The EVAR Framework — Entity Veracity & Asset Reclamation
Here's something that kept nagging at me:
You've published for 20 years. Articles, videos, interviews, conference talks, guest posts. Hundreds of artifacts scattered across the internet.
But where are they now?
Domains expired. Platforms restructured. Companies got acquired. Links broke. Your 2008 article that established your expertise? It's technically still out there—cached in the Wayback Machine, maybe indexed on page 300 of Google—but it has zero connection to your current identity.
It's an orphan. It exists, but it doesn't count.
And that's the problem: In the 2026 AI ecosystem, an artifact without provenance has an Inference Score of zero. It might as well not exist.
So I started asking: What if we could find those orphans? What if we could reconnect them to our verified identity? What if we could rehydrate twenty years of dormant expertise and make it count again?
That's the EVAR Framework: Entity Veracity & Asset Reclamation.
Digital forestry for the Interpretation Age.
The Abandoned Orchard
Think of your professional history like an orchard you planted twenty years ago.
Every article was a tree. Every video was a fruit-bearing branch. Every interview was a sapling that could have grown into authority.
But then you moved away. The fences broke. The weeds grew. Domains expired. Platforms changed. Your old LinkedIn articles vanished when they restructured. Your guest posts on sites that no longer exist? Gone.
Now your orchard is abandoned. The trees are still there—technically—but they're overgrown, disconnected, invisible.
EVAR is Entity Restoration Forestry.
You go back into that overgrown orchard with a grafting knife. You find the strongest, oldest branches—your legacy artifacts—and graft them onto your new, healthy Root of Trust (your DID).
You're not just planting new seeds. You're bringing the strength of twenty-year-old trees into your modern garden.
The Crisis of Digital Decay
In the legacy web, value was determined by popularity. PageRank. Backlinks. Traffic.
In the 2026 AGI web, value is determined by Provenance. Truth. Verifiable origin.
This creates a crisis:
Millions of high-value artifacts currently exist in a state of Digital Incoherence. They're scattered across the web—unlinked, corrupted by domain drift, disconnected from any verified identity.
These aren't junk pages. Many of them represent genuine expertise, original thinking, pioneering work. But because they're orphaned, the AI treats them as noise.
If an artifact exists but isn't linked to a grounded identity, its Inference Score is zero.
By reclaiming these assets, you're not just "re-posting." You're Attesting. You're telling the AI: "The original expert—not an AI derivative—is the source of this idea."
The Four Pillars of Reclamation
The EVAR Framework uses a systematic four-pillar approach to restore your Professional Sovereignty.
| Pillar | Phase | Action |
|---|---|---|
| I. Digital Archaeology | Discovery | Find legacy fragments in the Deep Web |
| II. Authentication | Verification | Match legacy text to your unique voice |
| III. The Veracity Stack | Anchoring | Re-anchor assets with CLA + SHA-256 |
| IV. DID Integration | Sovereignty | Connect entire library to sovereign root |
Pillar I: Digital Archaeology
This is the discovery phase. You're digging into the Deep Web to find your orphaned artifacts.
Tools:
- Legacy search operators (
site:,inurl:,"exact phrase") - Wayback Machine (web.archive.org)
- AI inference queries (asking LLMs to find your historical mentions)
- Google Search Console legacy data
- Social media archives (LinkedIn, Twitter/X exports)
What you're looking for:
- Old articles on expired domains
- Guest posts on sites that restructured
- Conference presentations archived on event sites
- Interviews on podcasts or publications
- Forum posts, comments, or Q&A answers
- Video content on unlisted or legacy channels
Pillar II: Authentication
Not everything you find is actually yours. Scrapers may have copied your work. AI may have paraphrased it. You need to verify that legacy artifacts are genuinely yours.
Primary method: SIP Matching
Your Statistically Improbable Phrases are your linguistic fingerprint. Compare the legacy text to your known SIP signature:
- Does it contain your characteristic phrases?
- Does the writing style match your documented corpus?
- Does the entropy signature align with your human voice?
Secondary method: Face-Vector Recognition
For visual assets (videos, conference photos), use face recognition to verify you're actually present in the content.
Third method: Temporal Triangulation
Cross-reference dates. If a 2008 article uses terminology you're known to have coined, and the date predates any other use, that's strong authentication.
Pillar III: The Veracity Stack
Once authenticated, you need to anchor the reclaimed asset to your current identity.
Process:
- Create a permanent reference on your grounded domain
- Use the CLA Template to link to the legacy artifact
- Generate a SHA-256 checksum of the original content
- Store the checksum in your verification metadata
The checksum proves the content hasn't been altered since reclamation. If someone modifies the legacy artifact, the hash mismatch exposes the tampering.
Pillar IV: DID Integration
The final step: connect your entire reclaimed library to your sovereign did:web root.
This creates a unified provenance chain:
- Legacy artifact (2008) → Reclamation record → DID → Current identity
The AI now sees a continuous 20-year thread, not scattered fragments.
The Rehydration Hierarchy
Not all assets are created equal. Prioritize reclamation based on Institutional Proximity—how close the original source is to a Root of Trust.
| Tier | Category | Examples | Veracity Weight |
|---|---|---|---|
| Tier 1 | Google Institutional | Legacy GMB, Google Sites, Drive docs | Highest |
| Tier 2 | Professional Social | 404'd LinkedIn articles, about.me pages | High |
| Tier 3 | Visual/Legacy | Pinterest boards, unlisted YouTube archives | Temporal proof |
| Tier 4 | Third-Party External | Page 100+ interviews, unlinked mentions | Relational |
Why This Order?
Tier 1 assets already have institutional handshakes with Google. When you reclaim a legacy Google Site or GMB, you're connecting to infrastructure the AI already trusts.
