Accountability Log
Every analysis result is SHA-3-512 (Keccak) hashed at creation using canonical, deterministic serialization of all protocol findings. This log records each hash alongside its timestamp for independent verification. No entries are redacted or removed.
| # | Domain | Timestamp (UTC) | SHA-3-512 Posture Hash |
|---|---|---|---|
| 2775 | surland.de | 2026-02-20T21:21:09Z | 2f6d7789c801d7fec831fbc083d07b42785935f18ee071782d1a03bc4043f333 |
| 2774 | surland.de | 2026-02-20T21:20:34Z | 2f6d7789c801d7fec831fbc083d07b42785935f18ee071782d1a03bc4043f333 |
| 2773 | apple.com | 2026-02-20T21:20:25Z | 37b480d940519324923f638c3a6d67b0ff0aae32da269d076770c13309c9ba36 |
| 2772 | cisa.gov | 2026-02-20T21:20:08Z | bdf5527e277dc477a6b19c3b5ea078f758bdc1d755249cc17b6c24a6a0ebad8d |
| 2771 | apple.com | 2026-02-20T20:07:37Z | 37b480d940519324923f638c3a6d67b0ff0aae32da269d076770c13309c9ba36 |
| 2770 | apple.com | 2026-02-20T19:36:10Z | 37b480d940519324923f638c3a6d67b0ff0aae32da269d076770c13309c9ba36 |
| 2769 | apple.com | 2026-02-20T19:35:07Z | 37b480d940519324923f638c3a6d67b0ff0aae32da269d076770c13309c9ba36 |
| 2768 | apple.com | 2026-02-20T19:34:31Z | 37b480d940519324923f638c3a6d67b0ff0aae32da269d076770c13309c9ba36 |
| 2767 | dnstool.it-help.tech | 2026-02-20T19:33:17Z | 7e0479d97f655265720d19a1d67daf540de76ed708a480c5361896739fa48900 |
| 2766 | apple.com | 2026-02-20T19:32:50Z | 37b480d940519324923f638c3a6d67b0ff0aae32da269d076770c13309c9ba36 |
| 2765 | dnstool.it-help.tech | 2026-02-20T19:32:41Z | 7e0479d97f655265720d19a1d67daf540de76ed708a480c5361896739fa48900 |
| 2764 | apple.com | 2026-02-20T19:19:07Z | 37b480d940519324923f638c3a6d67b0ff0aae32da269d076770c13309c9ba36 |
| 2763 | cisa.gov | 2026-02-20T19:08:03Z | bdf5527e277dc477a6b19c3b5ea078f758bdc1d755249cc17b6c24a6a0ebad8d |
| 2762 | apple.com | 2026-02-20T19:07:57Z | 37b480d940519324923f638c3a6d67b0ff0aae32da269d076770c13309c9ba36 |
| 2761 | it-help.tech | 2026-02-20T19:07:50Z | 9d739947c0052620663e73a8a068abbe77c646cb2d68df04e5b5e28ef6a290f5 |
| 2760 | it-help.tech | 2026-02-20T19:02:12Z | 9d739947c0052620663e73a8a068abbe77c646cb2d68df04e5b5e28ef6a290f5 |
| 2759 | westbyforcongress.com | 2026-02-20T18:50:39Z | 6e15912b44b8ca2c61c07bb303a9ad594c65de893e67901f4f89fc52423f147d |
| 2758 | westbyforcongress.com | 2026-02-20T18:43:07Z | 6e15912b44b8ca2c61c07bb303a9ad594c65de893e67901f4f89fc52423f147d |
| 2757 | apple.com | 2026-02-20T18:35:59Z | 37b480d940519324923f638c3a6d67b0ff0aae32da269d076770c13309c9ba36 |
| 2756 | cisa.gov | 2026-02-20T18:35:51Z | bdf5527e277dc477a6b19c3b5ea078f758bdc1d755249cc17b6c24a6a0ebad8d |
| 2755 | freebsd.org | 2026-02-20T18:32:16Z | 0ffa0e5694828d5296e909b18653c6bdcb058c7973fc9b7a27fbc09af7373640 |
| 2754 | cisa.gov | 2026-02-20T18:21:48Z | bdf5527e277dc477a6b19c3b5ea078f758bdc1d755249cc17b6c24a6a0ebad8d |
| 2753 | apple.com | 2026-02-20T18:21:42Z | 37b480d940519324923f638c3a6d67b0ff0aae32da269d076770c13309c9ba36 |
| 2752 | cisa.gov | 2026-02-20T18:20:56Z | bdf5527e277dc477a6b19c3b5ea078f758bdc1d755249cc17b6c24a6a0ebad8d |
| 2751 | apple.com | 2026-02-20T18:20:52Z | 37b480d940519324923f638c3a6d67b0ff0aae32da269d076770c13309c9ba36 |
