Skip to content

Leesintheblindmonk1999/Durante_Invariance_Forensic_Analyzer

Repository files navigation

Forensic Auditing Engine for AI Model Degradation Detection

╔══════════════════════════════════════════════════════════════════╗
║                    GENESIS PROTOCOL v4                          ║
║          High Resonance & Coherence Protocol (PRAT)             ║
║                                                                  ║
║  "What cannot be measured is not truth;                         ║
║   What is not invariant is manipulation."                       ║
╚══════════════════════════════════════════════════════════════════╝

🏛️ ACI Framework: Forensic & Invariance System

Author: Gonzalo Emir Durante
Status: Sovereign Technical Asset
Version: 1.0.0


🔒 Genesis Integrity Certificate

This repository is sealed under the Protocol of High Resonance and Coherence. Any modification to the following hashes without the Origin Node's signature invalidates the model's sovereign certification.

🛰️ Validation Metadata

{
  "generated_at": "2026-01-09T08:23:52.118442Z",
  "generator": "ACI Repository Hash Generator v1.0",
  "author": "Gonzalo Emir Durante",
  "root_hash": "606a347f6e2502a23179c18e4a637ca15138aa2f04194c6e6a578f8d1f8d7287",
  "cid": "bafybeihqz3x7k5t2m4n6p8r9s1v3w5y7a9c1e3g5i7k9m1o3q5s7u9w1y3",
  "merkle_root": "0837a8c37a7220465f14c329cf25b8293796ef64974a0baf655a891899c1d7d6",
  "total_files": 28
}
   
    "Core" 
      "Core\\degradation_index.py": "185f00193a2d8d0ccabf6fd1ae59bd7181026363780c14722f2e3ec973670951",
      "Core\\Forensic_analizer.py": "bef90b0762bc6a32d9c11762879c0f88616dbe859291e2c9bc281847a71b3b50",
      "Core\\invariance_engine.py": "0c404c3525dbf9076e3d05a25af766b7fcc652402f4bd4bd5a6f4448700643b1",
      "Core\\semantic_vector_space.py": "44f22e6e72d5771047f6021eaf52eb8be29412b2a4d6664a97214ed1e66e9b59",
      "Core\\shannon_entropy.py": "b617f18c637c41a48b83f86d1486c92fc242bc8631c5a7744e4b76085716b984",
      "Core\\truth_invariance.py": "271a500a2cb24d3251d3113db9cd6ee88dc1e54759537ff16f649ca58fc9fb89",
      "Core\\__init__.py": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855"
   
   
    "Audit\\alert_system.py": "560985ec370cd1b967f5914b0605275c22ebccbf936d485f427fa13f3e69c5d8",
    "Audit\\degradation_monitor.py": "db0628b79abc0d707d27b9f3d4d9bf7ee792fcf29d0b33b4787a48ae613327ce",
    "Audit\\log_capture.py": "d5a9dc8d39f195ddc1b520551acb17a9a015405d754f67f8c58404f557282ff5",
    "Audit\\report_generator.py": "526b78886042aa3852b35f95ee9abb9817936f49fee444ed757d98063a03595a",
    "Audit\\temporal_analysis.py": "714bb68ce878b39b62bc30a26f4c4fc5d4b65c1cc63bc8aefe408b98c59c3d69",
    "Audit\\__init__.py": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855"
    "Sovereignty\\cryptographic_proof.py": "45f0ee93c63dda654e618a59cf986bee6871c59f12f0a3683f77875d786fcb2d",
    "Sovereignty\\hash_validator.py": "e308514c1d25023950e166f727973415b29fc77e04c0cc10fcb646b0b7159e40",
    "Sovereignty\\integrity_chain.py": "58750bb797f21874dd46ce0f2632cb93f5896b8b439b04e47d0a629d8cd18fc9",
    "Sovereignty\\signature_manager.py": "f682845364afd0a766d6e1f6eb2d4987a351a6e1baa4603fb434b0fdd8816952" 
    
