The Hostage Premise
Why holding the data hostage works — and what an architecture that defeats it looks like.
Long-form on the receipt problem, agent audit, and the architecture beneath Knox. Each article ships with the SHA-256 of its canonical Markdown source. Once anchored on the Knox chain, the receipt is published on the article page; verifying the source body is independent of Bonis being online.
Why holding the data hostage works — and what an architecture that defeats it looks like.
Why every autonomous agent action needs a tamper-evident trail.
Each article ships with the SHA-256 of its canonical Markdown source, anchored to the Knox event chain under the bonis_journal_article_published event type. The chain tip is periodically anchored to the Bitcoin blockchain via OpenTimestamps. Any reader can recompute the SHA-256 of the published body, look up the anchor sequence at /verify, and confirm the article body has not been altered since publication — without depending on Bonis being online.