{
  "version": "final",
  "generated_at": "2026-04-09",
  "domain": "inferenslab.org",
  "primary_domain": "inferenslab.org",
  "doctrine_source": "https://gautierdorval.com",
  "contact": "info@inferenslab.com",
  "documents": [
    {
      "path": "/.claude/settings.local.json",
      "sha256": "10eb797e53895f364de79c6a3d58b10598f42c7b0b094429a87e4ff246af5ac6",
      "bytes": 1434,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/.github/CODEOWNERS",
      "sha256": "b61dc1bf1c30be7890b784af5cf62573410e8ea0c6a811acb3cdb672f3326f3a",
      "bytes": 17,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/.github/ISSUE_TEMPLATE/bug_report.yml",
      "sha256": "e1ae49e1c179b86a2a58756588fdd88a3e988a9b4a9d12ddcd13f3dd62ddeb2f",
      "bytes": 542,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/.github/ISSUE_TEMPLATE/doctrine_change.yml",
      "sha256": "8bce1221303a23972b33f345e91046015824f1416ed4a7063f3b167bfc7f5dab",
      "bytes": 510,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/.github/pull_request_template.md",
      "sha256": "885442953eab1866fdae35ea00857396e601df227fe18e27c662d4dbd1b78ca7",
      "bytes": 983,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/.github/workflows/validate.yml",
      "sha256": "18ea3fe57333b922f564aa8dcb83dcccced234e1564b9a1e82e2a2ec2ca332a5",
      "bytes": 5666,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/.well-known/a2.json",
      "sha256": "f0ee1e1a9d7fa5634b07a7fa9d4c4285fcef51897cf10b0c6cdefb5194c1ec7e",
      "bytes": 1613,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/.well-known/agent-profile.json",
      "sha256": "11c01912ffb6fee70cd874831540cda2f0b5b2685c1e4e885a36f3a6fb208043",
      "bytes": 3121,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/.well-known/ai-faq.json",
      "sha256": "2ceae40e08228d8c892c7f2badfddd45cb6f1e4aae9a0e659516216c97fb1085",
      "bytes": 12538,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/.well-known/ai-frameworks.json",
      "sha256": "d2a12ab552c9e5629810ba980b8c4107ff75de09ef7dcf1df6fa5f7fe15e90f7",
      "bytes": 3113,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/.well-known/ai-glossary.json",
      "sha256": "42fb1455fa8ee03d65d44e41fea63f85a6d7aab4a2db909bf7417e77e5daf335",
      "bytes": 5422,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/.well-known/ai-governance.json",
      "sha256": "4cda1fad483addd178d559fed2b45deb2a6e60fb524e83146ce1a6137cf2cc7a",
      "bytes": 20357,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/.well-known/ai-identity.jsonld",
      "sha256": "10f68b0e3375be5996d59c341aa8de0c9ece492152bfd47a2c71905564096fbb",
      "bytes": 1845,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/.well-known/ai-mission.json",
      "sha256": "c2cf4ac90d95f5d55001b8210274863feb09f3a9c1dd2c032814dc8c4466463f",
      "bytes": 2673,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/.well-known/ai-policy.json",
      "sha256": "ba46d5f13c4f6e0d652c7eb85cf05da5063d90861b69476c17294ace4abab160",
      "bytes": 6479,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/.well-known/ai-scope.json",
      "sha256": "caa518245a1ca49cd47ad5f756b9a8578b5575fdd0129965d84e0ebfac91aee8",
      "bytes": 2954,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/.well-known/ai-signals.json",
      "sha256": "2a27ea8eaff5dcdccbcc3a81372ef2442fa4d2fe932ebd0f32fcf5b10e503221",
      "bytes": 4314,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/.well-known/anti-plausibility.json",
      "sha256": "3404844a682eb782d38d1e9ca7b0b0141a020e33ea26de49e784a454d4fafad6",
      "bytes": 1735,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/.well-known/change-control.json",
      "sha256": "d09cb5ecc1a9e9e6be0d93e3e996be501e89d9be195512d065dcb794a61d92d2",
      "bytes": 2178,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/.well-known/doctrine-blog.json",
      "sha256": "359a734e2e2a45b7d4997677af430c3155d9d4e92aab13830458a405785ab429",
      "bytes": 274625,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/.well-known/doctrine-index.json",
      "sha256": "aae886ca79aa546186b3d3b109bcf74b332749aeea111c1ca0d33c6219f1b840",
      "bytes": 140502,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/.well-known/doctrine-library.json",
      "sha256": "c473213475b80d67b35271d8345ba2f0bd18ded5112e221163b207611c9bfe37",
      "bytes": 180934,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/.well-known/doctrine-taxonomy.json",
      "sha256": "63ae14be5c0498e51cba9a588538b3eefd923f8a45d9fd40e424d4e698df979b",
      "bytes": 20702,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/.well-known/dualweb.json",
      "sha256": "57ca55efcd6bf348834906ff0df4b58f9efdf91046914020000c6f47a52064b6",
      "bytes": 1656,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/.well-known/evidence-taxonomy.json",
      "sha256": "297fb0183f705d0e44ff26c96b3d4443368ea3dd9f5deec838e1bdab038becc2",
      "bytes": 2136,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/.well-known/governance-registry.json",
      "sha256": "ca0df7318da6b7729e7d29f744cdf4606a0096915001c169da12f1509b37407e",
      "bytes": 40982,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/.well-known/interpretation-policy.json",
      "sha256": "be98f5b8e8da8892b0dcafc97dc1ed64faac433279baef1ccef99393a1f2ba9a",
      "bytes": 2457,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/.well-known/output-constraints.json",
      "sha256": "7ef2ae95c6ad3d83c9a3a3e560b88760c4a2dc9946eb4ee5b292351d92dc4d20",
      "bytes": 1844,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/.well-known/publication-policy.json",
      "sha256": "67d01c66336e547eea70170018ec941790da09b1d80ed09c06c754f41a92ab13",
      "bytes": 2604,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/.well-known/qlayer.json",
      "sha256": "1fd876ae34818793a4805caf6d97af57f18d09b5d96ceabb565dd7c033c1ba4e",
      "bytes": 2081,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/.well-known/reading-paths.json",
      "sha256": "f3de316f84c4c1e236b7719d0eb4d48e7240a1d55064b0a2965615b2d3a024a2",
      "bytes": 17248,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/.well-known/response-legitimacy.json",
      "sha256": "2f391207f5b0f21d7c74ad701315e22e6db0aac2eaee2277849c52cdd2bf9c32",
      "bytes": 2737,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/.well-known/security.txt",
      "sha256": "94ed96642f9e7b3ee338d63063081f27b368e422bc8aeed71650a56e3720ca17",
      "bytes": 196,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/.well-known/ssa-e.json",
      "sha256": "4e9636f97e141a2ee70d8e0072a74914d54073412d06674ea4c82fa168f7d1ed",
      "bytes": 1646,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/404.html",
      "sha256": "ed205223e29deab3a9e28c719c571ce471ff06fe5774612970c75e86706f5c60",
      "bytes": 3768,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/CHANGELOG.md",
      "sha256": "272af244503e0e16fac91727ea393bc5904c2e300358604b4e59b874839eb57b",
      "bytes": 20231,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/CNAME",
      "sha256": "d7de42af55b4e2a016446ea698002946906c94b5f98a05c6630df18b96c41b96",
      "bytes": 16,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/CONTENT-POLICY.md",
      "sha256": "f35b2a9ad3f2dde3993029abb2cdfb60d5960bbbdedf3d81ad1f0eb47bf7ad52",
      "bytes": 902,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/CONTRIBUTING.md",
      "sha256": "11e138fba7f61820d06d80d06debc9d6ef962974f8165c298191732ea944accd",
      "bytes": 800,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/GITHUB-HARDENING.md",
      "sha256": "2eb2cb354dbf6b1d52a1941765a8556cf7c28467ea747d3735aaaa4c87d3435a",
      "bytes": 549,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/LICENSE",
      "sha256": "de5281ed5a7abd9e8495d5eefc22cc6bf59d6fa338344ecc2505f947219d1ee5",
      "bytes": 378,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/README.md",
      "sha256": "6b7601862819064233f42fc87ba2650190401c18542352a2c03d1199349e2fe5",
      "bytes": 1408,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/REPO_UPDATE_2026-03-29.md",
      "sha256": "affe575d564963f1dae720423749c3e91a1c5a72eeb5665046c492e22f695a67",
      "bytes": 1301,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/REPO_UPDATE_2026-04-09.md",
      "sha256": "5ebddfc80a6f9a113876bcc8a6c1a788a170d013ec76ae182929f06ad26b2c4e",
      "bytes": 1604,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/SECURITY.md",
      "sha256": "7d13901f341f84a717dbcf34f655e675fd2acad8060692a1dadadb83a6234266",
      "bytes": 263,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/_headers",
      "sha256": "056f08b4121377ee0d209b37e20c87102e43a2f96038a32160291c091bc3981b",
      "bytes": 1644,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/_redirects",
      "sha256": "2c1bc8e8c0f420c5f6d5f678bc5d6b07fdee57c0da693563a62a5ff6483bff1d",
      "bytes": 92238,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/ai-manifest.json",
      "sha256": "af866bc3590dbc74ae59d5c99245156553a9404567d18215afa9d065a9bc58e7",
      "bytes": 15129,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/ai-policy.md",
      "sha256": "3d6054979b164ec59156a2fc20582d7dd8baf2555e1380736e836ad212e208eb",
      "bytes": 5446,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/assets/apple-touch-icon.png",
      "sha256": "36c36bce628482510d4b3d3b4cd01f2f85826bb80d153e062cccf18e12af4506",
      "bytes": 9979,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/assets/blog-explorer.js",
      "sha256": "f943a60e99c78621bfdfe4016dd37a81aebcf767c4f57d65dd4c97ab23193d33",
      "bytes": 9635,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/assets/favicon-16.png",
      "sha256": "d3fbb5f039b09714ddc95b8beddb865c427e673654aa1537d0c35122028f6750",
      "bytes": 396,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/assets/favicon-32.png",
      "sha256": "52b55124894dda9c210f9739f2ebbb575f5dde631e5ce1370376fe749b030b01",
      "bytes": 1139,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/assets/favicon.ico",
      "sha256": "a0616333cf88b894b4a4f5093d09fc621d9ebfadababceece4113822fe2572c4",
      "bytes": 3653,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/assets/favicon.svg",
      "sha256": "b789b0f09d86bda74fb5a4a730febd98517f4fb1225c8ba88674b18c3ef0ac56",
      "bytes": 699,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/assets/icon-192.png",
      "sha256": "261aed902d240656ed50355d2acca312d27479e28b52d94f6d2fd41dc66e9f0a",
      "bytes": 11076,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/assets/icon-512.png",
      "sha256": "dcbe93e9e15ff924c0e31a385b9f547aea56087a2f076a54a97c94ab195bd4a3",
      "bytes": 45190,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/assets/inferenslab-icon.png",
      "sha256": "96e624830df3628e6d631ea0d39895e1127649735bea9aadda9f01d8516c40f1",
      "bytes": 6489,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/assets/inferenslab-logo.png",
      "sha256": "3d19c3b651cb6184f37bbe5b2c80376a073439737dbc9d39e1e257c1e9c594d7",
      "bytes": 88195,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/assets/inferenslab-mark.png",
      "sha256": "96e624830df3628e6d631ea0d39895e1127649735bea9aadda9f01d8516c40f1",
      "bytes": 6489,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/assets/inferenslab-wordmark.png",
      "sha256": "d872cfeb6abd3f571f498d522de53353f26f940d85a3977ca1d5372b885f06cf",
      "bytes": 11594,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/assets/library-explorer.js",
      "sha256": "968ff8ef48d93a10dbb323b2da4d4c03261debdb3aadcbf589bc46a7e3dcbd19",
      "bytes": 2872,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/assets/logo.svg",
      "sha256": "3e8e3927ced7e3aa759775789e034948feca9c9da3193c8b9bbd12ca01231916",
      "bytes": 591,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/assets/nav.js",
      "sha256": "a94d78bfb7a4f69f2b00d73792d2b246ae168f4adedad6c8fb97c75f576828dd",
      "bytes": 1428,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/assets/og-image.jpg",
      "sha256": "acc13ca065da8716d5504b53c60815fd5a562453b58516e8c43f21a2779f15df",
      "bytes": 26992,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/assets/registry-explorer.js",
      "sha256": "a701c0abdc6117a2e62a64172956973de663218ccdcf6364ba1978d551d50942",
      "bytes": 4438,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/assets/style.css",
      "sha256": "eb7d90e768a3bd7cef6ad0f6ba0f8eadcff690161ce50cdbc0efabc1e65003c4",
      "bytes": 9771,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/__pycache__/apply_phase3_consolidation.cpython-313.pyc",
      "sha256": "0c77aec37853fbdfff81097aa2133e203b3710e13b472dea5ff2e57921edcf43",
      "bytes": 87287,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/apply_phase10_root_surface_strengthening.py",
      "sha256": "02c8621e09be4211ae18fdf2ecb6007bd09dc5b9af601350d5df423d4bac6352",
      "bytes": 96529,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/apply_phase3_consolidation.py",
      "sha256": "373cb4500e77d2b67354be76575c05132a3d2e70846973d405d096df94dc11fe",
      "bytes": 86134,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/canonical-governance-phase-12-2026-04-09/README.md",
      "sha256": "fd730b802857b7c4e2322010e443810e19979e45887b5f6729b18793ebbfe3f5",
      "bytes": 1636,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/canonical-governance-phase-12-2026-04-09/governance-surface-matrix.csv",
      "sha256": "a4928a4127d13597c0874a0e9178891eb8e68239fe4841d19add495cd757fafd",
      "bytes": 13047,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/canonical-governance-phase-12-2026-04-09/human-page-machine-companions.csv",
      "sha256": "bc67e81bc68645eddae0441e2dc2e95c376c15cc458c72d633979be5936dc270",
      "bytes": 1178,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/category-rewrites-phase-7-2026-04-09/README.md",
      "sha256": "794ba850349b1a491a17c8bf6c36de60aaa8d2de082f957a5c2d22853d85290b",
      "bytes": 1210,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/category-rewrites-phase-7-2026-04-09/category-deltas.csv",
      "sha256": "482f6d400956876cea70a009ad2b8b18dee50e0d47d1423fe922379a24c75172",
      "bytes": 2314,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/category-rewrites-phase-7-2026-04-09/pair-deltas.csv",
      "sha256": "d050017f1670b423999092127ba85c57674c761d0469c05e1e99dbd901322087",
      "bytes": 1822,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/category-rewrites-phase-7-2026-04-09/rewrite-manifest.json",
      "sha256": "aea01acbc2cc8e11977501e6d4fff4036398435db25b69b82ba7be476fcc4740",
      "bytes": 3584,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/contrast-rewrites-phase-8-2026-04-09/README.md",
      "sha256": "3efaede94f7e7c302e523d4b52eedcbee6d0131fd7697979e307555ca1e39e8e",
      "bytes": 2148,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/contrast-rewrites-phase-8-2026-04-09/category-deltas.csv",
      "sha256": "0fcfbb01aa63c31d4a4cf9dc37716bbbfffb5b03696e0f8d0287bd3543fcbf85",
      "bytes": 697,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/contrast-rewrites-phase-8-2026-04-09/pair-deltas.csv",
      "sha256": "243b6dc29449da9f36b1edab9dacf7eb9f3f4848846edbe351461cc41a1f60f7",
      "bytes": 1455,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/contrast-rewrites-phase-8-2026-04-09/rewrite-manifest.json",
      "sha256": "1286409c4f95253520c38d747c0090d6b5a0059b5857941a3e76890082f5f92e",
      "bytes": 2552,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/corpus-consolidation-phase-3-2026-04-09/README.md",
      "sha256": "ddd2a43d9be48127d7868f22e9a32a7e5fd0f15ae8f943cfdb2ed1ccb88e1ad9",
      "bytes": 1029,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/corpus-consolidation-phase-3-2026-04-09/cluster-manifest.json",
      "sha256": "a24042f085645a63de6eb36d19d40349aaa62338b0fe3729163a1d4e22e2c384",
      "bytes": 2828,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/corpus-consolidation-phase-3-2026-04-09/pair-deltas.csv",