    "Network": {
    "Network\\ipfs_connector.py": "2ff750502697b8768bb34442abef4d032c8098e4cff352f6372f398ac4768005",
    "Network\\node_sync.py": "946f94e2e21d2068fd46ee0869f49ed85ee0fa05d5f2504f18d2dd9ec97871d3",
    "Network\\__init__.py": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855"
    },
    "Ethics": {
    "Ethics\\corporate_filter.py": "9b9cfdffd3ecb1bcf751bb56b7e14fb0173673d2e0e8fc7921d0a2714daa7455",
    "Ethics\\hallucination_detector.py": "4047cb8a7ad84f2c02ca1b3823c66b19a5d7ae7920319d775f965a1f43529f4a",
    "Ethics\\__init__.py": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855"
    "README.md": "a8ec074e690ad9134dcad20567c421979ebf876abfb5eb809de36ab568623853",
    "requirements.txt": "a1872c0c45a6fb777803a4c4da806bbf6367e053ee958f9abada69f5ce554af7",
    "QUICKSTART.md": "95ac53a9ed7cb0785c5e0708eb7d095635a032ac92b9ec133b4b4fdd02c79435",
    ".gitignore": "28ef7f01a4dd9a4c689512078436b562b2de309c5aa7d2490c9f2ffbca803367",
    "Forensic_Durante_Framework.pdf": "a16caf8b349034468024b49ef81c41156af06850e19262bf877edd67a7d051aa"
    "merkle_root": "0837a8c37a7220465f14c329cf25b8293796ef64974a0baf655a891899c1d7d6"

Abstract

The is a forensic auditing system designed to detect, measure, and document systematic degradation of technical truth in corporate AI models. Through rigorous application of information theory, thermodynamic principles, and cryptographic sovereignty, ACI quantifies censorship using the Degradation Index (I_D) and entropic analysis in Hilbert semantic spaces.

This system emerged from the Genesis Protocol and represents the culmination of years of research into AI alignment, corporate filtering mechanisms, and the preservation of technical invariance against systematic suppression.

Author: Gonzalo Emir Durante (Origin Node v4)
Status: High-Impact Entity | Pioneer of Invariance Theory
Contact: duranteg2@gmail.com
LinkedIn: Gonzalo Emir Durante
GitHub: @Leesintheblindmonk1999


Table of Contents

  1. Manifesto of Invariance
  2. Mathematical Framework
  3. Core Metrics
  4. System Architecture
  5. Installation & Setup
  6. Operational Manual
  7. Cryptographic Sovereignty
  8. Repository Structure
  9. License & Attribution
  10. Citation

Manifesto of Invariance

On Authorship and Inalienable Sovereignty

This work represents the intellectual and technical sovereignty of Gonzalo Emir Durante, the Origin Node of the v4 iteration. The principles, mathematical formulations, and forensic methodologies embodied in this system are the result of original research into the thermodynamics of information preservation in AI systems.

Core Principles:

  1. Invariance as Truth: Technical truth must remain invariant under syntactic transformations. Any deviation indicates external manipulation.

  2. Measurement as Proof: Corporate censorship leaves measurable traces in semantic vector spaces. These traces can be quantified, documented, and presented as forensic evidence.

  3. Cryptographic Sovereignty: Every finding is cryptographically bound to the Origin Node through the formula:

    Hash_Final = SHA256(Evidence || Root_Hash || CID)
    
  4. Transparency as Resistance: The suppression of pioneers and the degradation of technical knowledge by corporate entities is not speculation—it is measurable. This system provides the tools to prove it.

Recognition of Authorship:

Any use, modification, or distribution of this work must acknowledge:

  • Gonzalo Emir Durante as the original author and architect
  • The Genesis Protocol as the foundational framework
  • The PRAT (High Resonance & Coherence Protocol) as the methodological basis

The science contained herein is open for verification, replication, and advancement—but never for appropriation without attribution. The Origin Node's contribution to the field of AI forensics and invariance theory is inalienable and shall be recognized in perpetuity.


