G
GEO Toolbox
researchtimestamp

Research workspace timestamp — 2026-05-13 (expanded, final)

Second cryptographic timestamp record of the same research workspace, anchoring an expanded state. SHA-256 hash of a manifest covering 11,327 files.

Samy BEN SADOK2 min read
In this post5 sections

This post records a second cryptographic timestamp for the same research workspace anchored earlier today. It captures an expanded state after additional iteration on the underlying material.

The first anchor for this workspace is at /blog/research-timestamp-2026-05-13 (covering 3,232 files as of 06:52 UTC). Both anchors describe the same workspace at different points in the day; the diff between them is the day's iteration.

Timestamp claim

Generated: 2026-05-13 17:55 UTC (epoch 1778694900). The underlying manifest was finalized at 17:51 UTC; this post was published a few minutes later.

SHA-256 of canonical manifest:

467dc3a906418f84e114a6911e3a7890a6c8492e12c55cea4f2347a1a6e767ca

Coverage: 11,327 files / 187,750,796 bytes. The manifest covers the workspace's research-related markdown, JSON, Python, and text files at the time of generation.

Relationship to the earlier anchor

The 06:52 UTC anchor (hash ebe56d7153eafb8589cc76296da45756f9038794548f288e1ed5c848c548f36c) covered the pre-iteration state of the same workspace. This 17:53 UTC anchor covers the post-iteration state. Both manifests are canonically serialized; each file appears in either or both manifests with its own SHA-256. The two hashes together produce an auditable chain-of-custody record across the day.

What this proves

This post + its publication timestamp establish that the manifest with the hash above existed as of the publication time. The hash is one-way: it reveals nothing about the file contents, only that those exact files existed at this moment.

Verification

Given a copy of the manifest (manifest.json, sorted-keys canonical JSON serialization), anyone can independently reproduce the hash:

python3 -c "import json, hashlib; d = json.load(open('manifest.json')); print(hashlib.sha256(json.dumps(d, sort_keys=True, separators=(',', ':')).encode()).hexdigest())"
# Expected output: 467dc3a906418f84e114a6911e3a7890a6c8492e12c55cea4f2347a1a6e767ca

Individual file hashes within the manifest can be independently verified with sha256sum.

Why post this here

This site is a stable, indexable, archive.org-crawled location under the author's direct control. Posting the hash to a public URL with the site's automatic publication timestamp establishes verifiable priority for the manifest's contents at the date and hour above. The manifest itself, and the files it covers, are held in the author's local research workspace and are not published here.