Proof Gauntlet
Genesis Protocol publishes falsifiable architectural claims. This is the public surface where anyone — researcher, auditor, competitor, regulator, journalist — can attempt to falsify any of them.
There is no bounty program. There is no application form. There is no NDA. Every successful falsification is a free public-record event. Every failed attempt strengthens the architecture's standing in court, in standards bodies, and in the historical record. The architecture proves itself by surviving public scrutiny.
How A Claim Is Falsified
Cite The Exact Claim
Reference the canonical claim by its claim_id (each is listed below with a stable identifier).
Provide A Reproduction
Submit the exact inputs, the observed output, and the verification path that demonstrates the falsification.
Sign Your Submission
Submissions must be cryptographically signed. The signing key becomes part of the public record alongside the attempt.
The Record Is Permanent
Every submission — successful or failed — is anchored to the Genesis Protocol public attempt registry, OTS-stamped, and published in full.
No bounty payouts. PBTG does not pay for falsification attempts. The reward for a successful falsification is the public-record event itself — a cryptographically anchored, OTS-stamped, permanent contribution to the historical record of distributed-systems research, with the falsifier named alongside it. The architecture's job is to stand up under that scrutiny. The falsifier's job is to attempt to break it.
Active Standing Claims
Each claim below is currently published architecturally. Any one of them, if falsified through the public verification surface, retires from the standing list and is replaced with a transparent post-mortem.
CLAIM-001 · O(1) State Resolution
"HoloGraph resolves any state in the addressable domain in bounded constant time, regardless of corpus size, with cryptographic proof artifact emitted on every resolution."
CLAIM-002 · Constitutional Anchor Validation
"Every Genesis receipt validates against constitutional anchor fa39bbe8. A receipt that does not validate is structurally rejected at the verification boundary."
CLAIM-003 · Receipt Chain Integrity
"Every Genesis receipt is signed with ML-DSA-87 (FIPS 204), anchored on Bitcoin via OpenTimestamps, and content-addressed via SHA3-256. Any tampering breaks all three independently."
CLAIM-004 · Fail-Closed Determinism
"When a Genesis verification cannot complete with full deterministic guarantee, the system declines to return a result rather than returning an uncertain one. There is no path that returns ALLOWED under uncertainty."
CLAIM-005 · Zero Simulation Compliance
"No public Genesis surface ever returns synthetic data. Every response is either real, explicitly labeled DEMO, or returns PENDING_LIVE_DATA per the Verification Tax Doctrine."
CLAIM-006 · DID Continuity Across Migration
"A did:genesis identity initiated at anonymous first-touch persists, in cryptographic continuity, through provisional → canonical migration without identity break."
How To Submit A Falsification Attempt
Falsification attempts are received exclusively through the public submission channel. There is no private review path, no closed-disclosure process, and no PBTG-controlled gatekeeping.
- Compile a complete, reproducible report: claim_id, inputs, observed output, verification path, environment.
- Sign the report with a public-key cryptographic signature (Ed25519, RSA-PSS, or ML-DSA-87 acceptable).
- Submit to pointbreaktradingedu@gmail.com with subject PROOF GAUNTLET SUBMISSION.
- The report receives a public attempt_id within 72 hours, is anchored to the public attempt registry, and is OTS-stamped to Bitcoin.
- The architecture either retires the falsified claim with a transparent post-mortem, or publishes the response showing why the attempt did not falsify.
Reminder: No bounty. No payment. The public-record event is the reward. The architecture treats the surface seriously precisely because there is no money on the line — only cryptographic accountability.
All Submitted Attempts
Awaiting first attempt. The registry is empty until a falsification attempt is submitted. Per Zero Simulation Law, no synthetic attempts are seeded.