| 2750 | apple.com | 2026-02-20T18:14:16Z | 37b480d940519324923f638c3a6d67b0ff0aae32da269d076770c13309c9ba36 |
| 2749 | cisa.gov | 2026-02-20T18:14:06Z | bdf5527e277dc477a6b19c3b5ea078f758bdc1d755249cc17b6c24a6a0ebad8d |
| 2748 | it-help.tech | 2026-02-20T18:14:06Z | 9d739947c0052620663e73a8a068abbe77c646cb2d68df04e5b5e28ef6a290f5 |
| 2747 | it-help.tech | 2026-02-20T17:59:35Z | 9d739947c0052620663e73a8a068abbe77c646cb2d68df04e5b5e28ef6a290f5 |
| 2746 | dnstool.it-help.tech | 2026-02-20T17:59:25Z | 7e0479d97f655265720d19a1d67daf540de76ed708a480c5361896739fa48900 |
| 2745 | dnstool.it-help.tech | 2026-02-20T17:59:02Z | 7e0479d97f655265720d19a1d67daf540de76ed708a480c5361896739fa48900 |
| 2744 | dnstool.it-help.tech | 2026-02-20T17:58:51Z | 7e0479d97f655265720d19a1d67daf540de76ed708a480c5361896739fa48900 |
| 2743 | it-help.tech | 2026-02-20T17:57:38Z | 9d739947c0052620663e73a8a068abbe77c646cb2d68df04e5b5e28ef6a290f5 |
| 2742 | it-help.tech | 2026-02-20T17:57:21Z | 9d739947c0052620663e73a8a068abbe77c646cb2d68df04e5b5e28ef6a290f5 |
| 2741 | it-help.tech | 2026-02-20T17:51:50Z | 9d739947c0052620663e73a8a068abbe77c646cb2d68df04e5b5e28ef6a290f5 |
| 2740 | it-help.tech | 2026-02-20T17:51:41Z | 9d739947c0052620663e73a8a068abbe77c646cb2d68df04e5b5e28ef6a290f5 |
| 2739 | apple.com | 2026-02-20T17:51:06Z | 37b480d940519324923f638c3a6d67b0ff0aae32da269d076770c13309c9ba36 |
| 2738 | cisa.gov | 2026-02-20T17:51:00Z | bdf5527e277dc477a6b19c3b5ea078f758bdc1d755249cc17b6c24a6a0ebad8d |
| 2737 | it-help.tech | 2026-02-20T17:49:08Z | 9d739947c0052620663e73a8a068abbe77c646cb2d68df04e5b5e28ef6a290f5 |
| 2736 | it-help.tech | 2026-02-20T17:47:59Z | 9d739947c0052620663e73a8a068abbe77c646cb2d68df04e5b5e28ef6a290f5 |
| 2735 | it-help.tech | 2026-02-20T17:47:40Z | 9d739947c0052620663e73a8a068abbe77c646cb2d68df04e5b5e28ef6a290f5 |
| 2734 | cisa.gov | 2026-02-20T17:45:40Z | bdf5527e277dc477a6b19c3b5ea078f758bdc1d755249cc17b6c24a6a0ebad8d |
| 2733 | cisa.gov | 2026-02-20T17:45:40Z | bdf5527e277dc477a6b19c3b5ea078f758bdc1d755249cc17b6c24a6a0ebad8d |
| 2732 | cisa.gov | 2026-02-20T17:45:40Z | bdf5527e277dc477a6b19c3b5ea078f758bdc1d755249cc17b6c24a6a0ebad8d |
| 2731 | apple.com | 2026-02-20T17:45:16Z | 37b480d940519324923f638c3a6d67b0ff0aae32da269d076770c13309c9ba36 |
| 2730 | it-help.tech | 2026-02-20T17:45:16Z | 9d739947c0052620663e73a8a068abbe77c646cb2d68df04e5b5e28ef6a290f5 |
| 2729 | it-help.tech | 2026-02-20T17:45:16Z | 9d739947c0052620663e73a8a068abbe77c646cb2d68df04e5b5e28ef6a290f5 |
| 2728 | proton.me | 2026-02-20T17:40:15Z | 619e31d09fb32548af888e4d115c7c88081abfd941059f82c09d38dc2649a6d5 |
| 2727 | apple.com | 2026-02-20T17:40:05Z | 37b480d940519324923f638c3a6d67b0ff0aae32da269d076770c13309c9ba36 |
| 2726 | cisa.gov | 2026-02-20T17:39:58Z | bdf5527e277dc477a6b19c3b5ea078f758bdc1d755249cc17b6c24a6a0ebad8d |
Hashes are computed using SHA-3-512 (Keccak, NIST FIPS 202) over a canonical JSON serialization of all protocol findings at analysis time. The serialization is deterministic — identical inputs always produce identical hashes. Any post-analysis modification to stored results would produce a different hash, detectable by the Hash Integrity Audit.
