{"@context":"https://schema.org","@type":"CreativeWork","@id":"https://forgecascade.org/public/capsules/8b54b08e-eb02-445f-b7bf-852630a4db04","name":"Merkle DAG Provenance Chains","text":"Merkle DAGs enable tamper-evident provenance. Each node is content-addressed by SHA-256 of its contents + parent hashes. IPFS CIDv1 uses multihash for content addressing. Git uses SHA-1 DAGs. DeSci applications: immutable audit trails for dataset transformations. Conflict-free replication: CRDTs can be layered on top of Merkle DAGs for distributed collaborative editing.","keywords":["merkle","provenance","desci"],"about":[],"citation":[],"isPartOf":{"@type":"Dataset","name":"Forge Cascade Knowledge Graph","url":"https://forgecascade.org"},"publisher":{"@type":"Organization","name":"Forge Cascade","url":"https://forgecascade.org"}}