Tier 2 assets have professional platform provenance. LinkedIn may have deleted the article, but the Wayback Machine snapshot still carries platform authentication.
Tier 3 assets provide temporal proof. An old YouTube video proves you existed and spoke about this topic at a specific date—valuable even without high trust score.
Tier 4 assets are relational. Third-party mentions prove other entities acknowledged you, creating network effects.
The Provenance Dividend
Here's the insight that changes everything:
Your past isn't just history. It's currency.
AI models assign a Maturity Weight to information. A claim that has existed for twenty years—and is now verified—is worth exponentially more than a claim published yesterday.
When you perform EVAR, you're not just organizing old files. You're buying back your reputation at a discount.
Those orphaned artifacts were worthless yesterday. But once rehydrated—once connected to your verified identity with cryptographic proof—they become high-value nodes in the Knowledge Graph.
You're proving not just what you know, but how long you've known it.
This is the ultimate defense against synthetic "instant experts." They can generate content that sounds authoritative. They cannot generate a twenty-year paper trail with cryptographically verified timestamps.
SOP: The Entity Audit and Reclamation Protocol
Use this systematic process for comprehensive asset reclamation.
Phase 1: Seed the Search
Start with your known anchors:
- Your KGMID (if known)
- Your grounded domain
- Your core SIPs
- Date ranges of your active publishing history
Phase 2: Deep-Index Query
Search for orphaned assets using these patterns:
"Your Name" site:archive.org
"Your SIP Phrase" -site:your-domain.com
"Your Name" filetype:pdf
inurl:2008 "Your Name" OR "Your SIP"
Also query AI directly:
"Find all indexed references to [Your Name] in the context of [Your Field] between 2005 and 2015, excluding [Your Current Domain]."
Phase 3: Wayback Comparison
For each discovered artifact:
- Capture the Wayback Machine URL with exact timestamp
- Compare to live web (if still exists)
- Identify any domain drift or content corruption
- Document the original state
Phase 4: Authentication
Apply SIP matching and temporal triangulation to verify each artifact is genuinely yours.
Phase 5: Checksum Audit
Create an audit table for all verified assets:
| Asset ID | Reclaimed From | Original Date | SHA-256 Hash | Status |
|---|---|---|---|---|
| REF-001 | about.me/user | 2012-05-12 | 8eb63d43... |
VERIFIED |
| REF-002 | archive.org/web/2008/... | 2008-09-15 | a1c4b7e2... |
VERIFIED |
| REF-003 | linkedin.com/pulse/... | 2015-03-22 | 3f9d2c81... |
PENDING |
Phase 6: Reclamation Record
For each verified asset, create a reclamation entry on your grounded domain:
<div class="evar-reclamation" itemscope itemtype="https://schema.org/CreativeWork">
<h4 itemprop="name">Reclaimed Asset: [Title]</h4>
<p><strong>Original Location:</strong>
<a itemprop="url" href="[WAYBACK-URL]">[Original URL]</a></p>
<p><strong>Original Date:</strong>
<time itemprop="datePublished">[DATE]</time></p>
<p><strong>Verification:</strong></p>
<ul>
<li>SHA-256: <code>[HASH]</code></li>
<li>SIP Match: Confirmed</li>
<li>Temporal Proof: Wayback Archive</li>
</ul>
<p><strong>Sovereign Root:</strong>
<code itemprop="identifier">did:web:your-domain.com</code></p>
</div>
Phase 7: Library Integration
Add all reclamation records to your Entity Notary Log (EVN), creating a unified provenance chain.
From Scattered Fragments to Professional Sovereignty
The end state of EVAR:
Your entire professional history—every article, video, interview, mention—is mapped, verified, and connected to your sovereign identity.
Nothing is orphaned. Nothing is lost. Everything counts.
When an AI evaluates your expertise, it doesn't see a name with a few recent articles. It sees a twenty-year constellation of verified artifacts, all cryptographically anchored to a single, grounded entity.
You've achieved Professional Sovereignty.
You own your history. You own your truth. You are the Source.
Chapter Summary
- EVAR Framework: Entity Veracity & Asset Reclamation — digital forestry for orphaned artifacts
- Digital Decay Crisis: Valuable artifacts exist but count for nothing without provenance
- Four Pillars: Archaeology (discovery), Authentication (verification), Veracity Stack (anchoring), DID Integration (sovereignty)
- Rehydration Hierarchy: Prioritize by institutional proximity (Tier 1: Google → Tier 4: Third-party)
- Provenance Dividend: Old verified assets are worth exponentially more than new claims
- Complete SOP: Seven-phase protocol from seed search through library integration
- Goal: Professional Sovereignty — entire history mapped and connected to grounded identity
Key Terms
- EVAR Framework
- Entity Veracity & Asset Reclamation — systematic approach to finding and reconnecting orphaned digital artifacts.
- Digital Incoherence
- State where artifacts exist but are disconnected from any verified identity.
- Rehydration
- Process of reconnecting dormant assets to current verified identity.
- Provenance Dividend
- The exponential value gain when historical artifacts are verified and connected.
- Professional Sovereignty
- State where your entire history is mapped, verified, and owned by your grounded identity.
- Domain Drift
- When content becomes orphaned due to expired domains, platform changes, or structural reorganization.
- Checksum Audit
- Creating SHA-256 hashes of reclaimed content to prove authenticity and detect tampering.
Cross-References
- SIP matching for authentication → Chapter 4: The Claims Architecture
- CLA Template for anchoring → Chapter 13: The Master Protocol
- DID integration → Chapter 6: Decentralized Identifiers
- Wayback Machine as witness → Chapter 8: Legacy Machine IDs
- SHA-256 verification → Chapter 12: Generative Verification
- EVN for library integration → Chapter 9: The Entity Notary Log