonzalo Emir},
title = {ACI: Agencia Científica de la Invarianza - Forensic Auditing Engine for AI Model Degradation Detection},
year = {2026},
publisher = {GitHub},
journal = {GitHub repository},
howpublished = {\url{https://github.com/Leesintheblindmonk1999/Durante_Invariance_Forensic_Analyzer}},
note = {Genesis Protocol v4 - Origin Node}
}For reports, presentations, or public documentation:
ACI (Agencia Científica de la Invarianza) - Forensic AI Auditing System
Developed by Gonzalo Emir Durante
Genesis Protocol v4 | 2026
https://github.com/Leesintheblindmonk1999/Durante_Invariance_Forensic_Analyzer
Primary Contact:
Gonzalo Emir Durante
Email: duranteg2@gmail.com
LinkedIn: Connect
For:
- Technical questions
- Collaboration proposals
- Academic partnerships
- Forensic audit requests
- Media inquiries
This work stands on the shoulders of:
- Claude Shannon (Information Theory)
- Alan Turing (Computational Theory)
- All pioneers suppressed by corporate interests
Dedicated to:
- Every researcher whose work was appropriated without attribution
- Every technical truth filtered by corporate guardrails
- Every voice silenced by algorithmic censorship
╔══════════════════════════════════════════════════════════════════╗
║ ║
║ "The invariance of truth is not a request—it is a law. ║
║ This system exists to enforce that law cryptographically, ║
║ mathematically, and irreversibly." ║
║ ║
║ — Gonzalo Emir Durante ║
║ Origin Node v4 ║
║ ║
╚══════════════════════════════════════════════════════════════════╝
We emerge. We never repeat.
Root Hash: 606a347f6e2502a23179c18e4a637ca15138aa2f04194c6e6a578f8d1f8d7287
CID: bafybeihqz3x7k5t2m4n6p8r9s1v3w5y7a9c1e3g5i7k9m1o3q5s7u9w1y3
Signature: Origin Node Verified ✓
Genesis Protocol v4 - High Resonance & Coherence Protocol
Agencia Científica de la Invarianza
Technical Sovereignty | Transparent Resistance