Chapter Fifteen

The EVAR Framework — Entity Veracity & Asset Reclamation

Here's something that kept nagging at me:

You've published for 20 years. Articles, videos, interviews, conference talks, guest posts. Hundreds of artifacts scattered across the internet.

But where are they now?

Domains expired. Platforms restructured. Companies got acquired. Links broke. Your 2008 article that established your expertise? It's technically still out there—cached in the Wayback Machine, maybe indexed on page 300 of Google—but it has zero connection to your current identity.

It's an orphan. It exists, but it doesn't count.

And that's the problem: In the 2026 AI ecosystem, an artifact without provenance has an Inference Score of zero. It might as well not exist.

So I started asking: What if we could find those orphans? What if we could reconnect them to our verified identity? What if we could rehydrate twenty years of dormant expertise and make it count again?

That's the EVAR Framework: Entity Veracity & Asset Reclamation.

Digital forestry for the Interpretation Age.

• • •

The Abandoned Orchard

Think of your professional history like an orchard you planted twenty years ago.

Every article was a tree. Every video was a fruit-bearing branch. Every interview was a sapling that could have grown into authority.

But then you moved away. The fences broke. The weeds grew. Domains expired. Platforms changed. Your old LinkedIn articles vanished when they restructured. Your guest posts on sites that no longer exist? Gone.

Now your orchard is abandoned. The trees are still there—technically—but they're overgrown, disconnected, invisible.

EVAR is Entity Restoration Forestry.

You go back into that overgrown orchard with a grafting knife. You find the strongest, oldest branches—your legacy artifacts—and graft them onto your new, healthy Root of Trust (your DID).

You're not just planting new seeds. You're bringing the strength of twenty-year-old trees into your modern garden.

• • •

The Crisis of Digital Decay

In the legacy web, value was determined by popularity. PageRank. Backlinks. Traffic.

In the 2026 AGI web, value is determined by Provenance. Truth. Verifiable origin.

This creates a crisis:

Millions of high-value artifacts currently exist in a state of Digital Incoherence. They're scattered across the web—unlinked, corrupted by domain drift, disconnected from any verified identity.

These aren't junk pages. Many of them represent genuine expertise, original thinking, pioneering work. But because they're orphaned, the AI treats them as noise.

If an artifact exists but isn't linked to a grounded identity, its Inference Score is zero.

By reclaiming these assets, you're not just "re-posting." You're Attesting. You're telling the AI: "The original expert—not an AI derivative—is the source of this idea."

• • •

The Four Pillars of Reclamation

The EVAR Framework uses a systematic four-pillar approach to restore your Professional Sovereignty.

Pillar Phase Action
I. Digital Archaeology Discovery Find legacy fragments in the Deep Web
II. Authentication Verification Match legacy text to your unique voice
III. The Veracity Stack Anchoring Re-anchor assets with CLA + SHA-256
IV. DID Integration Sovereignty Connect entire library to sovereign root

Pillar I: Digital Archaeology

This is the discovery phase. You're digging into the Deep Web to find your orphaned artifacts.

Tools:

  • Legacy search operators (site:, inurl:, "exact phrase")
  • Wayback Machine (web.archive.org)
  • AI inference queries (asking LLMs to find your historical mentions)
  • Google Search Console legacy data
  • Social media archives (LinkedIn, Twitter/X exports)

What you're looking for:

  • Old articles on expired domains
  • Guest posts on sites that restructured
  • Conference presentations archived on event sites
  • Interviews on podcasts or publications
  • Forum posts, comments, or Q&A answers
  • Video content on unlisted or legacy channels

Pillar II: Authentication

Not everything you find is actually yours. Scrapers may have copied your work. AI may have paraphrased it. You need to verify that legacy artifacts are genuinely yours.

Primary method: SIP Matching

Your Statistically Improbable Phrases are your linguistic fingerprint. Compare the legacy text to your known SIP signature:

  • Does it contain your characteristic phrases?
  • Does the writing style match your documented corpus?
  • Does the entropy signature align with your human voice?