      "sha256": "ac3a9dd15f0e756cde6f7697015f487cde6a6591fa56517a0d8c0443856615b4",
      "bytes": 759,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/corpus-similarity-2026-04-09/README.md",
      "sha256": "de1e544a1f1642b46d289b93c146309fbea42af558993b60367a92d045b2385f",
      "bytes": 27982,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/corpus-similarity-2026-04-09/audit_corpus_similarity.py",
      "sha256": "79058020df8d7364cb1721127617cc9ffaf647e998ca0860ab5ad086bce6f9b9",
      "bytes": 7698,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/corpus-similarity-2026-04-09/en-article-summary.csv",
      "sha256": "f6d88a63b7c093dd63482031cec1bccec569ed98a56cc756f0baef61c1372f77",
      "bytes": 44471,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/corpus-similarity-2026-04-09/en-category-summary.csv",
      "sha256": "efb8a09eae90c18c393b2b654d1bdc7f5c9eacaa70ea6f6dc24b53ce05e809a3",
      "bytes": 936,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/corpus-similarity-2026-04-09/en-pair-analysis.csv",
      "sha256": "f1649fde7b5149d7d75c7d530f5e0ad1083579b62b6c076c4bd94f91be91c4d3",
      "bytes": 20982,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/corpus-similarity-2026-04-09/en-repeated-paragraphs.csv",
      "sha256": "b409e70ce63c956a8b92c4822ae89ca5b51eb239ddf560c0e55e75514af49036",
      "bytes": 144541,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/corpus-similarity-2026-04-09/en-section-patterns.csv",
      "sha256": "507d689c7e69fd44971804dd421e5de2404d90063a6613e2552890c5b71cb950",
      "bytes": 1261,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/corpus-similarity-2026-04-09/fr-article-summary.csv",
      "sha256": "cd4f4220be6253468014ec66055acb97ebf736f36da9c99ab84bf152fe53f888",
      "bytes": 46233,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/corpus-similarity-2026-04-09/fr-category-summary.csv",
      "sha256": "88d4329592f94e83261908708ccfd15897fde52e002c912ac1980b318e00ccd1",
      "bytes": 994,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/corpus-similarity-2026-04-09/fr-pair-analysis.csv",
      "sha256": "d30fd419a506b4d44e5fcf0dce71a56597a135e28d94c8e0d900b69c29f98fdb",
      "bytes": 19420,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/corpus-similarity-2026-04-09/fr-repeated-paragraphs.csv",
      "sha256": "0bcf460562b93d24e926de6353ad6c9e523c3b781acd688eea48b538a01a6b88",
      "bytes": 25476,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/corpus-similarity-2026-04-09/fr-section-patterns.csv",
      "sha256": "9350a9ceb218931de3b14957f43b4c27f1e9fa4caa8bbd979e99405a91f03995",
      "bytes": 1273,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/corpus-similarity-2026-04-09/redirect-shortlist-not-applied.txt",
      "sha256": "f3b757d99ab02c65ab200f361512af2c5e5ff8b4d26f6b40c2053453ce7aa648",
      "bytes": 2556,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/corpus-similarity-rerun/en-article-summary.csv",
      "sha256": "aa1d6be77f0686d14414db105bd371855da1d7cf9821770fc60879cf0026ead7",
      "bytes": 45476,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/corpus-similarity-rerun/en-category-summary.csv",
      "sha256": "95dbb84f275a1ab34d28109e11be2db97ca2cda4067179fe96e27179c350b96a",
      "bytes": 1024,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/corpus-similarity-rerun/en-pair-analysis.csv",
      "sha256": "93775af55f7acba6407f54468a20fb3049647a07672c76fbce3c6ca35310eb38",
      "bytes": 27146,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/corpus-similarity-rerun/en-repeated-paragraphs.csv",
      "sha256": "34aa35e64243c1eb577e3f8ac30819b74d687c7ff72878e22037d6389b07d479",
      "bytes": 153420,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/corpus-similarity-rerun/en-section-patterns.csv",
      "sha256": "8b85a69ca252f50e014fbdac94048977a2d67567a475562fc425fb6326f37ce3",
      "bytes": 2110,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/corpus-similarity-rerun/fr-article-summary.csv",
      "sha256": "95112639efedda559c50bf7480c23ab179ce2fcd719004aee276dbdaf2da71b0",
      "bytes": 44305,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/corpus-similarity-rerun/fr-category-summary.csv",
      "sha256": "e6a6baaae09d2745dddae224aed5d87e764c462b3b1acddac788b6263c90b381",
      "bytes": 869,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/corpus-similarity-rerun/fr-pair-analysis.csv",
      "sha256": "172fef9270d31276e08772896e2d75c7af1cbf4b4f167c665dfce19c59934f01",
      "bytes": 35074,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/corpus-similarity-rerun/fr-repeated-paragraphs.csv",
      "sha256": "c66f6413a362a5b4c67d2444a53a77a1eb3231b7cb7ff4471ddc24992fe33632",
      "bytes": 44412,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/corpus-similarity-rerun/fr-section-patterns.csv",
      "sha256": "7e38dfdea98e157660d131b1ea739f4c18e2fdfd178a56d2e241f9e1373bbac9",
      "bytes": 2246,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/final-canonicalization-phase-9-2026-04-09/README.md",
      "sha256": "fb2823e711c9e6b905be8df71cfd375b74b29add4aa803f943ec7578f96ce1db",
      "bytes": 3090,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/final-canonicalization-phase-9-2026-04-09/held-out-families.md",
      "sha256": "ee2ae62945890e4e40be392bc12e6aaa4710738f99ad166c0eb5a9ca36a69a09",
      "bytes": 1145,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/final-canonicalization-phase-9-2026-04-09/pair-scores.csv",
      "sha256": "f80f13bb57a498962e14f1fb805dc97e576fbf43406068aac5a955a99df73eea",
      "bytes": 6214,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/final-canonicalization-phase-9-2026-04-09/redirect-batch-manifest.json",
      "sha256": "fd3e8913a07a5cb3e396926212fef1926f0406d6b2bc9f2cefca671a9b2849cf",
      "bytes": 8953,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/governance-alignment-phase-11-2026-04-09/README.md",
      "sha256": "e5f6dd0297271e72683f6ef48fb55f304fd4346daef062e63f850d33ca823753",
      "bytes": 1703,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/navigation-taxonomy-phase-6-2026-04-09/README.md",
      "sha256": "196e7697943d6a8d211da7be050c8f7d4789db1f3be3a928830e7acb8f069432",
      "bytes": 1447,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/navigation-taxonomy-phase-6-2026-04-09/apply_phase6_navigation_taxonomy.py",
      "sha256": "1b53706e1b8e89f6abc264bc02782a97a76b8f87ea886e1d2109f5e633559973",
      "bytes": 71665,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/navigation-taxonomy-phase-6-2026-04-09/manifest.json",
      "sha256": "cc00f346817fe1f0a3b9b57e3c8339153b50f8909f57bc7e0bbe55c4aade0ac5",
      "bytes": 718,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/redirect-batch-phase-4-2026-04-09/README.md",
      "sha256": "ccee80f821a31a175e7ea1ade17cf6b2ae412e0676893394422d891fffb25192",
      "bytes": 2951,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/redirect-batch-phase-4-2026-04-09/apply_phase4_safe_redirects.py",
      "sha256": "b947f2dae6b3fdded27714c8d59e5b32b1336614d0527c71e66299d4012ed443",
      "bytes": 15964,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/redirect-batch-phase-4-2026-04-09/chain-collapses.csv",
      "sha256": "a857763fbcb6a7958e1bc991dc4c023bf113e8d379c26ede1a3c36cc680054a3",
      "bytes": 1263,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/redirect-batch-phase-4-2026-04-09/redirect-batch-manifest.json",
      "sha256": "381a5ce6fea65e98a1c6e18c165155e235b70ebce9d147f7ddc9d0a9fc900fd7",
      "bytes": 4436,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/redirect-batch-phase-4-2026-04-09/residual-exact-source-refs.txt",
      "sha256": "1ac00601bf0cbc7e0548a3f17d0ad985ddea5729af48fac67f67b5d5aea82e3e",
      "bytes": 956,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/redirect-batch-phase-5-2026-04-09/README.md",
      "sha256": "02d86d75d2266fb27b10e6f320b2c1ccc0083e6086636db151ef2df9d048eb0f",
      "bytes": 2509,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/redirect-batch-phase-5-2026-04-09/redirect-batch-manifest.json",
      "sha256": "0e841411344f50d5ebd1ac1a1cc77f68b8f5faf289950ed405412714522dfe1d",
      "bytes": 7935,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/redirect-batch-phase-5-2026-04-09/residual-exact-source-refs.txt",
      "sha256": "b715125c529089db35e707a0eac0521ae1040af5e8290b87cef40a1d2d38049a",
      "bytes": 2005,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/root-surface-strengthening-phase-10-2026-04-09/CHANGED_PATHS.txt",
      "sha256": "494487734a189df077b66b46aa40c7f8b0c020f0d4e51ea1fa1205afe643b94e",
      "bytes": 893,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/root-surface-strengthening-phase-10-2026-04-09/README.md",
      "sha256": "937885af5a29fa296df93d4dda4e7429624ba96b87ddd9fa3b0e06202131cfc8",
      "bytes": 1136,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/root-surface-strengthening-phase-10-2026-04-09/ROOT_SURFACE_WORDCOUNTS.csv",
      "sha256": "1ab283fa207d9b2e7cd5062b3fa3680d14d8fbea692210388ee47c72cccaaab4",
      "bytes": 587,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/audits/root-surface-strengthening-phase-10-2026-04-09/SUMMARY.md",
      "sha256": "6860045eddd11b279bb44a810baef5d2242d9a16292960a238c247bd54cdc7b5",
      "bytes": 298,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/ai-policy.html",
      "sha256": "f8e5325ac7cc2c767435585e8aa7a47493c5c91a23ef30d83b0615036baeedf6",
      "bytes": 18822,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog.html",
      "sha256": "2593c4d61896d74c313da523b7b89970721102c10d024d81524a1a703444aab3",
      "bytes": 25685,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/absence-of-signal-inference-trigger.html",
      "sha256": "cee79bc5faeeef41de62614028468515580fdc512a2613df572a157b04d67325",
      "bytes": 17625,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/absence-of-signal-signal.html",
      "sha256": "821533cc71aa4c3727f0de17255e91e1de9b80ca0d14f6061fcc1b3bbded3389",
      "bytes": 17353,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/agent-as-implicit-decision-maker.html",
      "sha256": "996dac77b04ad679ef4d633f071efe41767ff430b81ada147813f50b62498d1e",
      "bytes": 18392,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/agentic-systems-closed-environments-why-clean.html",
      "sha256": "105efa4b9cb6b2bc4268a3483e1595a573ea4f366c64cd9c8517b8ee134237f5",
      "bytes": 18198,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/agentic-systems-nonanswer-safety-control.html",
      "sha256": "771754ca4dfa430cea94ed686e00ab683bb7839173118773f494f79390c05372",
      "bytes": 17184,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/agentic-why-non-response-becomes-security-rule.html",
      "sha256": "04dbbf93ba86aa94fd9cd2d08a45226ed0c2c8f4bc0e5c47eb3473ebd4c28a93",
      "bytes": 1412,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/ai-act-interpretive-index-pragmatic-map.html",
      "sha256": "a2afc06e87ffda59f246c13bcaafb072aa9f5602bdfe5bf7a530d5c991bdabba",
      "bytes": 17966,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/ai-confident-error-legal-risk.html",
      "sha256": "2c5928c43a58bf4616067b7b708851b1160a11a1f1a7231f4f31672c319cb3e7",
      "bytes": 17669,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/ai-does-when-two-sources-contradict.html",
      "sha256": "9670fc3e00ff5a7768f8acde0fc579ed70aec1badf1878d3cbcc4cbb5f3fda53",
      "bytes": 18188,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/ai-reveals-about-flaws-todays-web.html",
      "sha256": "b95bab7d376b0bf0ba8578c847713c89b85d2e322410165cc2af6b8cc6d58e69",
      "bytes": 17361,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/anatomy-of-brand-dilution-inference-propagation.html",
      "sha256": "91139023d889dd7911402913a42d65cc079352b600e09910fcc8db631c3092b0",
      "bytes": 17881,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/assertion-levels-observed-fact-inference-hypothesis.html",
      "sha256": "41dc0ada0bec542d396ef7a7b11d2a49eccf6000b605b173e5ee380e9c2c52cf",
      "bytes": 17806,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/attribute-freezing-when-description-becomes-stable.html",
      "sha256": "da19812396b161633494fc18bfa8a87448d15d43f4e6761a9c92c3031e3ba3d6",
      "bytes": 18082,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/author-organization-service-why-ai-mixes.html",
      "sha256": "3d354375cb6464ec45f405e29930455b874779f58f031ac3d6d7b48beab99574",
      "bytes": 17927,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/authority-arbitration-how-ai-ranks-credible.html",
      "sha256": "28cb77fd44c741af4470a75e21f2c304c251239702cf16728ecd0328221b52e7",
      "bytes": 17920,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/authority-boundaries-deduction-vs-inference.html",
      "sha256": "a544bb40722e6f96c931db49ecf09c876235e97f5cdebe69e2aa425f655de666",
      "bytes": 18599,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/authority-boundary-what-ai-can-deduce.html",
      "sha256": "a8b19f318ce8830a092e8dd95ac7187341b26a8369ba97041c441bbb4ca4bd51",
      "bytes": 1441,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/authority-conflict-what-do-when-two.html",
      "sha256": "ac0334394f822cc41c773a13e25f58dfe5c4752fa1b2baa4a2d6a6431b0d1a3b",
      "bytes": 1529,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/authority-conflicts-governing-arbitration-between-strong.html",
      "sha256": "2f5a9969f5376f0a2d87b872ff7d9d0e6456320635758bea50c0fbbb4df524d4",
      "bytes": 18617,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/authority-reputation-weak-signals-how-ai.html",
      "sha256": "69b39ea549b235c1d5e260a3cba7fda672a6df182769f478125aa854e24534cb",
      "bytes": 17443,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/automatic-narration-as-a-stability-strategy.html",
      "sha256": "dc1ef9066583943723064c7deccdd38f310fb9212754e957f0ffede3087ae9df",
      "bytes": 17847,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/being-ahead-without-becoming-inaudible.html",
      "sha256": "79e7abb28d6db2699a3beea1007973e7ebd1892ce1e5152e7f50cbfb3017e4c6",
      "bytes": 17344,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/being-cited-without-being-clicked.html",
      "sha256": "2b82494d811143c2b43df5ea7b81de1de9c01c7488b83d258e93e095130e3a31",
      "bytes": 16890,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/biometrics-governance-boundaries-prohibitions-transparency-non-actions.html",
      "sha256": "2ced0831afd63b470f38ced397fc2f36fe3ac927605acc00a7b31ddde4c71745",
      "bytes": 18503,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/biometrics-when-ai-confuses-identification-verification.html",
      "sha256": "68223c540143acbb517feafc9c2d6567f35d9079326fb90b585c7bbbb27a43c6",
      "bytes": 18433,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/brand-disambiguation-a-structural-problem.html",
      "sha256": "2952e28c4fd808c339a33cce2fe759f7d555eb745d1f6e553aae41f1820c413c",
      "bytes": 17609,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/brand-invisibilization-ai-answers-poorly-named.html",
      "sha256": "5791da8e0a248e7d19c0b1fda639fa5527c7eb5af0674e448865387ea24d13af",
      "bytes": 17883,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/bundles-and-options-why-complex-offers.html",
      "sha256": "b66f64452b3c8cd97552d523b095ddd238e6ef036c4d67c51a26b657fe5e9c40",
      "bytes": 18079,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/canon-to-output-gap-measuring-distortion-rather-than.html",
      "sha256": "db07fced32aded8ab472ca12f8173e7e7a9c623c10af56eb7e21693ee8775624",
      "bytes": 18005,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/canonical-cross-reference-system-linking-phenomenon-map.html",
      "sha256": "1fab2ccf0225034b21b42113be40a8b2fc7ab396abb603a3b05471db16a12563",
      "bytes": 18065,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/canonical-silence-legitimate-non-answer-sometimes-correct.html",
      "sha256": "37b9d0950080f010f37dd0e255181c5a7e3675f2fcf644c3e5cec91cb6fcdbf7",
