Saturday, March 21, 2026

I built a cryptographic verification protocol for non-human intelligence claims — would love this community's thoughts

I've been thinking about the verification problem in SETI for a while now, and I ended up building something that I think this community might find interesting (or tear apart — either works).

The basic idea: instead of waiting for signals and arguing about whether they're real, what if we created a publicly verifiable test that only something with beyond-human computational capabilities could pass?

How it works

The protocol pulls a SHA-256 hash from a confirmed Bitcoin transaction — so the hash is anchored to a real, timestamped event on an immutable public ledger. Nobody can predict it or pre-compute it. A claimant gets 5 minutes to provide the preimage (the original input that produces that hash).

Here's why that matters: SHA-256 has a property called preimage resistance. The search space is 2256. If you ran every NVIDIA H100 GPU ever manufactured simultaneously, brute-forcing a single preimage would take roughly 2.3 × 1035 years. The universe is ~1.4 × 1010 years old. We're talking 1025 times the age of the universe. It's not a soft barrier — it's a wall.

Why I think this is relevant to SETI

Most of our SETI methodology is about detection — listening for signals, scanning for technosignatures. But we don't have a great framework for verification if something actually showed up and said "hey." How would we know it's real and not a hoax?

This protocol doesn't solve the detection problem, but it creates a zero-trust verification layer. No shared secrets, no pre-established communication channels, no central authority deciding what counts. Just math that either checks out or doesn't.

If something passed the challenge, there are really only three explanations:

  1. SHA-256 was broken (which would be historic on its own — it secures Bitcoin, TLS, basically the entire internet)
  2. Quantum computing made a leap nobody saw coming (Grover's algorithm only gets you to 2128, still absurdly large)
  3. Something we don't have a framework for — computational capabilities so far beyond ours that reversing SHA-256 is trivial

What I'm looking for

I genuinely want criticism. Edge cases I haven't thought of. Assumptions that don't hold. Ways the protocol could be gamed that I'm missing. I wrote a more formal paper on it if anyone wants the technical details — it's on Zenodo with a DOI: https://doi.org/10.5281/zenodo.19153514

The live protocol is at thealienchallenge.com if you want to see it in action (you won't solve it — that's the point).

I know this sits in a weird space between cryptography and SETI, and I'm not claiming it's going to change anything overnight. But I do think the verification question deserves more serious thought than it gets, and this is my attempt at contributing something concrete to that conversation.

Curious what you all think.