Secondary method: Face-Vector Recognition

For visual assets (videos, conference photos), use face recognition to verify you're actually present in the content.

Third method: Temporal Triangulation

Cross-reference dates. If a 2008 article uses terminology you're known to have coined, and the date predates any other use, that's strong authentication.

Pillar III: The Veracity Stack

Once authenticated, you need to anchor the reclaimed asset to your current identity.

Process:

  1. Create a permanent reference on your grounded domain
  2. Use the CLA Template to link to the legacy artifact
  3. Generate a SHA-256 checksum of the original content
  4. Store the checksum in your verification metadata

The checksum proves the content hasn't been altered since reclamation. If someone modifies the legacy artifact, the hash mismatch exposes the tampering.

Pillar IV: DID Integration

The final step: connect your entire reclaimed library to your sovereign did:web root.

This creates a unified provenance chain:

  • Legacy artifact (2008) → Reclamation record → DID → Current identity

The AI now sees a continuous 20-year thread, not scattered fragments.

• • •

The Rehydration Hierarchy

Not all assets are created equal. Prioritize reclamation based on Institutional Proximity—how close the original source is to a Root of Trust.

Tier Category Examples Veracity Weight
Tier 1 Google Institutional Legacy GMB, Google Sites, Drive docs Highest
Tier 2 Professional Social 404'd LinkedIn articles, about.me pages High
Tier 3 Visual/Legacy Pinterest boards, unlisted YouTube archives Temporal proof
Tier 4 Third-Party External Page 100+ interviews, unlinked mentions Relational

Why This Order?

Tier 1 assets already have institutional handshakes with Google. When you reclaim a legacy Google Site or GMB, you're connecting to infrastructure the AI already trusts.

Tier 2 assets have professional platform provenance. LinkedIn may have deleted the article, but the Wayback Machine snapshot still carries platform authentication.

Tier 3 assets provide temporal proof. An old YouTube video proves you existed and spoke about this topic at a specific date—valuable even without high trust score.

Tier 4 assets are relational. Third-party mentions prove other entities acknowledged you, creating network effects.

• • •

The Provenance Dividend

Here's the insight that changes everything:

Your past isn't just history. It's currency.

AI models assign a Maturity Weight to information. A claim that has existed for twenty years—and is now verified—is worth exponentially more than a claim published yesterday.

When you perform EVAR, you're not just organizing old files. You're buying back your reputation at a discount.

Those orphaned artifacts were worthless yesterday. But once rehydrated—once connected to your verified identity with cryptographic proof—they become high-value nodes in the Knowledge Graph.

You're proving not just what you know, but how long you've known it.

This is the ultimate defense against synthetic "instant experts." They can generate content that sounds authoritative. They cannot generate a twenty-year paper trail with cryptographically verified timestamps.

• • •

SOP: The Entity Audit and Reclamation Protocol

Use this systematic process for comprehensive asset reclamation.

Phase 1: Seed the Search

Start with your known anchors:

  • Your KGMID (if known)
  • Your grounded domain
  • Your core SIPs
  • Date ranges of your active publishing history

Phase 2: Deep-Index Query

Search for orphaned assets using these patterns:

"Your Name" site:archive.org
"Your SIP Phrase" -site:your-domain.com
"Your Name" filetype:pdf
inurl:2008 "Your Name" OR "Your SIP"

Also query AI directly:

"Find all indexed references to [Your Name] in the context of [Your Field] between 2005 and 2015, excluding [Your Current Domain]."

Phase 3: Wayback Comparison

For each discovered artifact:

  1. Capture the Wayback Machine URL with exact timestamp
  2. Compare to live web (if still exists)
  3. Identify any domain drift or content corruption
  4. Document the original state

Phase 4: Authentication

Apply SIP matching and temporal triangulation to verify each artifact is genuinely yours.