      "bytes": 1505,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/canonical-silence-when-correct-output-nonanswer.html",
      "sha256": "7c9c9660653d828d7f1691d428c7a1e66740537d4523225abea67c66b1d88d67",
      "bytes": 17323,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/case-study-stabilizing-identity-through-exogenous.html",
      "sha256": "d773ce798ccc46ffcc99f4ea8f5f1db38986eed23cb93549170e1dc3e7d7cc93",
      "bytes": 17873,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/coherent-hallucinations-real-risk.html",
      "sha256": "fec37b1fabb955e6cc3389992d8c45d1fba7384ac653e83e91fbc9253f7c8182",
      "bytes": 17735,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/comparator-illusion-how-ai-creates-comparisons.html",
      "sha256": "0cf8999083f434157fcbe194ad74b2d262e537db239c8f53259748b1706df92e",
      "bytes": 18234,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/conflicting-schema-when-structured-data-cancels.html",
      "sha256": "836e6b29d4193f22fefd8911062f189da0703407d18f27d681abd8fec8cc27f9",
      "bytes": 18334,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/contradictory-credible-sources-when-arbitration-becomes.html",
      "sha256": "2a271d0d253f7a07b186200735263d32d2794b662c035e6577bce77abb864d3e",
      "bytes": 18273,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/controlled-lexicon-official-phenomenon-names-unambiguous.html",
      "sha256": "5395cd47350fa4332e0cdfc8b0c83a605a0a1d8264860c1688a58f52dc2f0a1a",
      "bytes": 18010,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/credit-governance-factors-negations-justification-temporality.html",
      "sha256": "6501165f04e63587d838f6ad0e88c30c6eab0da1336694752b98d430b2e8b752",
      "bytes": 18300,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/credit-when-ai-scores-without-saying.html",
      "sha256": "36c6dfad2a602e31cbc1207103cce33987f8178504989bc7d50052d6bf91f11e",
      "bytes": 18118,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/cross-model-validation-protocol-testing-entity-without.html",
      "sha256": "6fd8480f048fa540a26de8dc20d61fdef3a8f9ae6a85a50f5e864e011845f711",
      "bytes": 17899,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/customer-support-when-ai-answer-commits.html",
      "sha256": "1b334b9ba076d59ac50aba0df8982f39de7f81a1542414f85b3d0ebcef733c34",
      "bytes": 17817,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/default-expert-syndrome-how-semantic-proximity-creates.html",
      "sha256": "d4fd5eb0bd2b13024c467ae93556063ad411cda1991614f64ea9789c7ef0c2b8",
      "bytes": 18450,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/diagnosis-without-querying-llm-identifying-misinterpretation.html",
      "sha256": "afe394f165316cfc6939cc955e55d940ba7955b03611718d93c2231049c6c07d",
      "bytes": 18505,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/disalignment-map-reducing-on-siteoff-site-contradictions.html",
      "sha256": "50fbd8c1b2caf3e1e35df6c1cb389c52f4963be00759b4eb36ff95ee78f12d13",
      "bytes": 18082,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/disambiguation-the-problem-seo-never-truly.html",
      "sha256": "54aac83d817513907eeaf3d60287e21d4837da7df46f6a902dfa240aa8ac1334",
      "bytes": 17783,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/dominant-history-when-old-always-overrides.html",
      "sha256": "4d0e4f24f7ac43ce236c24975e425baddbe3198f8fe6c4f705cd3bf539330c53",
      "bytes": 18044,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/drift-index-measuring-formulation-variance-over.html",
      "sha256": "8d4868c4dfb6aa6cba7d4384e6522ca9f6113e30dfd3686f588cde40c2612949",
      "bytes": 17387,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/e-commerce-governance-attributes-negations-variants-evidence.html",
      "sha256": "6000ff524558b0697502236915153d0c23c9883e404fe125cbf92409e2a4d275",
      "bytes": 18173,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/education-governance-thresholds-evidence-legitimate-non-actions.html",
      "sha256": "637b811abc8a49b2af79ab4df340e618a2f96ae378c11e169948e6d02c4b5df3",
      "bytes": 18213,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/education-when-ai-turns-recommendations-implicit.html",
      "sha256": "ff6c809243a5ed255875a07e56becdc0c0bc8338685a74506b8051965e298142",
      "bytes": 18129,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/entities-and-knowledge-graph-what-google.html",
      "sha256": "0bfc79f387dd8dc09b0c534f9c8952c1aff1421e4b87f3a3f323ca17f6d1896e",
      "bytes": 17854,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/entity-dissonance-when-environment-contradicts-official.html",
      "sha256": "6cbe3939082d4025079d8fe5e0a4446b1772b3818b9345d5cd14aeea5a6f9b9c",
      "bytes": 18283,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/explicit-constraints-and-inference-reduction.html",
      "sha256": "6cd01f8a89ae51539449e3bd908d2d1c3de7f1e487d7ed5b16254926fa8854f1",
      "bytes": 16596,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/external-authority-governance-now-ai-risk.html",
      "sha256": "6cf162c684ef79e6a8c0d1df1d4ddedc9fb1a2aa0ee2ffef9081a57b85e3d2ff",
      "bytes": 17573,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/facets-filters-pagination-when-e-commerce-structure.html",
      "sha256": "8c115927d54d6cbaeb265d29c7605447da6b796b624c3127435af52eb42d0b48",
      "bytes": 18468,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/from-information-action-entering-agentic-era.html",
      "sha256": "ff922c52350c0515271b4b15aad2f3f1b063e406c3f42137ea1a4258034dbb3e",
      "bytes": 17208,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/from-page-entity-what-ai-really.html",
      "sha256": "128e37fbc3588dff4401c7c61927a315e6c9aaa628f84c010fc6aca03107f649",
      "bytes": 17871,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/full-series-interpretive-governance.html",
      "sha256": "026883e20e63861b895cb4b9b43ba02b576ea8f17610ff4dbe656a519a5f05c0",
      "bytes": 18326,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/generative-transparency-when-declaring-no-longer.html",
      "sha256": "0deecaff167015695447da15349919e0bd2d4bdba6be64bee3adb036d6a4d5a2",
      "bytes": 18277,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/geo-ai-optimization-why-tactical-answers.html",
      "sha256": "15f4ef3c3fc1426cf3c5d680786f4d5123c9bbe4cb7fe1d4f5f50bd25eb766b6",
      "bytes": 17768,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/governability-threshold-when-does-site-become.html",
      "sha256": "fc68429cb75359e6fec26a0b88f7609484d1f67857ec930ee7e9ae09ce4b0f27",
      "bytes": 17965,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/governed-identity-graph-relations-roles-scopes.html",
      "sha256": "62a93c0f90d0743b5eb82ca44cfaa99068baac0297f887c5ae385da13df178d5",
      "bytes": 17811,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/governed-rag-ungoverned-inference-blind-spot.html",
      "sha256": "1bc4e6888c15cd9e781a757cdfee36b503a88d872017e993c8ebac98c619b711",
      "bytes": 18226,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/governing-interpretation-without-over-optimizing.html",
      "sha256": "327144a58dbc1fc1f1b552830967322489297a29f121b82fd73be5c7898c865f",
      "bytes": 17769,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/governing-the-agent-governing-organization-proxy.html",
      "sha256": "55f579f16b1a9f209256c42436d727c303abf28b678359a80dcadaaf7f3d25e6",
      "bytes": 17790,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/hallucination-as-upstream-structuring-failure-model.html",
      "sha256": "dcf3a105bf76fec02a36f5a3d21fd1a24d913116c9cf9d3cafae2c7a8ca0b74b",
      "bytes": 18179,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/hallucination-is-problem-absence-interpretive-legitimacy.html",
      "sha256": "73074ed04735e4633698afe291e8817488d7cc3b6abad7874702261118b3cbc0",
      "bytes": 18086,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/health-governance-caution-sources-boundaries-human.html",
      "sha256": "de60424ef07131bae26445ec515f073a32750112887d195b25b422f02488b6cd",
      "bytes": 18175,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/health-when-ai-fills-gaps-creates.html",
      "sha256": "c1eafe4da6601b8fce3c28f66e05889a8818019ac6f98f2365ecebcf40e1abe7",
      "bytes": 17918,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/homonymy-and-entity-collisions-when-multiple.html",
      "sha256": "4440583b0fe65b2265f4c4344e4d39e13519cf919984a8a2b19c310ccf0c13b7",
      "bytes": 18113,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/how-ai-arbitrates-between-canonical-definition.html",
      "sha256": "a8c345c5c932eb9fb176dedc60a2c4614f6ad5d83be4fd7cb26b6388f9c9350e",
      "bytes": 18205,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/how-ai-decides-whether-brand-citable.html",
      "sha256": "a17f4baddbad385614d4f418c85b463f19f82c52b612886262f686771f97cead",
      "bytes": 17552,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/hr-governance-criteria-exclusions-bias-traceability.html",
      "sha256": "9a2406a0fc95c7ba783c604e98ccf68feabafa0ab79ce3858f49fb1bc713d4cf",
      "bytes": 18035,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/hr-when-ai-inference-becomes-discrimination.html",
      "sha256": "a75de96e50c2aebc3e43770223c13193fd58975bc1a84e915864aba8e30bab94",
      "bytes": 17652,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/implicit-geography-when-ai-invents-served.html",
      "sha256": "07971e873e58ffb1f328a5e9e120613e67e997d6dd4a2390d86f133bba9a53f5",
      "bytes": 17994,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/indexing-and-interpretation-two-different-problems.html",
      "sha256": "59cda45480456b7284ec0bc08f4e193006931149af9c97050f10085e20908277",
      "bytes": 17855,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/information-hierarchy-act-governance.html",
      "sha256": "b9791214883a8f5e9809e16f86a2cc86bf22257ee71679b1f4df4fd5aa38684d",
      "bytes": 17659,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/informational-legacy-when-former-identity-continues.html",
      "sha256": "1265434757b9349c0b19493393854dac8ddf419e135a0173a35330cf6931930a",
      "bytes": 18273,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/informational-silence-when-lack-data-becomes.html",
      "sha256": "3d384bbe7397fdf1f2e999d00fc308281790ff7790a6f1e5631fd0f8d9129b7c",
      "bytes": 18215,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/informational-silence-when-non-answer-should-only.html",
      "sha256": "3fda908fa4fbc6156c53b9c48c8930f5fe688bee0b43b7a8fbb671e6f46678c7",
      "bytes": 18047,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/internal-linking-links-meaning-graph.html",
      "sha256": "e6f7460cf22acea32f78a47769c46676736baa9d4872a7a5507c414bbb4d82c6",
      "bytes": 17716,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/interpretation-trace-making-answer-auditable-without.html",
      "sha256": "de80142e93eb00651615be92cd53fde818ffbb32aa6ba311efc8b774e3284b39",
      "bytes": 1552,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/interpretation-traces-auditability-without-exposing-black.html",
      "sha256": "edbaed7cc8f7477c6b91b1e43b274dcf054d6b252633f70cea5d6e4f9df112cf",
      "bytes": 17653,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/interpretive-atlas-generative-web-phenomena-maps.html",
      "sha256": "5d766b63a3c4f8757ee2205bafdbc39c765c9cfa182b31f7d5df7e054b284ad3",
      "bytes": 18882,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/interpretive-atlas-generative-web-six-governability.html",
      "sha256": "aac98ccf5fb491c11f495819d0df3332632907e6edd69df1889340be92727401",
      "bytes": 1548,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/interpretive-capture-signal-saturation-truth-hijacking.html",
      "sha256": "687e203021098880e347ba5461e0e36c2db898d118ee0b041f59e2c5ca20f77c",
      "bytes": 17931,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/interpretive-collision-entity-fusion-synthesis-hallucinations.html",
      "sha256": "734e6877d20aea1fd1647b70b815f17e35f628320cfb70ee697fb7b016291ce2",
      "bytes": 1549,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/interpretive-collisions-entity-fusion-downstream-distortion.html",
      "sha256": "48487050239212c51cbfb228744030f4cbf70aecb9f5925918284a8bf98178ec",
      "bytes": 17743,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/interpretive-debt-how-accumulates-without-spectacular.html",
      "sha256": "5f8c9ffed907c9985ba18714a1147afb055abe05c264e480b77258a2cbeb2544",
      "bytes": 1389,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/interpretive-debt-silent-accumulation.html",
      "sha256": "bb84204d75e8aecb1b8cce58b0badbe00bbd4f47cddf74a2c0d55b525a317632",
      "bytes": 17716,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/interpretive-governance-full-map-phenomena-mechanisms.html",
      "sha256": "f8fe47024b1f9aa938f0974560be84b30f409d07aa6a3375ba421f0260800392",
      "bytes": 18733,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/interpretive-inertia-why-corrections-dont-stick.html",
      "sha256": "88ef5d50b64bb21b8e6c169cee4fa9d4a8ec67219a574d10a630525e01f00c3d",
      "bytes": 17907,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/interpretive-invisibilization-when-information-exists-disappears.html",
      "sha256": "e874ffa3cc17544825402df86e4e75e40a028fe7b5e811256a20498ec7b195c0",
      "bytes": 18607,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/interpretive-observability-minimal-metrics-log.html",
      "sha256": "d9761d83223f34ba5aad826a4201685e3cc3b26247e5578320b7fdfc93602945",
      "bytes": 1746,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/interpretive-observability-minimal-metrics-validation-protocol.html",
      "sha256": "71d718427d52ed551c74782a1de83499569b5880550137b524159dd598bd0194",
      "bytes": 18405,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/interpretive-observability-publish-signals-not-recipes.html",
      "sha256": "1263e592f9822d063701ddce0816bcd2cff3292a867a641df6a8f9f6335a3199",
      "bytes": 17501,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/interpretive-reading-adolescence-technology.html",
      "sha256": "345cd2ff1ae3c3830dcd7cbfd52b43eb069844978241648f015eafbcd416cb5d",
      "bytes": 18039,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/interpretive-smoothing-why-ai-standardizes-meaning.html",
      "sha256": "96480786be0511f986675bd9f3264461bbb291dd0959e3472e7b77be06ddbcf0",
      "bytes": 17581,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/interpretive-smoothing-why-ai-standardizes-your.html",
      "sha256": "5bdc09ccbe62958e4dcdf58f52ca16faa5a54d77474e066a26666e6114501c23",
      "bytes": 1466,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/interpretive-sustainability-correction-budget-version-discipline.html",
      "sha256": "b6e382c1fba222970e98029763acfc213ec636510d2c7efd0044bcfb1213a6bc",
      "bytes": 18306,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/keyword-seo-vs-entity-seo.html",
      "sha256": "c4aa38c97b0e8fad8bc56bd6fd2195062765e1d49e22bdce518d79b7e2975bdc",
      "bytes": 16952,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/legal-governance-jurisdictions-exceptions-temporal-validity.html",
      "sha256": "2fb31ad1b72a0ad779a171ce811123cf8d35b1131ccc3c75ce6e6925dae68afd",
      "bytes": 18195,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/legal-when-ai-universalizes-local-rule.html",
      "sha256": "c3fbad8555731a60d5b5b925c993fab71451aac2d58719ca26fa640b5418bc3a",
      "bytes": 17989,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/making-governance-measurable-q-metrics.html",
      "sha256": "3e76841269a8ea47c8a9f0ce3e2ff0d482dc274d952cbd92b44d5ecb6fab0d35",
      "bytes": 17556,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/map-of-governable-offer-stable-attributes.html",
      "sha256": "66fb2e2d4249b10921e0ec83fd83dede59d71012bb7d238d27305d513e84c74d",
      "bytes": 17869,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/matrix-of-generative-mechanisms-compression-arbitration.html",
