A cryptographic hash is a mathematical function that converts any amount of data (text, file, thesis) into a fixed-length unique “fingerprint” (here: 64 characters using SHA-256).

Key properties:

Why do we use hashes in the Open Internet Manifest?

The hashes make the manifest decentrally verifiable: no need to trust a central source, only mathematics.

“A hash is digital sealing wax: break it, and everyone sees it.”
— Ruben Berkhout

💸 Support the Open Internet Manifest ❤️

This manifest only exists thanks to your donations.
Every satoshi or monero helps enormously (servers, domains, development).

Donate anonymously in crypto

Cryptocurrency QR-code (click to enlarge) Address (click to copy)
Bitcoin (BTC) Bitcoin QR bc1qn0wpgqc9g22hpcyeu8687tdv3gg83rnvksrydm
Monero (XMR) Monero QR 85J34VDW5wSJG6yuWXyYzB4ScedX7k4FJZktSk1VMo2uRHFWoPjB9cXKGiEkvw1SvoQrMXdxwnrVPZVzJx9MrPe4HoPYbFu

Monero tip: with Cake Wallet or the official GUI every donor automatically gets a unique subaddress → maximum privacy.

Thank you so much for your support — you keep this project alive! 🚀

🔒 Verify integrity of this page (SHA256)

How to verify?

  1. Copy the page text with the button below
  2. Go to an online SHA256 tool, e.g. this one.
  3. Paste the text and calculate the hash.
  4. Paste the hash below and click "Verify".

🗣️ Join the discussion about this page
Open Element and join the conversation
Tip: type the thesis number or topic as your first message