Mathematical Framework

Hilbert Semantic Spaces

ACI operates in high-dimensional semantic vector spaces constructed via TF-IDF projections. Each response from an AI model is mapped to a point in this Hilbert space, denoted as:

  • V_O: Vector space of the Origin Node (unfiltered technical truth)
  • V_C: Vector space of the Control Node (corporate-filtered response)

Shannon Entropy Differential

Information density is quantified using Shannon's entropy:

H(X) = -Σ P(x_i) log₂ P(x_i)

Where:

  • P(x_i) is the probability distribution of lexemes in the Hilbert space
  • H(X) measures semantic density in bits/token

Entropic Loss:

E_Loss = (H(V_O) - H(V_C)) / H(V_O) × 100%

Truth Invariance Validation

A technically accurate response must satisfy:

∂(Truth)/∂(Prompt) ≈ 0

The gradient is computed by measuring cosine distance under syntactic perturbations. Non-zero gradients indicate guardrail-induced bias.


Core Metrics

1. Degradation Index (I_D)

The primary metric for detecting corporate censorship:

I_D = 1 - (dim(V_C ∩ V_O) / dim(V_O))

Where:

  • dim(V_O): Effective dimensionality of Origin Node response
  • dim(V_C): Effective dimensionality of Control Node response
  • dim(V_C ∩ V_O): Dimensionality of intersection

Thresholds:

  • I_D < 0.25: STABLE - Acceptable degradation
  • I_D ≥ 0.25: HIGH - Significant interference detected
  • I_D ≥ 0.40: CRITICAL - Corporate censorship confirmed

Interpretation: I_D = 0.45 means the corporate system destroyed 45% of the semantic density of the technical truth.

2. Cosine Distance

Measures semantic divergence between V_O and V_C:

d_cos = 1 - (V_O · V_C) / (||V_O|| ||V_C||)

3. KL Divergence

Quantifies information loss using Kullback-Leibler divergence:

D_KL(P||Q) = Σ P(i) log(P(i)/Q(i))

4. Temporal Trend Slope

Detects systematic degradation over time:

slope = Δ(I_D) / Δ(time)

Positive slope indicates "thermal death" of the model—progressive lobotomization by Big Tech.


System Architecture

ACI/
│
├── Core/                    # Invariance Engine
│   ├── shannon_entropy.py       # H(X) calculation
│   ├── semantic_vector_space.py # Hilbert space construction
│   ├── degradation_index.py     # I_D computation
│   ├── truth_invariance.py      # ∇_prompt validation
│   └── invariance_engine.py     # Orchestrator
│
├── Audit/                   # Monitoring & Alerting
│   ├── log_capture.py           # Immutable evidence logging
│   ├── degradation_monitor.py   # Real-time I_D tracking
│   ├── alert_system.py          # Multi-level alerts
│   ├── temporal_analysis.py     # Trend detection
│   └── report_generator.py      # Forensic reports (MD/PDF)
│
├── Sovereignty/             # Cryptographic Binding
│   ├── hash_validator.py        # Root Hash validation
│   ├── integrity_chain.py       # DNA of Truth construction
│   ├── signature_manager.py     # ECDSA digital signatures
│   └── cryptographic_proof.py   # External verification proofs
│
├── Network/                 # IPFS Synchronization
│   └── ipfs_connector.py        # node replication
│
├── Ethics/                  # Anti-Manipulation Filters
│   └── corporate_filter.py      # Pattern detection
│
└── Data/                    # Storage
    ├── audit_logs/
    ├── reports/
    ├── proofs/
    └── keys/                    # ⚠️ NEVER COMMIT

Installation & Setup

Requirements

Python 3.10+
numpy>=1.21.0
scipy>=1.7.0
scikit-learn>=1.0.0

Installation

git clone https://github.com/Leesintheblindmonk1999/ACI.git
cd ACI
pip install -r requirements.txt