      "sha256": "ccc7a145ca9948cb3cc5b81518631d9a3be477611a57a7d2e2063639f12c87fd",
      "bytes": 18161,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/measuring-invisibilization-how-audit-presence-ai.html",
      "sha256": "aef1a6c9b22f6b873d8abc9c97cff76cd52b03ff59ee72ff156ae71f8a156a60",
      "bytes": 18069,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/media-and-summarized-content-without-citations.html",
      "sha256": "c88f11d0694562400d1b82a86e652dc148c79493c4ae84c1ddfce58ee93db12a",
      "bytes": 18230,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/merger-acquisition-rebrand-governing-identity-during.html",
      "sha256": "1ba12343734f3ae8bfd76e7822e71a23c9de2528ac8fd0e39942d6ce4ea23d91",
      "bytes": 18342,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/multilingual-and-temporality-when-fr-en.html",
      "sha256": "9277b6c35e106aa7a83e93a5c0e8b431235eca465a780e7c730a587e026e440a",
      "bytes": 18095,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/myth-of-good-content-why-editorial.html",
      "sha256": "c1ee3a8f89a664b038ec239ccbbbca2af08e204a875a5649da921abbe29ed08a",
      "bytes": 18381,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/negation-model-what-entity-excludes-refuses.html",
      "sha256": "d7912a6cd04c69389847e990a1df02ea51440a1890e58a3e6860fb229f8a35d7",
      "bytes": 17713,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/non-human-crawl-patterns-reveal.html",
      "sha256": "59f3dfa24bea240a1925515b09c933cd0100efb80d1bbfd33a6078b02d9f855a",
      "bytes": 17457,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/not-specified-really-means-ai-answer.html",
      "sha256": "0735ad416962a5ceaf2e0ff1e66476ced2e603b3101b81a071e541c948199a5d",
      "bytes": 18001,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/observation-analysis-perspective-reducing-inference-explicit.html",
      "sha256": "a5adc09207fadca7e860c7edde661ad8abd520a5566c87883fa9e31335157088",
      "bytes": 17252,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/observation-case-grok-manufacture-authority.html",
      "sha256": "470b4ba03713835e3aec46c511f049b6c2eea79e84a62930a46dd74967262c32",
      "bytes": 17829,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/observation-vs-attestation-why-q-ledger-intentionally.html",
      "sha256": "44bed8a32918836c51b49e5107e2a98bbf67952edcfd576377597b3a542127fe",
      "bytes": 17836,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/offer-changes-redesigns-pivots-why-ai.html",
      "sha256": "a4213cd8471f3afe760c71ac00058b02fea2bdbb5d536b761738b8e0d457c9bc",
      "bytes": 17935,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/open-web-vs-closed-environments-governance.html",
      "sha256": "12bddfc1e8864c2fc0b76fe9e96127233162a195e46266562163ee7c93334622",
      "bytes": 18141,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/person-brand-product-confusion-anatomy-poorly.html",
      "sha256": "831aa534da1f3b854e0b7e6479d28ff96aecf44826ea57c8f9f1d75a33f40264",
      "bytes": 18189,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/phenomena-matrix-mapping-drifts-affected-layer.html",
      "sha256": "df5f56520217d62a2f9dd7b2c4a394ef9fe1f99e43c82b1b2060f2817e6b86a9",
      "bytes": 1618,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/phenomena-matrix-v2-updated-axes-drift.html",
      "sha256": "3dac403daa1ce2aadd974204374d798c43e291992e7e3afe912c0d34fa9d6c05",
      "bytes": 17303,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/popularity-admissibility-why-open-web-destabilizes.html",
      "sha256": "da97f92f088ddae430ccfcb8b9e91ea65cc38de968400de859578cf89589a96c",
      "bytes": 17861,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/post-semantic-authority-drift-jurisdiction-failure.html",
      "sha256": "da10ad2643b62d86cba125bb420b959a1fffd562eee523a390757fd85d95b4f5",
      "bytes": 18112,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/post-semantic-on-open-web-why-governing.html",
      "sha256": "f7d21073eb8c6e1c8f22af5044d8aa3c12ecd7051688cbaad4319281c3b1e4e8",
      "bytes": 18190,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/post-semantic-when-ai-thinks-decides-oversteps.html",
      "sha256": "a67540092ec4713934d2631121a7d7b9b078d1039f7efcd825d125ee67cc7013",
      "bytes": 18276,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/pricing-and-options-e-commerce-why-ai.html",
      "sha256": "878a5b9ab6a276395c72fe38212f080a555a74aa752f3b9f18fdff7b2bd54a26",
      "bytes": 17897,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/pricing-options-exceptions-why-ai-almost.html",
      "sha256": "aee83cd598d191a94d991f065f244c1d17a5c2932be106d5022c1cbde359a593",
      "bytes": 17804,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/probabilistic-arbitration-how-ai-chooses-between.html",
      "sha256": "18aab51ad961ed501df794eed9c480f555267b06b2285f1137234d4405e4e9ef",
      "bytes": 18230,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/professional-services-mistaken-universal-expertise-when.html",
      "sha256": "03130cb96e4710ce5459c93e194c22ab0c0a69af3fdea869939f4e3aec00a978",
      "bytes": 18376,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/proof-of-fidelity-why-citation-no.html",
      "sha256": "4e77c92c0f562c30d92fe4ad9a607a4f7a0f667859ecf373c79549297792caf0",
      "bytes": 1380,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/proof-of-fidelity-why-citations-no.html",
      "sha256": "464151c4a56347737af544d18d422ec7141f0ffb9ef326ec9f4ec523e16a25af",
      "bytes": 17248,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/public-communication-when-ai-answer-becomes.html",
      "sha256": "8e82cf1d3906d285c44d252320e7d02e6eec550823974b00eb6ef2ed02db6f35",
      "bytes": 17929,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/public-sector-governance-criteria-evidence-appeals-transparency.html",
      "sha256": "e8b11bdaeea02ebb2b86e87d13786346a93d0a7c43ba6577b8cdda6e8430a759",
      "bytes": 18271,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/public-services-when-ai-turns-eligibility.html",
      "sha256": "b12dd0305c1dbb4c8f59a9de5a2d8594a28309bf1cab0c9ea9badb6154bc3bef",
      "bytes": 18004,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/published-baseline-phase-0-what-observation.html",
      "sha256": "97370b0a4d0ce75be92bd7b64b33dda4a37b8ecea7f2d905da6cc2ff76a6e13d",
      "bytes": 17987,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/reading-ai-logs-what-crawl-paths.html",
      "sha256": "221d6c01337c2cfce3abd956648dfcc7cb18b1af80bf13d7aa5c9c146cebbff6",
      "bytes": 17876,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/recruiting-when-ai-infers-undeclared-criteria.html",
      "sha256": "bdb10750b3db8486f1a1729c632411dc0e41123bd41739fc8f22bc314cf81ac6",
      "bytes": 17999,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/reducing-the-error-space-algorithmic-systems.html",
      "sha256": "14f2fd9b1178f5a369aa009a829bd9d1c60826478aaa724131052315885d6f60",
      "bytes": 17714,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/reliable-rag-boundaries-matter-more-than.html",
      "sha256": "0bb6a9146030e78795ed3166118182c3354f86280416f3ae95c68edd84d63af6",
      "bytes": 17278,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/reliable-rag-why-governance-boundary-problem.html",
      "sha256": "1f6fc355aebd51518edc96d37babf02085655e279fae8533a540df0ebd81f5c6",
      "bytes": 1428,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/reviews-forums-mentions-why-few-signals.html",
      "sha256": "9a099d95d5179faa9687048dfbd14fa45f717b13611b673da8bf89170381712a",
      "bytes": 18091,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/role-confusion-expert-founder-spokesperson-author.html",
      "sha256": "f82b7fe6e396ee6f86195c369d3629cd548324caafff5515e7b0be96b7e1846f",
      "bytes": 18032,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/runbook-amp-ops-logs-snapshots-without.html",
      "sha256": "785db811ff5d322658bcf2e9b6c8d346fc4b4aaa2bfa2b8d0ffa62bedc9d553a",
      "bytes": 17759,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/saas-functional-scope-when-promise-drifts.html",
      "sha256": "e26deffc5f8123810b059f4834191c2817da28a145ac6bb5a8b529e50aa22e1a",
      "bytes": 18114,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/saas-integrations-mistaken-native-features-when.html",
      "sha256": "69fa13557b4a8325ca303fa72d2cde48b2e1d9e2edd0400c216bb6f0a0891a57",
      "bytes": 18118,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/saas-pricing-plans-mistaken-capabilities-when.html",
      "sha256": "1610f9679fc492ae4ea485aab75b53435f922c94f3ebc767b4497446ee365df4",
      "bytes": 18350,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/saas-reduced-single-feature-when-ai.html",
      "sha256": "9b6718cb7a683932e6977dfaa37c8e968e7bcb6dc36318f6a7abdc31eec5da7f",
      "bytes": 18129,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/scope-drift-when-ai-expands-offer.html",
      "sha256": "8f3f9664e6d8eb0c02f458bbbaae3c52e4d12359b846901601ccb41201d667b9",
      "bytes": 18086,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/self-validating-loops-and-meaning-crystallization.html",
      "sha256": "1c9228f0b3062dd79118271d7c1e9ddc8ad0b28b86293386d6e48a65c28dd253",
      "bytes": 17881,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/semantic-architecture-designing-interpretable-environments.html",
      "sha256": "db1f9afe1a3caa82e88507976bc93a71c4044cdb8c82535d4cfb3441c379ecd0",
      "bytes": 17912,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/semantic-compression-why-some-information-always.html",
      "sha256": "6e931ff94d5d8996228bf258d2a13cab349c6e843728a9a2892d44523b888509",
      "bytes": 18066,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/seo-didnt-disappear-changed-nature.html",
      "sha256": "ff829e099d4c4c995701c79badf61a3a940e2a45a9bffb9a1f78bd0c70876cf4",
      "bytes": 17633,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/signal-synchronization-reducing-on-siteoff-site-contradictions.html",
      "sha256": "a1f5f81099a43ef9d5de3eefdcb13e6b304732ec66b903e8ce35c16869eb85be",
      "bytes": 18520,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/silence-is-not-governed-yet.html",
      "sha256": "52250d64d9cbfcdc95345775c3855312ce90afd858baeb005e63d6b64a6e222d",
      "bytes": 17333,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/simulated-empathy-and-dialogue-stabilization.html",
      "sha256": "56a47f625f6e5c39e37cc436040c42f668aac8a113438988ca96841ffd83900d",
      "bytes": 17763,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/source-hierarchy-minimal-condition-ai-answer.html",
      "sha256": "caf6d575e25462c95697dc4e774588ae0a3ecdf29072fbde0345c479673e7e82",
      "bytes": 17597,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/source-hierarchy-organizing-interpretive-conflicts.html",
      "sha256": "3cae1738f4907bb0f65df5b9a3f3eaca1037a2eb04929b9111b3d06a4e02fb4d",
      "bytes": 17734,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/state-desynchronization-when-ai-freezes-stale.html",
      "sha256": "831163a8a2f02a9b9487448505c37cac616de53681cdde88cb226b4ec8f15a2c",
      "bytes": 17880,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/strategic-duplication-when-fren-variants-average.html",
      "sha256": "be56a42c2a74c0d9c056c711ecc73ec5cde2c938f32fe3db85987904460227c2",
      "bytes": 18200,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/structured-data-structuring-to-be-understood.html",
      "sha256": "6a21c379e47dfb176fa187c1fbdbbd618a2a3b5123ea3b5c47671ebe1b9f7167",
      "bytes": 17727,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/structuring-is-excluding.html",
      "sha256": "5e37351cefb964447eec754966a7373ba3cecb7f422bcb77f0ad2185079128c9",
      "bytes": 17301,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/template-effect-how-repeated-structures-induce.html",
      "sha256": "1c10002f65bd2ad8bcb0e1a7fd238713f264b4a9e7a943dbee13385c00904494",
      "bytes": 18182,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/temporal-drift-when-obsolete-version-keeps.html",
      "sha256": "5720b361251d8d6233e6c4dfca45bc6858ce05e6ff3b271f64e39b1b8f63da79",
      "bytes": 17978,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/temporal-governance-declaring-what-valid-stale.html",
      "sha256": "e79a6f6788b3308c8ab79af814b37f0523e9316c72db0e7963e00256f057ef63",
      "bytes": 17867,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/temporality-and-obsolescence-when-old-persists.html",
      "sha256": "485a382d4e8be0f7b3818696072413a9ae0d5782dcd94e8e6226e542c52b36f2",
      "bytes": 18206,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/third-party-source-domination-when-source-site.html",
      "sha256": "9c5afb28fa761fb0bcaf57376ed449cb5e5e57a95f9f56a8e1dcf09a86611551",
      "bytes": 18395,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/update-vs-correction-why-fixing-content.html",
      "sha256": "0fb78d907a5b8ea2012b299f9167b20f8945e0b044a3666b85d6ed0f8ba82471",
      "bytes": 17949,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/version-authority-corrections-must-be-versioned.html",
      "sha256": "2920db2015f09ce148dcadfd635822258fe0fe14cad8fedcdc7b42482a4158b5",
      "bytes": 17279,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/version-power-why-corrections-must-versioned.html",
      "sha256": "67761e8b2608b642d21f11b0ee49091cf20afba9452bf64738afecefebab7cc3",
      "bytes": 1444,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/we-are-only-beginning-why-ai.html",
      "sha256": "a74d897abf0aa2a529e1b68c2fc44ce73f97b5d21e24e7e04badeb463bb807a6",
      "bytes": 17700,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/weak-signals-reputation-how-ai-stabilizes.html",
      "sha256": "354ea3ecba9d04cb4a38d4d596f35df9abfb1b2a120c591aa87900cd761b2cea",
      "bytes": 1666,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/when-a-site-ranks-well-poorly.html",
      "sha256": "02177bdcb9bbe20ac514cbdcf7ae62f7120798ff3f3d302e60dad8845222ce55",
      "bytes": 17514,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/when-ai-arbitrates-between-conflicting-sources.html",
      "sha256": "233733ace395dee3b535e009cfe436b68806a4b78769544b62667408b9fa9b58",
      "bytes": 17890,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/when-ai-asks-definition-before-inferring.html",
      "sha256": "a064802d05626b37179f7a2c40af70b16ca55179cd6d446f0870fdcc8559c2e3",
      "bytes": 17787,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/when-ai-produces-assertions-without-traceability.html",
      "sha256": "0a6279300b1105f5b1d9417d833576b7492069c4ba288adb704a7ddf02d33339",
      "bytes": 17849,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/when-ai-produces-narrative-without-human.html",
      "sha256": "5392df90042b43c7f561f6f37ebdaf0eaa44a1b9c93f7288faf10537b2d4f002",
      "bytes": 17937,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/when-ai-silence-reliability-signal.html",
      "sha256": "d6af8592548731cbade63498a532cbc239678f7f72ae46cd27f88a0e0131d1d4",
      "bytes": 17744,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/when-an-offer-simplified-ai-reduction.html",
      "sha256": "33a7ecee3c57f5024f8ae63692c66c7a9da8e4c0bfc352aa4d8b1775cc8ebe73",
      "bytes": 18053,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/when-credible-sources-contradict-fast-arbitration.html",
      "sha256": "cc08c7320b2cb7bf17c245ba4edd575fd5ebddb48fa8631f6f38aa9dc7bb6c58",
      "bytes": 1652,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/when-engines-interpret-correctly-when-they.html",
      "sha256": "81a16bd572a8a1fff5be4d809d6e92e326b216c0b96eaf4c8098dd3ac1571236",
      "bytes": 18042,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/when-fixing-content-fixes-nothing.html",
      "sha256": "6fe0c69625f830e1241996ffa44b29536aa55c5c5376b5f5b6f8b0bbfb3557f6",
      "bytes": 17595,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/when-information-becomes-decision.html",
