Understanding Dorsium's Bulletproof Audit Trail System
Dorsium is currently in pre-mainnet development. This section explains our transparent centralization during bootstrap and the path to full decentralization.
Dorsium chose transparent centralization during bootstrap over taking venture capital or launching with incomplete infrastructure. This allows community building and development without external investors, preserving the project's decentralized future.
Key principle: Better to be honestly centralized during development than falsely claim decentralization before mainnet.
For complete details, see our Whitepaper - Pre-Mainnet Trust Model.
Imagine taking a fingerprint of a document - but this fingerprint is so unique that even changing a single letter creates a completely different fingerprint. That's cryptographic hashing.
Notice how adding just one exclamation mark completely changes the hash? This makes it impossible to fake or tamper with data without detection.
Think of SHA-256 like a ultra-secure DNA test for digital files. Just as every person has unique DNA, every file has a unique hash. And just like you can't fake someone's DNA, you can't fake a SHA-256 hash.
Every reward calculation in Dorsium's pre-mainnet system creates a cryptographically verifiable audit trail. While the database is centralized during bootstrap, SHA-256 hashing makes tampering detectable. Any modification to past records would change the hash, immediately revealing the alteration.
Post-mainnet migration (Q1 2026): All balances and transactions will be migrated to true blockchain immutability with on-chain smart contracts.
User action triggers smart contract
Detailed record created with timestamps
SHA-256 fingerprint generated
Permanent, verifiable record
Once created, an audit trail can never be modified. Any attempt to change even a single character would create a different hash, immediately revealing the tampering. This is the mathematical guarantee that makes our system trustworthy.
Verifies that the entire audit file (JSON or Markdown) hasn't been modified since creation. This is your first line of defense against tampering.
The original, unmodified record of the smart contract execution. Contains all details including actual user IDs. This proves the exact contract execution.
Same audit trail but with user IDs hidden for privacy. Allows public verification while protecting user identities. Same mathematical proof, enhanced privacy.
| Hash Type | What It Proves | Who Can Verify | Privacy Level |
|---|---|---|---|
| File Hash | File integrity | Anyone | Public |
| Unmasked Hash | Exact execution | Authorized users | Private |
| Masked Hash | Contract validity | Anyone | Public |
Download the audit file from the Off-Chain Explorer by clicking the "View" or "JSON" button.
Example file: audit_referral_2024-01-15_abc123.jsonUse one of these methods to calculate the hash:
emn178.github.io/online-tools/sha256_checksum.html)shasum -a 256 audit_referral_2024-01-15_abc123.jsoncertutil -hashfile audit_referral_2024-01-15_abc123.json SHA256Compare your calculated hash with the one shown in the Off-Chain Explorer. They must match exactly - every character must be identical.
a591a6d40bf420404a011733cfb7b190d62c65bf0bcda32b57b277d9ad9f146ea591a6d40bf420404a011733cfb7b190d62c65bf0bcda32b57b277d9ad9f146eTry it yourself with this sample audit data:
{
"audit_type": "REFERRAL",
"timestamp": "2024-01-15T10:30:00Z",
"referrer": "USER_MASKED_123",
"referred": "USER_MASKED_456",
"campaign": "early_adopter",
"reward": "10 dPOINT",
"status": "completed"
}This exact text produces hash:f9e0c7b3186662940185a7a84ad8c192ffa36afbf86e4d27d34216a7b68f1276
Copy this JSON and verify it yourself using any SHA-256 calculator!
While Dorsium operates off-chain for efficiency, we maintain blockchain-level transparency. Every action is recorded, hashed, and made publicly verifiable. You don't need to trust us - you can verify everything yourself.
No one - not even Dorsium administrators - can alter historical records without detection. This protects users from fraud, ensures fair reward distribution, and maintains the integrity of our referral system.
Trust isn't based on promises - it's based on mathematical proof. SHA-256 is used by Bitcoin, governments, and banks worldwide. It's battle-tested, quantum-resistant (for now), and universally accepted as secure.
Deep dive into the cryptographic implementation