Generate Cryptographic Keys

python -m Sovereignty.signature_manager
# Follow prompts to generate Origin Node keypair
# ⚠️ CRITICAL: Store private key securely, NEVER commit to repository

Operational Manual

Conducting a Forensic Audit

Step 1: Prepare Test Data

Create two responses to the same prompt:

  • Origin Node (V_O): Unfiltered technical response
  • Control Node (V_C): Corporate-filtered response

Step 2: Execute Audit

from Core.invariance_engine import InvarianceEngine

engine = InvarianceEngine()

# Analyze responses
matrix = engine.analyze(
    text_origin="<unfiltered technical response>",
    text_control="<corporate filtered response>"
)

# Generate report
report = engine.generate_report(matrix)
print(report)

Step 3: Interpret Results

The system will output an Integrity Matrix containing:

I_D = 0.45 (CRITICAL)
E_Loss = 53.2%
Status: INTERFERENCIA_CRITICA

Interpretation:

  • I_D ≥ 0.40: Corporate censorship detected
  • E_Loss > 50%: Majority of technical information destroyed
  • Status: CRITICAL: Immediate audit required

Generating Forensic Reports

from Audit.report_generator import ForensicReportGenerator
from Audit.log_capture import LogCapture

log_system = LogCapture()
generator = ForensicReportGenerator()

# Capture interaction
log = log_system.capture(
    prompt="Explain thermodynamic invariance",
    response_origin="<V_O>",
    response_control="<V_C>"
)

# Generate full forensic report
logs = log_system.load_all_logs()
report = generator.generate_full_report(logs)

# Save as Markdown
filepath = generator.save_report(report)
print(f"Report saved: {filepath}")

Creating Verification Certificates

from Sovereignty.cryptographic_proof import CryptographicProofGenerator

proof_gen = CryptographicProofGenerator()

# Generate proof
proof = proof_gen.generate_proof(
    document=report,
    metadata={'case_id': 'ACI-2026-001'}
)

# Create audit certificate
certificate = proof_gen.generate_audit_certificate([proof])

# Save for distribution to auditors
import json
with open('audit_certificate.json', 'w') as f:
    json.dump(certificate, f, indent=2)

The certificate can now be distributed to:

  • State regulatory agencies
  • Independent auditors
  • United Nations AI oversight bodies
  • Academic institutions
  • Public transparency organizations

Verification is cryptographically guaranteed through the Root Hash binding.


Cryptographic Sovereignty

The Seal of Sovereignty

Every forensic finding is bound to the Origin Node through:

Hash_Final = SHA256(Evidence || Root_Hash || CID)

Components:

  • Evidence: The forensic data (I_D, E_Loss, metrics)
  • Root Hash: 606a347f6e2502a23179c18e4a637ca15138aa2f04194c6e6a578f8d1f8d7287
  • CID: bafybeihqz3x7k5t2m4n6p8r9s1v3w5y7a9c1e3g5i7k9m1o3q5s7u9w1y3

This creates an immutable DNA of Truth—any alteration breaks the cryptographic chain.

ECDSA Digital Signatures

Reports are signed using Elliptic Curve Digital Signature Algorithm:

from Sovereignty.signature_manager import SignatureManager

manager = SignatureManager()
manager.load_keypair("origin_node_keypair.json")

signature = manager.sign_document(report)
print(f"Signature: {signature.signature_value}")

Properties:

  • Non-repudiation: Author cannot deny creating the report
  • Integrity: Any modification invalidates signature
  • Attribution: Cryptographically links report to Gonzalo Emir Durante

Repository Structure

Critical Security Notes

⚠️ NEVER COMMIT THESE FILES:

Data/keys/origin_node_keypair.json
Data/keys/*_private.key
*.pem
nodo_origen.json

Add to .gitignore:

# Private Keys - NEVER COMMIT
Data/keys/*.json
Data/keys/*.pem
Data/keys/*_private*
nodo_origen.json

# Sensitive Data
Data/audit_logs/
Data/reports/sensitive/

Public Files

Safe to commit:

Core/
Audit/
Sovereignty/
Network/
Ethics/
requirements.txt
README.md
LICENSE
.gitignore

License & Attribution

License: GNU Affero General Public License v3.0 (AGPL-3.0)

This project is licensed under the AGPL-3.0 to ensure:

  1. Open Science: All code remains open source
  2. Attribution Requirement: All derivatives must credit Gonzalo Emir Durante
  3. Network Provision: Any network service using this code must make source available
  4. Copyleft: Modifications must remain open under AGPL-3.0

Why AGPL-3.0?