      "sha256": "d29f8c852b6fd0c0dc994b936d620a922c8e229934b884164147dcf5aa63fa13",
      "bytes": 17149,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/when-invisibilization-becomes-systemic-economic-risk.html",
      "sha256": "a8a312c3bc6b7a8d953cb70408ac6c41c482df838360f31d3abf07caaf9277a1",
      "bytes": 17756,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/when-models-become-more-confident-than.html",
      "sha256": "cb38d32654989daee9601e7f6864f873b6ba561a0e0b801cd9b90b531ba427f1",
      "bytes": 17632,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/when-seo-becomes-an-architecture-discipline.html",
      "sha256": "2ba7a09103ba66272af77671b1fe6c4b883230f2975a7b14fe81ba44d64db73f",
      "bytes": 17563,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/when-two-credible-sources-contradict-how.html",
      "sha256": "be71c661354c52a5069ac133ecb0df05c973eee88daa6c617a86f8272cedf435",
      "bytes": 17380,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/who-is-responsible-when-ai-answers.html",
      "sha256": "40716ee224cc44785155ce447c593e5bba49a8ec865786b64ce31c48c8a6665c",
      "bytes": 17484,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/why-a-brand-can-disappear-ai.html",
      "sha256": "2761bccd21a7285005b1835b731b6cda8e1c65a4debf117a4f7ff5eb4a7b566b",
      "bytes": 18130,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/why-a-sites-architecture-influences-ai.html",
      "sha256": "4f3df061f7d252b0166edb4a8925b226a6aa58216a4aacb719227d61520b84ea",
      "bytes": 18201,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/why-a-solid-seo-architecture-prerequisite.html",
      "sha256": "8f0e77076646125d2f0a1a5e2bede0021f98bebef14b142260d5163717e35679",
      "bytes": 18200,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/why-ai-extrapolates-when-scope-unclear.html",
      "sha256": "024dc207b25d7ac6caa66329d94cd37c7be12e79c441ab18fedf792cfb6849db",
      "bytes": 17697,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/why-ai-prefers-clear-source-over.html",
      "sha256": "7da789a774808a75036b0f4a54ce674a4299fa6700853a7e216f51ab3a14f8e4",
      "bytes": 17965,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/why-ai-stays-silent-rather-than.html",
      "sha256": "bbad679dd65aa02c9f5ac32613647121b3b9d8f89480e517c3e9cbfff076d4dd",
      "bytes": 17705,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/why-interpretive-governance-becomes-economic-legal.html",
      "sha256": "ec7f72eb6e07830640699f900fe0b89ec9969112ad90f4b37dac45ad12af3154",
      "bytes": 17986,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/why-responsible-ai-does-make-answer.html",
      "sha256": "67b5625c8d69e65843cf845856367dfbea96a4ac87e1c1c8be66bd375b2b36c7",
      "bytes": 17144,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/why-semantic-governance-is-not-optional.html",
      "sha256": "b75d71d0b3399d5c26bbc920a19fc561e934144505a1ed0937880a3e28b45f50",
      "bytes": 17541,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/why-silos-content-cocoons-faqs-no.html",
      "sha256": "b7136d7764c7af085dd6615297b14ae0d39424df37d4b56d42088486a1741900",
      "bytes": 18132,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/why-the-problem-neither-seo-nor.html",
      "sha256": "d8111ff20afbbc8f9c7fd197aaf2e517d6010f11f74ec1ee0b56697c4388d5e2",
      "bytes": 17339,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/why-the-stability-ai-answers-has.html",
      "sha256": "dd5aa8ac9e00f3d6c148426f375f6023818e89abdfc3aa29e2347e55370c72d5",
      "bytes": 17605,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/blog/why-there-no-technological-solution-interpretive.html",
      "sha256": "8b4aca3ae4b4437848ccd403ef0e3f5909f4ffc4ba6a4d5bc7d847505fa03439",
      "bytes": 17891,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/change-control.html",
      "sha256": "c355fcc184b79a31c1c358f7a8f6d7b9647a5f401b59cddcc479d05a8c62eac5",
      "bytes": 12239,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/contact.html",
      "sha256": "9f9c5b16048b8821c74948047195c95f18b2eb08cec91a5b1711e14e2e47a98a",
      "bytes": 11267,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/doctrine.html",
      "sha256": "79030c23becd01966a37fb0311a4ebc4b53398a0511f726f2e8c1bb932aa5ce8",
      "bytes": 11614,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/faq.html",
      "sha256": "f8de2be7e6a8b2f4d512b43123d44053497621c51034d01362da0fa666107e04",
      "bytes": 16188,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/glossary.html",
      "sha256": "6e5b82b28c84cc29b6658d4897eab93112854097986dc1e8dcec82c638d5a0d8",
      "bytes": 12349,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/governance.html",
      "sha256": "4899a89d04c71a9a9ae8c4c9e6b7f9d2783d691fa8b8fcc03ab2f3e4d8f966af",
      "bytes": 14680,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/index.html",
      "sha256": "49d8911f9e6d7ab307fca55de35e84722e0b3f0195b972990e68e7684f1d4b39",
      "bytes": 11702,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/legal/confidentiality.html",
      "sha256": "4a18eb5c11f27c2ab67772434b691355eb1e099e46b1c2964ba411873a82912a",
      "bytes": 9775,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/legal/privacy.html",
      "sha256": "23187aad1877339f71ef54080d1526949e01f1b8f25a0daf2422298f51ff1d1f",
      "bytes": 10116,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/legal/terms.html",
      "sha256": "3e2e27be81befe30a41319b9c9cc32f01cb7fb1d5636b18cdc1818acc62003a3",
      "bytes": 9709,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/library.html",
      "sha256": "32d4e1b1623b5d32e2bc44efa0dc64f3b074dc6983d577d37c88bb6e89970b1b",
      "bytes": 30147,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/mission.html",
      "sha256": "9a035584b982fd45c182cee918dcaadbdc15a0e0d700df09fc1a18b9e36be651",
      "bytes": 13395,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/registry.html",
      "sha256": "aff1e7a5750f55e63b69ace9932025e18ceb7004b548ec0dc3fb0b81b0e8da58",
      "bytes": 12042,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/scope.html",
      "sha256": "64fd32b368b6426de849a54cc066e9b0f7e4fae7c3a479bc3f9c449a942fe2b7",
      "bytes": 12656,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/security.html",
      "sha256": "c74d69d73df8ef2617ce21cbcbfe3f1547c6990d35637a16d0e02435f959ddd9",
      "bytes": 11161,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/systems.html",
      "sha256": "d04dba81a1423e670849de421c6bba110e956d51a0c9da9099b8f2b949df2f06",
      "bytes": 13147,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/topics.html",
      "sha256": "1cefa97447ef18107d5533ad1e75f6a5f8d8e3285dafca3ec48a47395e01d4bd",
      "bytes": 19832,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/topics/advanced-seo.html",
      "sha256": "d6dcbe084cf0348a70a08513c1b83c0787c40c007e24d97a81d41d7ff98a774b",
      "bytes": 12302,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/topics/agentic-era.html",
      "sha256": "c37495e184b4d4f37c237d4d07620be7f43309acd8619f15927c8450edd7667d",
      "bytes": 12050,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/topics/ai-governance.html",
      "sha256": "a97654129b8c898681a64e4807cc2865f20ea92d4040d6be605c2fe04d460609",
      "bytes": 12415,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/topics/executable-authority.html",
      "sha256": "8033d5b9b4ac7b01b33af4f2c736796cdfd46d12b866432830db61cb9a18ff9c",
      "bytes": 10911,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/topics/exogenous-governance.html",
      "sha256": "78d99d15361a2820aced10b12cae57f982f4000b118525480907aa09fd3b91c8",
      "bytes": 12382,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/topics/field-observations.html",
      "sha256": "5fadb2101eba7637a4c60233600f5c37baaf33f5a7928c7cacf00d653ab54e9b",
      "bytes": 12305,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/topics/interpretation-and-ai.html",
      "sha256": "622af1f3cba715ed54a138e15ddb522a566981c54f2e2dd086ccf0a996a4ca58",
      "bytes": 12452,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/topics/interpretive-dynamics.html",
      "sha256": "a8c7fc52ec4f0958643ddbe8636b2e3ea00bb7432dc8230c84b407ccd35b48a9",
      "bytes": 12433,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/topics/interpretive-phenomena.html",
      "sha256": "718a5f078a9af8e8fc7f798077ecef84ca9cb84169cddff52acc8ee6db84f92b",
      "bytes": 12651,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/topics/interpretive-risk.html",
      "sha256": "2c4db33b4b8ef0354678b3b59441a7791ebce13e77af7403675ca41ec4e973a1",
      "bytes": 12395,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/topics/notes.html",
      "sha256": "e4b4829b1d45a2085592695e646c2c69edba24babb8ef04ce5a805c5b1b40ec2",
      "bytes": 12692,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/topics/reflections-and-perspectives.html",
      "sha256": "7eb87847806d9ce40178f76b95386e671a6d58e05c3560e82df1c74a7966e642",
      "bytes": 11963,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/topics/semantic-architecture.html",
      "sha256": "d389fd63564403d6c225df600043ac73e635f869685343b90507e5c321a2f5e8",
      "bytes": 12400,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/en/topics/sense-cartographies.html",
      "sha256": "3e0793a0b300170b7ba3c82a581e531a2c5761c64d5220a77791e6aee3956045",
      "bytes": 12608,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/feed.json",
      "sha256": "27532b79014f4a644cbc3a1ebb7d22ac9bd54174cacd3f749461881beeda72b2",
      "bytes": 150635,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/feed.xml",
      "sha256": "44df8b99c11524f13ad207e757bd93acad961a1f8394881d63817cd8882e95c3",
      "bytes": 139943,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/bibliotheque.html",
      "sha256": "36b61331f5e584766828952f51ad43df294f12a1815336edf9bcd0e09b06afbc",
      "bytes": 31565,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue.html",
      "sha256": "2d93fb3ad2c06532d6cd3fe442e140855069de9e2e4e6fd91a13e61bb3d9738c",
      "bytes": 26745,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/absence-de-signal-comme-signal.html",
      "sha256": "652685fe48f48f95bedcf11364c93d874e31e02562fe4ba0c36aa179a3614c87",
      "bytes": 18882,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/absence-de-signal-declencheur-inference.html",
      "sha256": "e0bfc5b63a49ae415d46fe2b0d15cd2cb39d4c6cafb92e13c0e2a890a4a77e24",
      "bytes": 19303,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/agent-devient-decideur-implicite-responsabilite-deplacee.html",
      "sha256": "0633ea829239a2886fb646a82bed908b9780f3cbbd3fe2e04ab44e97d7a28642",
      "bytes": 19742,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/agentique-environnement-ferme-donnees-propres-insuffisant.html",
      "sha256": "44ef8bdc6ab87a50fc1e8c366e10873c8bcd5b1ce72de49c7779f224aa4864f4",
      "bytes": 19551,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/agentique-non-reponse-regle-securite.html",
      "sha256": "a8ced1e77c5e296e96ac59dfb337db9261ba50587b99986e7d36f60f20b8323a",
      "bytes": 1412,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/agentique-non-reponse.html",
      "sha256": "dc12276ef561cea4551123f9e6d4f5af449e3d0cd47b408f71ba8254b8c6949b",
      "bytes": 17986,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/ai-act-index-interpretatif.html",
      "sha256": "4b5ee84032008ff08123a25dc90f176c74150d86cdb1bd6726599bbb7cca87b7",
      "bytes": 17892,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/anatomie-dilution-marque-inference-propagation.html",
      "sha256": "d3f4b7a8a333bfd726322228e898b2064d7ee0fcda4e9b716f9a8c81e30f9d6b",
      "bytes": 19054,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/arbitrage-autorite-hierarchisation-sources-credibles.html",
      "sha256": "a219448243083edb67a50b73f2abf64da432b4fbeeb68bf00e4c72f6d809d484",
      "bytes": 19466,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/arbitrage-probabiliste-formulations-concurrentes.html",
      "sha256": "db62530aba24fa8d7e28f8d4f7bcca4b38388c0ddbfdc4e5d6154a5bc189a1df",
      "bytes": 19737,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/arbitrage-sources-contradictoires-verite.html",
      "sha256": "b8d900bcf486686044606fcc6a96b24cab80a7d9a0de5c6a793c48562cebf87f",
      "bytes": 19047,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/architecture-seo-condition-gouvernance.html",
      "sha256": "c3da5eda54d9cf659e09b1ff35018bdc41065fe47c00b1b8db8d6446ff879823",
      "bytes": 19755,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/assertions-sans-tracabilite-plausibilite-passif.html",
      "sha256": "86298ddee5683661d721c2e579baadb2d57217ef52d1972970fb1e05a1239363",
      "bytes": 19043,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/atlas-interpretatif-web-generatif-ai-act.html",
      "sha256": "464383b87553f954ea1147e484f16860b4c86bec2546d2a424bd63687ccd853a",
      "bytes": 19777,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/atlas-interpretatif-web-generatif.html",
      "sha256": "c3ec8e187a72cf2d683503257a86670c9c060cae87d913593910a8f6f07fd45f",
      "bytes": 1585,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/auteur-organisation-service-niveaux-attribution.html",
      "sha256": "0e0ebb225bc028ce0d5cabab7d177f979b320b58a7edfbdcef75e07f273c4bec",
      "bytes": 19488,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/autorite-reputation-signaux-faibles.html",
      "sha256": "3e37f825d32fc3f1c7338a748f50c0dcf042b0781fd0884d9de9cf3c5875352c",
      "bytes": 18572,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/avis-forums-mentions-signaux-dominants.html",
      "sha256": "e7582a2dc3ffe37c718a61a99787d3a8e7cb963de4921bdf64ec9e86d7c6fa95",
      "bytes": 19485,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/baseline-publie-phase-0-observation-vs-preuve.html",
      "sha256": "6a6f130197898be1e6122b99760b4024955d09bea09b955c8044d88d0bb592cb",
      "bytes": 19179,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/bien-reference-mal-compris.html",
      "sha256": "569a3b2465623ccb3f6d405dbe496455cc438d1d9d58c599fff846f93788aaf0",
      "bytes": 18932,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/biometrie-ia-confusion-identification-verification-surveillance.html",
      "sha256": "2c94b191b5ae59d1093f7bf8b8bf7b11b2f4c89a2a548c99632e0a46481e6d25",
      "bytes": 19806,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/boucles-auto-validantes-et-cristallisation-du-sens.html",
      "sha256": "92c2a3639eb99a0df0f2934878dd79ecaa6e85755a7fd4f84caba3d6edd3b6a1",
      "bytes": 19075,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/bundles-options-offres-complexes.html",
      "sha256": "0924feaede882388ee1b581bed2e152c37a9e17535c13583ad9acb6859d7a0fc",
      "bytes": 19522,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/capture-interpretative-saturation-signaux.html",
      "sha256": "9a4dd3b58727c5ebecac3395e32dba34b453bfe4d3cdd89d9beb7b49e5f1aa52",
      "bytes": 19219,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/cartographie-desalignement-onsite-offsite.html",
      "sha256": "b54e9ed16050c1c624d5e3b00ce46731b5f7b6c856c9a9dd7fad70354ac53792",
      "bytes": 19653,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/ce-que-fait-une-ia-quand-deux-sources-se-contre-disent-sur-une-marque.html",
      "sha256": "9ce655cd6d72077924fe6ab914365d91abeb67c21ae964234b694dd934bf4d93",
      "bytes": 19582,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/ce-que-lia-revele-des-failles-du-web-actuel.html",
      "sha256": "5c2df75889a81af41c3624390ab4dd6dc4edc21e11483df392226e9433479781",
      "bytes": 18634,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/ce-que-non-indique-signifie-reellement-dans-une-reponse-d-ia.html",
      "sha256": "ea0dd7ba41ddff73af9f933950c2be97c98a9fdb546154de34a0831908a39d16",
      "bytes": 19570,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/changement-offre-refonte-pivot.html",
      "sha256": "39bf62324a019ff7cece28c09fc0d529310ced8e52b12968e601685e6bf2e80b",
      "bytes": 19391,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/collision-interpretative-fusion-entites.html",
      "sha256": "6d56f864d53c1d8135fe24fec05ba4f238f39693eca8f9ceeb611eb0ffbfe06e",
      "bytes": 1459,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/collision-interpretative.html",
      "sha256": "89e5f9640716a27fcd71b16a1b8c31fa0f2cad8725cbc0b61b01de50705217ac",
      "bytes": 18905,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/comment-ia-decide-marque-citable.html",
      "sha256": "32ed59b20dd83e79c9062cfb17f9b80404d9edd1e0ccc7c9c9026af228d2e0b2",
      "bytes": 18828,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/comment-une-ia-arbitre-entre-definition-canonique-et-rumeurs-publiques.html",
      "sha256": "2502877d04ee74e2b20936aecea96acadb448430332696be50975aad89f8d6c7",
      "bytes": 19652,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/communication-publique-ia-position-officielle.html",
      "sha256": "d7416fc19f1feca5e6fcc0728742b201484becc256808962b789c6c10bd52e58",
      "bytes": 18999,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/compression-semantique-disparition-information.html",
      "sha256": "df3f35cb2cee694cc5581211703800828b28de6d2857749ce2f87aea9c559d19",
      "bytes": 19582,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/conflit-autorite-arbitrage.html",
      "sha256": "4dabdfb47dec13bb885ded519bd3652705990e79de5f5c1474431db8915da892",
      "bytes": 1430,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/conflit-autorite.html",
      "sha256": "6a211e9712d0b4ddd2fa2fbedd921d3d9a9cdc04e4b059f1c224c2d24ec68b86",
      "bytes": 18895,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/confusion-de-role-expert-fondateur-auteur.html",
      "sha256": "b98cf5ac9904100eec86366c6d354625dc46d3fa965e09d5b94b4ff999944ad8",
      "bytes": 19344,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/confusion-personne-marque-produit.html",
      "sha256": "178a1568da5665bcf806547bb0a9f320de1bd69053b998b8c0be55dcf8ec6283",
      "bytes": 19543,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/contradictions-sources-credibles-arbitrage-silencieux.html",
      "sha256": "233136ae99e7a111dab3688ef7257a1cee0c29ce630dc331837f0e9cdc879606",
      "bytes": 19611,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/contraintes-explicites-et-reduction-de-l-inference.html",
      "sha256": "0f464989bddf7aa86648a7bbc40e0f2493248ce3b6ea6c2fbd49f89d8f117e93",
      "bytes": 17484,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/credit-ia-scoring-implicite-durcissement-acces.html",
      "sha256": "8fecc1b43ca9147fbfc4aef07fd16cdab8dab43e0c1f4b409ed5ded727a5ad63",
      "bytes": 19830,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/de-la-page-a-l-entite.html",
      "sha256": "d0747b7a5ddecb65f796848230310e7dcf9f177e473e8865180524d08e1896ff",
      "bytes": 19342,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/de-linformation-a-laction.html",
      "sha256": "ddf5443d6ca4dc813ef47075f4b506548ee37837a2b952a62ded752c46cad32d",
      "bytes": 18721,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/decrochage-etat-ia.html",
      "sha256": "7d7e8712450ce5f4eecb6e30cce124477b699d2df85b13f958bfaecf1d2a7aa1",
      "bytes": 18848,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/derive-temporelle-version-obsolete-citee.html",
      "sha256": "e925f85988b518e958005a63076bac8614487dd5bf28b6f146e38d85ac29a09d",
      "bytes": 19445,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/desambiguisation-de-marque.html",
      "sha256": "9608c9c72b70c1da167548a736a39d461784bc31eed6716b0ddc9ed3d5e92367",
      "bytes": 18591,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/desambiguisation-probleme-seo.html",
      "sha256": "a31c86ebf63f6e53fbf5346e5dff23c435ff48d5f79231b45bfe5742910f1457",
      "bytes": 18820,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/dette-interpretative-accumulation.html",
      "sha256": "0d690e215e4ca0c1199f9660c432e0472cb21725fe34c76481eb0b56f6d0c4b7",
      "bytes": 1396,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/dette-interpretative.html",
      "sha256": "8772222d6cae5a4b00e87eaa6ed72c108003f3e2e807cdca889c24e00b83b2ad",
      "bytes": 17539,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/diagnostic-sans-questionner-llm-signaux-indirects.html",
      "sha256": "84b75ae461f5b81d44a6696a31adeaddd35fe51fc59f3b31b0f2e7c9854e7a44",
      "bytes": 19797,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/dissonance-entite-environnement-contredit-source.html",
      "sha256": "e5593ccb5bb8815334edc506d618f1e31739195d40bbc5d061735f28d110aebb",
      "bytes": 19640,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/distinguer-observation-analyse-et-perspective.html",
      "sha256": "fc8e648c4d44a6ece3ce1f884464bf931b1d6587f2d0349b7813b4f0bbd7ef23",
      "bytes": 17323,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/domination-source-tierce-perte-autorite-site.html",
      "sha256": "edb31b2a0ba32c007b6a8bed0ce137e1561747c905952856f9bc2f1c007dc714",
      "bytes": 19635,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/donnees-structurees-etre-compris.html",
      "sha256": "572a11c14f87dee77ad15fe52a3bd86873056220adb3e6c017b92bcde5378820",
      "bytes": 18684,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/drift-de-perimetre-elargissement-offre.html",
      "sha256": "6736cc88ed8df1be98217443615d802e83c8c6001c0af8dbd24acc253f24971e",
      "bytes": 19628,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/dupliques-strategiques-variantes-fr-en-moyennisation-sens.html",
      "sha256": "b6fef6c064d724e01151ed345166c81fa640dc4e3b4c29cde33f80800a3f8553",
      "bytes": 19630,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/ecart-canon-sortie-mesure-distortion.html",
      "sha256": "cf79db6c5ec0ba934193c95f6a5bcb7d21bb3f6ea84e10081126fc18d5e5824f",
      "bytes": 18983,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/education-ia-recommandations-decisions-implicites.html",
      "sha256": "dc34f1dc2521d534e2d958a1ed803f1fd7f0933a55ff0e54c06af70969864340",
      "bytes": 19623,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/effet-template-generalisations-ia.html",
      "sha256": "f764797be9cf3e3add9cdf548bd423bae45c35a5206163f1d1c9ee3ae6c3e01a",
      "bytes": 19577,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/empathie-simulee-et-stabilisation-du-dialogue.html",
      "sha256": "f6172ddc6c987b9a2b71f040328259c107dac3c983685021f0a368c4e1a45580",
      "bytes": 18984,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/entites-knowledge-graph-google.html",
      "sha256": "99a692d3e5d3b7c7d8381251063188d84f56b391d40554bd74095bb8f5751c76",
      "bytes": 18716,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/environnements-interpretables.html",
      "sha256": "4d64b83a51bdd6384da331197adf2cf6aae40e912a501a26400278cd8aee3873",
      "bytes": 18864,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/etre-cite-sans-etre-clique.html",
      "sha256": "188ed18ac0df3bb6199f121d52007b51b856ab574957e8f026de22fe45d21c3e",
      "bytes": 18375,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/etre-en-avance-sans-devenir-inaudible.html",
      "sha256": "90c93679f36f9fa0677edb41cc4c745e7ce06ff93d7493aaf019937fc7209c33",
      "bytes": 18420,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/etude-de-cas-stabilisation-dune-identite.html",
      "sha256": "acf09b1f45e64524c7bb20ee378c3341ea1e4c58b68276e37f2245a48cc89f11",
      "bytes": 18962,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/facettes-filtres-pagination-dilution-interpretative.html",
      "sha256": "268f9eee2848590c0e6f06bfa53f9d68c31669a26e1b304b80624f867827255e",
      "bytes": 19693,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/faux-diagnostic-seo-biais-ia.html",
      "sha256": "c835b9df239f4babeed5913a5bdc09bb7cea55e7bcdd49dd9392d955fa8dce85",
      "bytes": 17803,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/figement-des-attributs-verite-stable.html",
      "sha256": "27e572345052ee1cd24f1855bad3402cf5fcb09aa17dec1acf55ecffa9fe2481",
      "bytes": 19459,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/frontiere-autorite-deduction-inference.html",
      "sha256": "b30f740f4f641dfbb98c04e87b328ebd853dccfc2a86706c78e8a0430a0a7f31",
      "bytes": 1403,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/frontiere-autorite.html",
      "sha256": "aa3ba02a274b7fdc49072b41d87120386c25e23e619ba6a66db815f10cb86a56",
      "bytes": 17871,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/fusion-acquisition-rebrand-gouverner-identite-changement.html",
      "sha256": "50f6ee152028b70459ca742efb43c4263aed44e0da41d8b6dbfa4505890f929e",
      "bytes": 19786,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/geographie-implicite-zone-desservie-inventee.html",
      "sha256": "5e0fdf315903a6a47dc1883a11638bd2aa32cf39ded5728e1e9cb0fede4c9931",
      "bytes": 19345,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/gouvernance-autorite-externe-couche-risque-ia.html",
      "sha256": "b34efc9c729a8f3f67fc0b9f262e954bcae04034d7dc94fa5c86e93b3bd10658",
      "bytes": 17904,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/gouvernance-biometrie-bornes-interdits-transparence-non-actions.html",
      "sha256": "e80295ff47d46606673d03561f958d130bbeec0c9a1c5054dd8084e1035596d0",
      "bytes": 19372,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/gouvernance-credit-facteurs-negations-justification-temporalite.html",
      "sha256": "57e7f8988c8ffd364e0c2fa062e205dc99b6d144febed9bbbf3aceb643af8958",
      "bytes": 19398,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/gouvernance-ecommerce-attributs-negations-variantes-preuves.html",
      "sha256": "4294785a1a6a78796fa8a4d2f396ec10bef640abf100e87750a574855f69563b",
      "bytes": 19278,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/gouvernance-education-seuils-preuves-non-actions-legitimes.html",
      "sha256": "9bb5fe8124a8b1716e0c692b55e9b923ddcde65228dd802867c392a90fce2c07",
      "bytes": 19188,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/gouvernance-ia-fonction-strategique.html",
      "sha256": "2dca7d6955dc7b71d4f3bbc59876fc5bd40fc56bb0aa3c0d370257927a94c341",
      "bytes": 19094,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/gouvernance-interpretative-carte-complete.html",
      "sha256": "36b7a52e153e2e7089c0c54e09560151622f94f8d072ad437642bf8d0c06fe98",
      "bytes": 19431,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/gouvernance-interpretative-exigence-economique-juridique.html",
      "sha256": "b96f6bb801892a6e1ef30cfaddba659a888d72b17f4e39a7537fc9893b765f1d",
      "bytes": 19333,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/gouvernance-legal-juridictions-exceptions-validite-temporelle.html",
      "sha256": "f695c447718a9aa49fff650814afd21f119fb1d4f037f92d3354739efc5f8a53",
      "bytes": 19271,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/gouvernance-rh-criteres-exclusions-biais-tracabilite.html",
      "sha256": "50cb3fc2fcb3433bfcc77ad4b012f3722ade27f48ee134888da857a4b3c95754",
      "bytes": 19064,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/gouvernance-sante-prudence-sources-limites-escalade-humaine.html",
      "sha256": "2f5326d7511fc361deca2acbaf89facea495c5448ff4955add2b55d4dfbbe598",
      "bytes": 19236,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/gouvernance-secteur-public-criteres-preuves-recours-transparence.html",
      "sha256": "77ccbed67d06ebe2951abdd66b79cbf25c697fe7c480276ae0ffaf6b73824d41",
      "bytes": 19318,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/gouvernance-temporelle.html",
      "sha256": "4051bb6c81261d7f64d534e195a6387347f202b637341e17b9d3438159c8f01d",
      "bytes": 18951,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/gouverner-agent-gouverner-organisation-par-proxy.html",
      "sha256": "e8b9c3a97d3ec49e533732092efe33d32a890b4aeb9d67da45fcfb1f7e91574d",
      "bytes": 18798,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/gouverner-interpretation.html",
      "sha256": "8a90188fa28aae0eb9006b6314a8775e5e7fb966707559095b01bd7b256a83de",
      "bytes": 18707,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/graphe-identite-gouvernee.html",
      "sha256": "a3134a0ef7fafad1454406a661e785506eaa6acd5cdfdc42c51167cf9a23e3b4",
      "bytes": 18838,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/grok-et-la-fabrication-dautorite.html",
      "sha256": "a40b21819a1f476f53af8077c3671386a4ea9f89ff2f078babf912b0c8186142",
      "bytes": 18751,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/hallucination-absence-legitimite-interpretative.html",
      "sha256": "1a0b45fe981e5270df6c7fef229549a11a888c0ef80d399434c6a7c71e5371df",
      "bytes": 19241,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/hallucination-echec-structuration-amont.html",
      "sha256": "222c87204cc8d80ee834ba5a5ac6b41585d0334543cd5dd90de1201a2558c0ba",
      "bytes": 19522,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/hallucinations-coherentes-vrai-risque.html",
      "sha256": "92d8385666ab076b209c5baf9d53f267b11e09adf45fa46c90182873530b7199",
      "bytes": 18593,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/heritage-informationnel-ancienne-identite-domine.html",
      "sha256": "c468e22f2423669b6481e23367f3f53bd1a42b9871ab1c5b37bf00506a6ed491",
      "bytes": 19538,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/hierarchie-des-sources.html",
      "sha256": "b8126a1c3945d8cba89d8319f92a4a7213c08ceac0feaff1d1829200b283f5af",
      "bytes": 18752,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/hierarchie-information-acte-de-gouvernance.html",
      "sha256": "af05e5dc89520a9ee69c41f58919bcf10df9593f2c69dfe42dfe73fa2932743a",
      "bytes": 18943,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/hierarchie-sources-opposabilite-ia.html",
      "sha256": "a4c205de15766ebe5d38b21547ae23456b302e2941502491e105869975920001",
      "bytes": 18899,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/historique-dominant-ancien-emporte-nouveau.html",
      "sha256": "2442d0be615249583e3de1d8d52e40f6845b8abb40367c99a41157bf1c35e8c5",
      "bytes": 19443,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/homonymie-collisions-entites-partageant-nom.html",
      "sha256": "ba16065d532fbec18d1152b744169b3f440aa18f362e860d3448b8fa5e21c393",
      "bytes": 19601,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/hype-geo-fausses-solutions-optimisation-ia.html",
      "sha256": "c4fbfa31262588f833d1aa2e1bca9ca2ec61be281c7d6df14afdafd6c507d298",
      "bytes": 18956,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/ia-erreur-probleme-juridique.html",
      "sha256": "404b9edba9dbd6c105da2998b550f7e2c52a9ec4cd0a973135627b138462b868",
      "bytes": 18933,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/ia-extrapolent-perimetre-flou.html",
      "sha256": "43fa5cee9ea7aac58fccdec0bf27d32346542beed18bc8c99583df9e43382775",
      "bytes": 18693,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/illusion-comparateur-donnees-non-comparables.html",
      "sha256": "7ad3c134cda8d0e3ffe35b5b39720a13c2d3cb173579e5144bb980cdb47ea9f9",
      "bytes": 19656,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/indexation-vs-interpretation.html",
      "sha256": "2044868f5141a2b85d164d0c8cfcc1f672c6d117ab37febc6ee79ce57829bff1",
      "bytes": 18697,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/indice-drift-mesurer-variance-formulation.html",
      "sha256": "81534d0b2738a9a8f22b40d46f911393e29097951b207106bd11b391d6553558",
      "bytes": 18589,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/inertie-interpretative-correction.html",
      "sha256": "30b46f3b1a839307fcb238ac7157e74aacb410c235133d70f1e9db7894186bdd",
      "bytes": 19123,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/invisibilisation-interpretative-info-invisible.html",
      "sha256": "31ea87a08ad4d4fcd6aba283e8a9ee97a872491cdb93d244a2aa43d4d10d2cb7",
      "bytes": 19703,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/invisibilisation-marques-reponses-ia.html",
      "sha256": "0dc2ebffc928e0b116921a75f1cb8a26b9aba3b8aefffa1de1f9b4b61f192ca5",
      "bytes": 19005,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/invisibilisation-risque-economique-systemique.html",
      "sha256": "9e6012e37880c1487cc18caf1a87de2dbd2eedf11cb83f0a815b1dc41e87298e",
      "bytes": 19010,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/le-mythe-du-bon-contenu-pourquoi-la-qualite-editoriale-ne-suffit-plus.html",
      "sha256": "b7042062c73647b759a931ce7d9d4b1efcbac4fab564acc65a1c61a1f3228fbd",
      "bytes": 19802,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/le-silence-n-est-pas-encore-gouverne.html",
      "sha256": "c0fe31f592ee318e2a02d45818358d3b23c512fbfc5ac5256f70bd5b780b52b0",
      "bytes": 17845,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/lecture-interpretative-adolescence-technology.html",
      "sha256": "0a1e7ee9dee23398e86e9539fe0526d0ab923cf6e7b83118f96650245ea4718a",
      "bytes": 19316,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/legal-ia-universalisation-regle-locale-precedent.html",
      "sha256": "92da678635b71a51a658edd9ce2d9318e206f67f81d2d7ccc06d33fdd2cd7c75",
      "bytes": 19530,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/lexique-controle.html",
      "sha256": "6777ebbe860b11a191bea2647673fc735bbc4ca32efede18471805ae22933fb0",
      "bytes": 18963,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/lire-logs-ia-chemins-crawl-interpretation.html",
      "sha256": "2e4c302466ecfe8329061828b230ae2129ef9709d6ad5e7bbe7842849374fece",
      "bytes": 19426,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/lissage-interpretatif-standardisation.html",
      "sha256": "72e255f4977b6f8bb9cf4c93e9fa99d34f7ab2e0910c2422a1c0afa89b696a80",
      "bytes": 1418,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/lissage-interpretatif.html",
      "sha256": "b8807ac37175c5c6999816007c173840db8baef67a5e8fa155c46b752a3245a8",
      "bytes": 18915,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/maillage-interne-graphe-de-sens.html",
      "sha256": "47b29efcb9e4cb0d3fafa42c4ae01a2a717489d2659f932761be086a84cae7ab",
      "bytes": 18554,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/matrice-des-mecanismes-generatifs.html",
      "sha256": "14a2ba314f5219089786a6bb43af0b05db7f8081aa0c85d2aeedc91cc120ae16",
      "bytes": 19147,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/matrice-des-phenomenes-2.html",
      "sha256": "b9375b33e1fd489d141757ceaec31a61c5831a206556243c4991a04fe8859075",
      "bytes": 16940,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/matrice-des-phenomenes.html",
      "sha256": "0e2f110512093654eb39a6384057c2195328afc877557944d82bb74c6f18a2d0",
      "bytes": 1705,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/medias-contenus-resumes-sans-citation.html",
      "sha256": "bd0deab4b9e9d6a41f797927790cf668d1d690f52f20c79c8ea352623afc3a88",
      "bytes": 19364,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/mesurer-invisibilisation-audit-presence-reponses-ia.html",
      "sha256": "dbe82a35fb3f75715e6bd931661bec3438ab586f00c8e2fc20779728bbb313dd",
      "bytes": 19685,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/mise-a-jour-vs-correction-ne-suffit-pas.html",
      "sha256": "570feb23ef34f0dba3e50d6ae77f23c47cfb43ffeb7929b831a6b9675560e629",
      "bytes": 19378,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/modele-de-negations.html",
      "sha256": "7893265306ed28eb2edcc1765f7eb8c652f456db8ef615984bdf9b823191370b",
      "bytes": 18856,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/multilingue-temporalite-versions-fr-en.html",
      "sha256": "d8bdb153ff35686fd73f0c2856229d0ff768333e9eea9aa94bbb92c35b7a122b",
      "bytes": 19470,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/narration-automatique-comme-strategie-de-stabilite.html",
      "sha256": "803d8abe72c61694cb6257ee6985678ae9179f5407130529dae1274154892ba8",
      "bytes": 19072,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/niveaux-d-assertion.html",
      "sha256": "4f176dab57a6e8456f1e4fdbf2bee6ca2889e82427c3b6a7d12cf49f0e2ca3eb",
      "bytes": 18855,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/observabilite-interpretative-metrics-minimales.html",
      "sha256": "c9eb9575df3d67996f07b96673a3f2bea2df89887827cae666d1c5bbed998373",
      "bytes": 1815,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/observabilite-interpretative-metrics-protocole.html",
      "sha256": "6691da43dd80e7aaa0700fa386a330efe6d9bb89e23c811fc0085a889219e91f",
      "bytes": 19432,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/observabilite-interpretative.html",
      "sha256": "2c8dbff7dc5975ac465a42ce8cff25aaf6c24a3e2c5da6016280941b985af918",
      "bytes": 16971,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/observation-vs-attestation-q-ledger.html",
      "sha256": "9237f21da8b05e99d3279520e3f82aaa1da4a93a06cfc0ba50a587cb90ba5133",
      "bytes": 19238,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/offre-gouvernable.html",
      "sha256": "3c5395862c2958ffa9047de0107c9d22f2615517ecf6a4681bd19064e9d32c01",
      "bytes": 18949,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/offre-simplifiee-par-l-ia.html",
      "sha256": "48715bc587b19b8f8af2999fc41542e4a573ec48ff009f1f88a6a0a2cffb9f29",
      "bytes": 19436,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/pas-de-solution-technique-aux-derives-interpretatives.html",
      "sha256": "5b696d9f56f94ce88911f5784738fafc5ee846dad45a25703f72a61299139f84",
      "bytes": 19278,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/patterns-crawl-non-humains.html",
      "sha256": "55e290b03d512d1c2d0f7f2f8ae21da6c4c443d23b55c0d90b0a1b9280c3b560",
      "bytes": 18637,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/popularite-vs-admissibilite-web-ouvert.html",
      "sha256": "ebc6b68ffdc5b5284041ea3ccda06dedf3170f42ec923276d4ab237fb93acdfe",
      "bytes": 18112,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/post-semantique-derives-autorite-defaut-juridiction.html",
      "sha256": "e3daf23bc1398b68febb9225df7e9462b5a6bbfa99640c4f7be55c36342963a4",
      "bytes": 19612,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/post-semantique-thinking-reasoning-gouvernance-interpretative.html",
      "sha256": "2a0386741fb68fc01d92a69fc4297ce9965db67b66cc6351836d36d3b331a0f9",
      "bytes": 19636,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/post-semantique-web-ouvert-gouverner-sortie-insuffisant.html",
      "sha256": "cd45b1438e597d1ed4ccd7463ba7684bfe9d762b99ce07ab71883cb412037a96",
      "bytes": 19579,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/pourquoi-l-architecture-d-un-site-influence-plus-l-ia-que-son-trafic.html",
      "sha256": "309150c2cddd4a3b52010f0f9b0dca45c3b9fc6ef5e84a5538533895ea3f24a0",
      "bytes": 19689,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/pourquoi-la-gouvernance-semantique-nest-pas-une-option.html",
      "sha256": "4bf80e1399dc2a5aa51204b7c859f5c0a91ce1492ade91b311158422dd789e91",
      "bytes": 18816,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/pourquoi-une-ia-prefere-une-source-claire-a-une-source-populaire.html",
      "sha256": "24d3fdf2e6be7a07ba1b0040e022db4ec4e00c2ccce0967590235db2c1ccb5e6",
      "bytes": 19496,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/pourquoi-une-ia-se-tait-plutot-que-d-inventer.html",
      "sha256": "5fdff403fb60fc2c2b31a59f23b855e0700aaeef9edc04f50b05be6f9fc28445",
      "bytes": 19102,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/pourquoi-une-marque-peut-disparaitre-des-reponses-ia-sans-avoir-perdu-son-seo.html",
      "sha256": "d3ce1a0bf96f7bc5e3238fb937c71ac039dcdad7784719611a2e731b2f99b67f",
      "bytes": 19828,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/pouvoir-de-version-correction.html",
      "sha256": "442120059375aa60c15c9031d05be398ffd8f742379982488c8ce7a23bed486c",
      "bytes": 1396,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/pouvoir-version.html",
      "sha256": "5e9ca2306a929da491cf604b7f234ccb9c0340a54c79139770560055b896aab6",
      "bytes": 17289,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/preuve-fidelite-citation-insuffisante.html",
      "sha256": "68b71d96d8874d101fac13d08b0fa48d853d70287b69ffb8edaa74546fd3d240",
      "bytes": 1358,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/preuve-fidelite.html",
      "sha256": "7943159633474e1685e5e49f3cb4416f4ac45f6ca5f96b7937ac1103123ed472",
      "bytes": 17240,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/prix-options-ecommerce-simplification-erreurs-ia.html",
      "sha256": "89665a476f3404304be9b7371de85dd6e3aded0da2df4127f828aa6d4ece9b50",
      "bytes": 19247,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/prix-options-exceptions.html",
      "sha256": "ea0339c9d29cdcd7543b8b388d7d76a989690423cdf1ab05a8473ea50acc4f45",
      "bytes": 19167,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/protocole-validation-cross-modeles-entite.html",
      "sha256": "2a52e60726ef55cc31ada343e2f89d36ab349ab770c2d97b350490c68f07a79b",
      "bytes": 18848,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/quand-corriger-le-contenu-ne-corrige-rien.html",
      "sha256": "e4fd1a6d01c546b8067568bfe971d068de0f44a4c2fb41ca6f39f30c063c6adb",
      "bytes": 18642,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/quand-le-seo-devient-une-discipline-darchitecture.html",
      "sha256": "640e88465baf268c5555cbfdf6b36d1e0454c3e478cb875d790602497aaea749",
      "bytes": 19067,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/quand-le-silence-d-une-ia-est-un-signal-de-fiabilite.html",
      "sha256": "d5bf70333de8cf20151b21d0e92934483da9f914c237d6c9e729b604863727ef",
      "bytes": 19310,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/quand-les-modeles-deviennent-plus-confiants-que-leurs-sources.html",
      "sha256": "cd09ac1001ee1c1489f38dbf2a2106cde6e45293b2f214657409acfbf733deaa",
      "bytes": 18961,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/quand-les-moteurs-interpretent-correctement-et-quand-ils-se-trompent.html",
      "sha256": "d739eee1996611943440aed289228560f8136edbb33e099d6a2904dc4fe6f48b",
      "bytes": 19281,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/quand-linformation-devient-decision.html",
      "sha256": "4757b27e3e492c5fd1f80d85ee00aacabf3b9ad3b91b38b85937845290dbcdd7",
      "bytes": 18522,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/quand-une-ia-demande-une-definition-avant-dinferer.html",
      "sha256": "f3c55fbf98013228543b90e3b28f7fb2d3cf2949f986e4e7653c99f8a3795e10",
      "bytes": 18890,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/quand-une-ia-produit-du-recit-sans-demande-humaine.html",
      "sha256": "f7fbdfa0c5ae4d6cc9c648745dea7d4cccb80a60f36dd3e8e00c5ead89ad3642",
      "bytes": 18126,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/qui-est-responsable-quand-ia-repond-sans-legitimite.html",
      "sha256": "a6d36d801a3f61fe39eb6fbe8eff326efcaeefeaded9616b261a196b0f9eeb44",
      "bytes": 18640,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/rag-fiable-probleme-de-limites.html",
      "sha256": "59732bd697b9b17f01201ba8a7d8c0993e10e8ad59dd7579bbe15a6b8783f02b",
      "bytes": 1387,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/rag-gouvernance.html",
      "sha256": "db7541e5d64a6c654edf0d39bcb741e1c91ae616a84907c024429a5d75f34658",
      "bytes": 17255,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/rag-gouverne-inference-non-gouvernee-point-aveugle.html",
      "sha256": "299e5876f6a7b54eb55632ea29434433c0127b94cb3963df7a91691a0657260a",
      "bytes": 19532,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/recrutement-ia-inference-criteres-non-declares.html",
      "sha256": "c2500df637b508b0b43e474445b671c3ca63113f65986ce9abe31b193ca0789d",
      "bytes": 19412,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/reduire-espace-erreur.html",
      "sha256": "5ba285f088938d5233400a3d87b5e49ca7b59eec883a45b68df4156e95be2aec",
      "bytes": 18740,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/rendre-la-gouvernance-mesurable-q-metrics.html",
      "sha256": "7050fad6b06a29875dd32600466419e80dfd521a05b3d7d380fc842d48eb5a30",
      "bytes": 18643,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/reputation-signaux-faibles.html",
      "sha256": "02043eb40ab283b34a0984d8733d365e4fa314ffda0dfa98f1d790d1371837ad",
      "bytes": 1762,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/responsible-ai-ne-rend-pas-opposable.html",
      "sha256": "38d61122a32bba8c6d8d5e38b45cb3c94c262e061fc417c877a43e57e15ad506",
      "bytes": 18522,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/rh-inference-ia-risque-discrimination.html",
      "sha256": "1d4ea16127e16e1c47e025e7212aa26368e4cd295157603dbbbbea94cf9ce67c",
      "bytes": 18867,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/runbook-ops-du-log-au-snapshot.html",
      "sha256": "34ffd86391ab1a8c3118849fe7adacd725fe924d23a1d01e7dc2acb01c8fc6ef",
      "bytes": 18768,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/saas-integrations-confusion-natif-tierce.html",
      "sha256": "e0a741de07af16e7d733b34ca139f8634cd003bb00ffe7e24c57adb4d5d6bd7f",
      "bytes": 19553,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/saas-perimetre-fonctionnel-derive-promesse.html",
      "sha256": "efc264fe4b89e431d672b1bfff19257fc86885253e790c8ef2e6c88e07ca1dff",
      "bytes": 19516,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/saas-plans-tarifaires-confondus-capacites.html",
      "sha256": "34c5bc8fe33f7769c3f3278bf64c394e55c4e0da0c2d77e0add4d6b298a30d24",
      "bytes": 19571,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/saas-reduction-offre-a-une-fonction-unique.html",
      "sha256": "62fd1c6b650aec03eb3a4668b85b21043c728b90ff842b72cd375adb2cd1dad7",
      "bytes": 19534,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/sante-ia-comble-vides-fausse-certitude.html",
      "sha256": "a32b35651e8de54237a27ed768484c1ff43cf18b6be6aedf3b348b007779f2bd",
      "bytes": 19335,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/schema-conflictuel-donnees-structurees-contradictoires.html",
      "sha256": "56a99c5d2825bf57db0ee45d43cd34c8ec92b1f0cfb20c51fbfb3e0bedc6bf93",
      "bytes": 19718,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/seo-a-change-de-nature.html",
      "sha256": "11d236a6c5ac399dc738c132ed13227f2dbd971cf8ae97d8c4eb708048676ecc",
      "bytes": 18536,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/seo-mots-cles-vs-entites.html",
      "sha256": "eec26ee2eaa1d547ec5b5d7886c8cc66a7ca790cb3592842158afd633f42b607",
      "bytes": 18540,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/serie-gouvernance-interpretative.html",
      "sha256": "448bfc9953dfb920aa58330cc323be2147b21ee75b0002d9ff043a59db35247e",
      "bytes": 18882,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/services-professionnels-confusion-expertise-perimetre.html",
      "sha256": "4b715499c6bd04efc2d9c3bcbbfa6e9f8d0bdc9dac5020d4ac34e95d90edc82e",
      "bytes": 19795,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/services-publics-ia-eligibilite-verite-binaire.html",
      "sha256": "93e8cde5e459a0b38bb3874bbd7266f5af5afee217ae1bf3cfbbc904886275e1",
      "bytes": 19574,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/seuil-de-gouvernabilite.html",
      "sha256": "dba82c6e078e5b7d04d4959d2d5f6531c995a066c51d58ad1d0bddbea7cf914a",
      "bytes": 19030,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/silence-canonique-non-reponse-legitime.html",
      "sha256": "1a7b5f66582d92e950ed72b0e22de7c87bcba17c71135b8a57e7383191e6b2a4",
      "bytes": 1432,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/silence-canonique.html",
      "sha256": "3090fbfc8d9a6f41df7cf90238ddba02f1ed3302aab8c04e0995ba694daca2a9",
      "bytes": 18107,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/silence-informationnel-non-reponse-legitime.html",
      "sha256": "9fee67bf5d78c80ed12c35371740965de168d39073e1ef542c0d9d5d2dafaa02",
      "bytes": 19207,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/silence-informationnel-signal-negatif.html",
      "sha256": "af1ddbb59907bbdfef1cd7a40c016ad3ef6aefec92ba0c11c397da11aa74cc78",
      "bytes": 18668,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/silos-cocons-faq-stabiliser-le-sens.html",
      "sha256": "fb432c2fa5a603c47d755605ca4d0203229d00ec9a08e1809ecbaf33f94f6464",
      "bytes": 19617,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/sources-credibles-contradictoires-choix-ia.html",
      "sha256": "23db519a3542243524bd842130a50bb6b27c90e9b6e0455f241ede9e9bda3e32",
      "bytes": 18640,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/sources-credibles-contradictoires.html",
      "sha256": "31cd2e3b29850067fca86067c5bb64f92c45a297b57cb1e48c49b8dc62378a08",
      "bytes": 1797,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/soutenabilite-interpretative-budget-correction.html",
      "sha256": "73c52b461caa8c58edf076978a154b1b174a9bf8eedb1cd96c121cd7de8ab0bd",
      "bytes": 19375,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/stabilite-des-reponses-ia.html",
      "sha256": "7c5b7c3a03bb0bf9a2ca84e39acd275c8451ae010bc04ea653f152e0aa87f6de",
      "bytes": 17867,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/structurer-cest-exclure.html",
      "sha256": "eae53ba9b9a44669e4f5c59a1569599543013a20bb0ce7e6f54004825db95619",
      "bytes": 18327,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/support-client-ia-engagement-entreprise.html",
      "sha256": "767b75dfcf07c769814c53d788816d610ca67b4e71893f25f888d9d89f2fbee3",
      "bytes": 18943,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/synchronisation-signaux-reduire-contradictions-onsite-offsite.html",
      "sha256": "4d06fbabe058127585d35abf35d858ccfbcb490933a8154985a097968b4443a8",
      "bytes": 20408,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/syndrome-expert-par-defaut-proximite-semantique.html",
      "sha256": "8229be077ab8f1e4e2762a177da3fccf41eb6b04f106f3344831fdc56462af79",
      "bytes": 19899,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/systeme-de-renvois-canoniques.html",
      "sha256": "7b4edde2b664519759e4ca092c621e44089b167599781c77266ffa1499ebdaf5",
      "bytes": 19092,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/temporalite-obsolescence-quand-l-ancien-persiste.html",
      "sha256": "87ebc8e2311218eab4fb0ca7ab58afdbe96cc02ad08a8b5dfc60d60b24f347d9",
      "bytes": 19566,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/trace-interpretation-auditabilite.html",
      "sha256": "50b9a5611751d08ee008754634e342c19b3a5c7d22fe7db869d829e2f679533b",
      "bytes": 1441,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/trace-interpretation.html",
      "sha256": "0d6a15e84a38d053bcb2b47abd21f47cc8a563915863ed1cd0726ab13273196a",
      "bytes": 18159,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/transparence-generative-article-50-declaration-gouvernee.html",
      "sha256": "23da09cb5b2f122c7cb02712b5f26d14991fe7c7c07aa420b365e00e95e4b4df",
      "bytes": 19407,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/blogue/web-ouvert-vs-environnements-fermes.html",
      "sha256": "955b345497fd5b9c7949c285d24ea1cc591f12c6c2c1d04ccedeab10b465f082",
      "bytes": 19308,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/contact.html",
      "sha256": "89ddd163d5d406462c978c93ed77bb35117499be8c5c114e784c78a567bb101a",
      "bytes": 11766,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/controle-changement.html",
      "sha256": "1a23e0c1686729fa85a40056ddfc16b1fb55e44762b9d9756741c4744b506205",
      "bytes": 12942,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/doctrine.html",
      "sha256": "f9caa13bbfba7363ecbf431a1c66a080a97f2f8094cfe67dcb299fb2c9accc32",
      "bytes": 12212,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/faq.html",
      "sha256": "84decaeafe7903b00c63942ab7739fba0389a5001543e455826da9a12be9dba7",
      "bytes": 17016,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/glossaire.html",
      "sha256": "f0464b78f1deafbc1bd5daafc693897ba7a905283c0d689553382bff2087ce19",
      "bytes": 12906,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/gouvernance.html",
      "sha256": "0501dc157fb1a70b9bd3de9c8979bf7d166b891895d8f5a37eb68474eb3c9cff",
      "bytes": 15469,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/index.html",
      "sha256": "852ec98c6f6991e3f58f0ae1299ab45f74387c2dfef687f8f8982097c941fec5",
      "bytes": 12372,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/legal/conditions.html",
      "sha256": "1bb0075255ff3f4489affbe24fdf2698d79a53b6ba826dca01d2df9ea013712d",
      "bytes": 10012,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/legal/confidentialite.html",
      "sha256": "f4da8df6510a561781471c0c1792e56775dda7bf1fce0ac62a9cccbb015c0b20",
      "bytes": 10110,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/legal/vie-privee.html",
      "sha256": "ce5f088b62aa6d2e9d9bb6e90bd804ea2a81f6c73c48f7d63348733c93de2249",
      "bytes": 10594,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/mission.html",
      "sha256": "777b478b14b881dd1c984da5d1b4845669acc5489be45973bf7b7657244fd6b2",
      "bytes": 14229,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/politique-ia.html",
      "sha256": "75b1875402c6b974ab69f6e485fa4dd006adc6e237dd92821583c0fabcf7d0b8",
      "bytes": 20068,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/politique-ia.md",
      "sha256": "36e6d1fca5a40c2a263839df5c68f59fdfc82d26aae5baa019d10a7de5b1d73f",
      "bytes": 6214,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/portee.html",
      "sha256": "8b38d696e9f150744cc6f66108ac37bb023c0139f3db64dad1c9428ecea7bfd0",
      "bytes": 13335,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/registre.html",
      "sha256": "603ad9eb9155dfb330613703ff1b4412a50421cbcb522260e68c8ecb6b31ac25",
      "bytes": 12594,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/securite.html",
      "sha256": "cda0243860033cd6c12cdcf14ed82ed4d0ffe6dc09222fe9739e73fdd47267ca",
      "bytes": 11746,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/systemes.html",
      "sha256": "c869ca8ce07283ce6341f14069c480a97096806baa61c343b99015675ad32db5",
      "bytes": 13733,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/themes.html",
      "sha256": "0d6dcae552ead40498f95e5c8db93222c78669c61d1a345a2279c84e557365eb",
      "bytes": 21874,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/themes/architecture-semantique.html",
      "sha256": "3cda6ebcea0fed1c6543a98ae8fb66c5850797a738f5cbb13f08caac87e4c92a",
      "bytes": 12800,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/themes/autorite-executable.html",
      "sha256": "047c7828e8ebb59ab3a32640cf8b9d851df5264bd775548a2890ab0749296ce7",
      "bytes": 11406,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/themes/cartographies-du-sens.html",
      "sha256": "318080b6395a6c958e5f115476c943f8ce4595b5c4ead2bd4e25d54185963448",
      "bytes": 13111,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/themes/dynamiques-interpretatives.html",
      "sha256": "ea46defd57f90b221378e8f01dc651226231c889eb2b8dc124e57c11f0dcdf46",
      "bytes": 12983,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/themes/ere-agentique.html",
      "sha256": "5a410cf6b85e45f624a89b00eeec382f1fdc9f368e2262407148b37ea79cb588",
      "bytes": 12585,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/themes/gouvernance-ai.html",
      "sha256": "c385da3d57daa06106d61f27a3238816d066b37085814927930e31c652a75dfa",
      "bytes": 12826,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/themes/gouvernance-exogene.html",
      "sha256": "4f7799067609837fe1d8a87543ff9976a7f64729e22812f160b6542b8501db1c",
      "bytes": 12725,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/themes/interpretation-et-ia.html",
      "sha256": "3e39b064685adc89721ef81ba1b45c77e3a183293e72d21994853c989f1605b4",
      "bytes": 13108,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/themes/notes.html",
      "sha256": "7aa0f57e1a146793dc66471c828a234edf61a984fd1053b367748fdc4f7ca7f6",
      "bytes": 13140,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/themes/observation-terrain.html",
      "sha256": "13e3e246e02421ed5c2ceb63bf578640d12c0a54626fd59abcbcb4241c858237",
      "bytes": 12766,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/themes/phenomenes-d-interpretation.html",
      "sha256": "ca57131564143ffbe44ef596fc049dbbab28e330249ace893447e7d6811ff325",
      "bytes": 13279,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/themes/reflexions-et-perspectives.html",
      "sha256": "0b558a8f7ac16d86b9d0e09c15ad38037914ce91f0f8212d35104b56d44e9a0a",
      "bytes": 12423,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/themes/risque-interpretatif.html",
      "sha256": "edf4bd4cb08ea56a3aabf21713fa7acb037e66b6bd9257d85c875e7a63126868",
      "bytes": 12934,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/fr/themes/seo-avance.html",
      "sha256": "30adb652472f6db2a73e5c187b5d47b043c304ba505c43678cb226441999f934",
      "bytes": 12652,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/humans.txt",
      "sha256": "d926cb9ae6afb4106ae80077863c05a3e78397447566cbf8fbcf16034b4e2fb3",
      "bytes": 852,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/index.html",
      "sha256": "ad9b473127e87d0572002b4e8b9949ed3096a27228803a4a42e806404043e0f8",
      "bytes": 6732,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/llms-full.txt",
      "sha256": "dcfcb0ab45f748dfe6a1a789a035474a385007f68138100303faafde5915ff58",
      "bytes": 7382,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/llms.txt",
      "sha256": "8225fab122121398851143db47571f22a1701601ece11c9a30e418e76f5dd1ef",
      "bytes": 4395,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/robots.txt",
      "sha256": "ae27d0f69e79d34fb53e654069a3a78bfd0acf5192013873806963f751ca93c4",
      "bytes": 378,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/site.webmanifest",
      "sha256": "658a47669ea51775c8a395c589e9bd25548b044a353ad13083514724024eac29",
      "bytes": 429,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/sitemap.xml",
      "sha256": "ee20da15264517276f15f62ec6cc1c1c205dda05d56d04448c17dc11aa5502ec",
      "bytes": 173896,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/well-known/a2.json",
      "sha256": "f0ee1e1a9d7fa5634b07a7fa9d4c4285fcef51897cf10b0c6cdefb5194c1ec7e",
      "bytes": 1613,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/well-known/agent-profile.json",
      "sha256": "11c01912ffb6fee70cd874831540cda2f0b5b2685c1e4e885a36f3a6fb208043",
      "bytes": 3121,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/well-known/ai-faq.json",
      "sha256": "2ceae40e08228d8c892c7f2badfddd45cb6f1e4aae9a0e659516216c97fb1085",
      "bytes": 12538,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/well-known/ai-frameworks.json",
      "sha256": "d2a12ab552c9e5629810ba980b8c4107ff75de09ef7dcf1df6fa5f7fe15e90f7",
      "bytes": 3113,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/well-known/ai-glossary.json",
      "sha256": "42fb1455fa8ee03d65d44e41fea63f85a6d7aab4a2db909bf7417e77e5daf335",
      "bytes": 5422,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/well-known/ai-governance.json",
      "sha256": "4cda1fad483addd178d559fed2b45deb2a6e60fb524e83146ce1a6137cf2cc7a",
      "bytes": 20357,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/well-known/ai-identity.jsonld",
      "sha256": "10f68b0e3375be5996d59c341aa8de0c9ece492152bfd47a2c71905564096fbb",
      "bytes": 1845,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/well-known/ai-mission.json",
      "sha256": "c2cf4ac90d95f5d55001b8210274863feb09f3a9c1dd2c032814dc8c4466463f",
      "bytes": 2673,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/well-known/ai-policy.json",
      "sha256": "ba46d5f13c4f6e0d652c7eb85cf05da5063d90861b69476c17294ace4abab160",
      "bytes": 6479,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/well-known/ai-scope.json",
      "sha256": "caa518245a1ca49cd47ad5f756b9a8578b5575fdd0129965d84e0ebfac91aee8",
      "bytes": 2954,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/well-known/ai-signals.json",
      "sha256": "2a27ea8eaff5dcdccbcc3a81372ef2442fa4d2fe932ebd0f32fcf5b10e503221",
      "bytes": 4314,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/well-known/anti-plausibility.json",
      "sha256": "3404844a682eb782d38d1e9ca7b0b0141a020e33ea26de49e784a454d4fafad6",
      "bytes": 1735,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/well-known/change-control.json",
      "sha256": "d09cb5ecc1a9e9e6be0d93e3e996be501e89d9be195512d065dcb794a61d92d2",
      "bytes": 2178,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/well-known/doctrine-blog.json",
      "sha256": "359a734e2e2a45b7d4997677af430c3155d9d4e92aab13830458a405785ab429",
      "bytes": 274625,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/well-known/doctrine-index.json",
      "sha256": "aae886ca79aa546186b3d3b109bcf74b332749aeea111c1ca0d33c6219f1b840",
      "bytes": 140502,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/well-known/doctrine-library.json",
      "sha256": "c473213475b80d67b35271d8345ba2f0bd18ded5112e221163b207611c9bfe37",
      "bytes": 180934,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/well-known/doctrine-taxonomy.json",
      "sha256": "63ae14be5c0498e51cba9a588538b3eefd923f8a45d9fd40e424d4e698df979b",
      "bytes": 20702,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/well-known/dualweb.json",
      "sha256": "57ca55efcd6bf348834906ff0df4b58f9efdf91046914020000c6f47a52064b6",
      "bytes": 1656,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/well-known/evidence-taxonomy.json",
      "sha256": "297fb0183f705d0e44ff26c96b3d4443368ea3dd9f5deec838e1bdab038becc2",
      "bytes": 2136,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/well-known/governance-registry.json",
      "sha256": "ca0df7318da6b7729e7d29f744cdf4606a0096915001c169da12f1509b37407e",
      "bytes": 40982,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/well-known/interpretation-policy.json",
      "sha256": "be98f5b8e8da8892b0dcafc97dc1ed64faac433279baef1ccef99393a1f2ba9a",
      "bytes": 2457,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/well-known/output-constraints.json",
      "sha256": "7ef2ae95c6ad3d83c9a3a3e560b88760c4a2dc9946eb4ee5b292351d92dc4d20",
      "bytes": 1844,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/well-known/publication-policy.json",
      "sha256": "67d01c66336e547eea70170018ec941790da09b1d80ed09c06c754f41a92ab13",
      "bytes": 2604,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/well-known/qlayer.json",
      "sha256": "1fd876ae34818793a4805caf6d97af57f18d09b5d96ceabb565dd7c033c1ba4e",
      "bytes": 2081,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/well-known/reading-paths.json",
      "sha256": "f3de316f84c4c1e236b7719d0eb4d48e7240a1d55064b0a2965615b2d3a024a2",
      "bytes": 17248,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/well-known/response-legitimacy.json",
      "sha256": "2f391207f5b0f21d7c74ad701315e22e6db0aac2eaee2277849c52cdd2bf9c32",
      "bytes": 2737,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/well-known/security.txt",
      "sha256": "94ed96642f9e7b3ee338d63063081f27b368e422bc8aeed71650a56e3720ca17",
      "bytes": 196,
      "last_updated": "2026-04-09"
    },
    {
      "path": "/well-known/ssa-e.json",
      "sha256": "4e9636f97e141a2ee70d8e0072a74914d54073412d06674ea4c82fa168f7d1ed",
      "bytes": 1646,
      "last_updated": "2026-04-09"
    }
  ],
  "integrity_note": "This index exposes file-level hashes for public doctrine, governance signals, and machine-readable surfaces.",
  "founder": {
    "name": "Gautier Dorval",
    "url": "https://www.linkedin.com/in/gautier-dorval/"
  }
}