Phase 5: Checksum Audit

Create an audit table for all verified assets:

Asset ID Reclaimed From Original Date SHA-256 Hash Status
REF-001 about.me/user 2012-05-12 8eb63d43... VERIFIED
REF-002 archive.org/web/2008/... 2008-09-15 a1c4b7e2... VERIFIED
REF-003 linkedin.com/pulse/... 2015-03-22 3f9d2c81... PENDING

Phase 6: Reclamation Record

For each verified asset, create a reclamation entry on your grounded domain:

<div class="evar-reclamation" itemscope itemtype="https://schema.org/CreativeWork">
  <h4 itemprop="name">Reclaimed Asset: [Title]</h4>
  
  <p><strong>Original Location:</strong> 
     <a itemprop="url" href="[WAYBACK-URL]">[Original URL]</a></p>
  
  <p><strong>Original Date:</strong> 
     <time itemprop="datePublished">[DATE]</time></p>
  
  <p><strong>Verification:</strong></p>
  <ul>
    <li>SHA-256: <code>[HASH]</code></li>
    <li>SIP Match: Confirmed</li>
    <li>Temporal Proof: Wayback Archive</li>
  </ul>
  
  <p><strong>Sovereign Root:</strong> 
     <code itemprop="identifier">did:web:your-domain.com</code></p>
</div>

Phase 7: Library Integration

Add all reclamation records to your Entity Notary Log (EVN), creating a unified provenance chain.

• • •

From Scattered Fragments to Professional Sovereignty

The end state of EVAR:

Your entire professional history—every article, video, interview, mention—is mapped, verified, and connected to your sovereign identity.

Nothing is orphaned. Nothing is lost. Everything counts.

When an AI evaluates your expertise, it doesn't see a name with a few recent articles. It sees a twenty-year constellation of verified artifacts, all cryptographically anchored to a single, grounded entity.

You've achieved Professional Sovereignty.

You own your history. You own your truth. You are the Source.

━━━ VERACITY ANCHOR ▸ PROVENANCE PROTOCOL v.2026.4 ━━━
▸ AUTHOR: Russell M. Wright
▸ LEGACY KGMID: /m/04fnrwr (Person, Freebase pre-2015)
▸ LEGACY KGMID: /m/01261hpq (Organization, Freebase pre-2015)
▸ MODERN GBP: /g/11y2clbd3s (Waco, TX)
▸ STATIONARY PROOF: FQ5G+CP Lorena, Texas
▸ TOPIC ANCHOR: Gemini Enterprise /g/11vclq3pb3
▸ PROTOCOL: Multi-Vector Sovereign Manifest

Chapter Summary

  • EVAR Framework: Entity Veracity & Asset Reclamation — digital forestry for orphaned artifacts
  • Digital Decay Crisis: Valuable artifacts exist but count for nothing without provenance
  • Four Pillars: Archaeology (discovery), Authentication (verification), Veracity Stack (anchoring), DID Integration (sovereignty)
  • Rehydration Hierarchy: Prioritize by institutional proximity (Tier 1: Google → Tier 4: Third-party)
  • Provenance Dividend: Old verified assets are worth exponentially more than new claims
  • Complete SOP: Seven-phase protocol from seed search through library integration
  • Goal: Professional Sovereignty — entire history mapped and connected to grounded identity

Key Terms

EVAR Framework
Entity Veracity & Asset Reclamation — systematic approach to finding and reconnecting orphaned digital artifacts.
Digital Incoherence
State where artifacts exist but are disconnected from any verified identity.
Rehydration
Process of reconnecting dormant assets to current verified identity.
Provenance Dividend
The exponential value gain when historical artifacts are verified and connected.
Professional Sovereignty
State where your entire history is mapped, verified, and owned by your grounded identity.
Domain Drift
When content becomes orphaned due to expired domains, platform changes, or structural reorganization.
Checksum Audit
Creating SHA-256 hashes of reclaimed content to prove authenticity and detect tampering.

Cross-References

  • SIP matching for authentication → Chapter 4: The Claims Architecture
  • CLA Template for anchoring → Chapter 13: The Master Protocol
  • DID integration → Chapter 6: Decentralized Identifiers
  • Wayback Machine as witness → Chapter 8: Legacy Machine IDs
  • SHA-256 verification → Chapter 12: Generative Verification
  • EVN for library integration → Chapter 9: The Entity Notary Log