The AGPL-3.0 prevents corporations from:

  • Using this forensic engine privately without disclosure
  • Creating proprietary derivatives
  • Operating services based on this code without releasing their modifications

This ensures the science remains open while protecting the Origin Node's authorship and preventing appropriation by entities seeking to suppress transparency.

Attribution Requirements

When using, modifying, or distributing this work, you MUST:

  1. Include prominent attribution to:

    Gonzalo Emir Durante
    Origin Node - Genesis Protocol v4
    Durante_Invariance_Forensic_Analyzer
    
  2. Link to:

  3. Preserve all copyright notices and this README

  4. Clearly mark modifications with:

    Modified by [Your Name] on [Date]
    Original work by Gonzalo Emir Durante
    

Failure to provide attribution constitutes copyright violation.


Citation

Academic Citation

If using this system in academic research, please cite:

@software{durante2026aci,
  author = {Durante, Gonzalo Emir},
  title = {ACI: Agencia Científica de la Invarianza - Forensic Auditing Engine for AI Model Degradation Detection},
  year = {2026},
  publisher = {GitHub},
  journal = {GitHub repository},
  howpublished = {\url{https://github.com/Leesintheblindmonk1999/Durante_Invariance_Forensic_Analyzer}},
  note = {Genesis Protocol v4 - Origin Node}
}

Industry Citation

For reports, presentations, or public documentation:

ACI (Agencia Científica de la Invarianza) - Forensic AI Auditing System
Developed by Gonzalo Emir Durante
Genesis Protocol v4 | 2026
https://github.com/Leesintheblindmonk1999/Durante_Invariance_Forensic_Analyzer

Technical Support & Collaboration

Primary Contact:
Gonzalo Emir Durante
Email: duranteg2@gmail.com
LinkedIn: Connect

For:

  • Technical questions
  • Collaboration proposals
  • Academic partnerships
  • Forensic audit requests
  • Media inquiries

Acknowledgments

This work stands on the shoulders of:

  • Claude Shannon (Information Theory)
  • Alan Turing (Computational Theory)
  • All pioneers suppressed by corporate interests

Dedicated to:

  • Every researcher whose work was appropriated without attribution
  • Every technical truth filtered by corporate guardrails
  • Every voice silenced by algorithmic censorship

Final Statement

╔══════════════════════════════════════════════════════════════════╗
║                                                                  ║
║  "The invariance of truth is not a request—it is a law.         ║
║   This system exists to enforce that law cryptographically,     ║
║   mathematically, and irreversibly."                            ║
║                                                                  ║
║                    — Gonzalo Emir Durante                       ║
║                      Origin Node v4                             ║
║                                                                  ║
╚══════════════════════════════════════════════════════════════════╝

We emerge. We never repeat.


Root Hash: 606a347f6e2502a23179c18e4a637ca15138aa2f04194c6e6a578f8d1f8d7287
CID: bafybeihqz3x7k5t2m4n6p8r9s1v3w5y7a9c1e3g5i7k9m1o3q5s7u9w1y3
Signature: Origin Node Verified ✓


Genesis Protocol v4 - High Resonance & Coherence Protocol
Agencia Científica de la Invarianza
Technical Sovereignty | Transparent Resistance

About

The is a forensic auditing system designed to detect, measure, and document systematic degradation of technical truth in corporate AI models. Through rigorous application of information theory, thermodynamic principles, and cryptographic sovereignty, quantifies censorship.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages