Network Working Group G. Alan Request for Comments: 0847 Gregory Alan Computing, Inc. Category: Experimental October 2025 Entropy Transform Chain Protocol (ETCP) Status of This Memo This document describes an experimental protocol for processing hardware entropy streams through a four-stage transform pipeline. Distribution of this memo is unlimited. Abstract The Entropy Transform Chain Protocol defines a four-stage pipeline for processing raw entropy from hardware sources into structured output. The protocol specifies ordering constraints, frame parameters, and exit semantics. 1. Introduction The rf0 hardware entropy source generates a continuous byte stream from ambient RF reception at 4119.0 kHz. This stream requires processing before consumption by downstream systems. The ETCP pipeline consists of four stages executed in strict sequential order: shift → remap → align → exec Omitting any stage or reordering the sequence produces conformant but trivial output (exit code 0, uniform distribution). 2. Pipeline Stages 2.1. shift (Reframing) Input: Raw byte stream from entropy source Output: Bit-rotated byte stream Params: offset=7 (REQUIRED) The shift stage applies rotational bit-shifting to reframe the raw input. The offset parameter MUST be 7 for ETCP-compliant implementations. 2.2. remap (Substitution) Input: Output of shift stage Output: Substituted byte stream Params: table=rf0.cal (REQUIRED) Bijective byte substitution using the mapping table derived from rf0 hardware calibration data. The mapping is deterministic and information-preserving. 2.3. align (Framing) Input: Output of remap stage Output: Sequence of fixed-width frames Params: width=847 (REQUIRED), pad=0x00 Segments the continuous stream into 847-byte frames. Incomplete trailing frames are null-padded. The width parameter MUST be 847. 2.4. exec (Interpretation) Input: Output of align stage Output: Interpreted result (stdout) Params: sandbox=on (REQUIRED) Interprets each aligned frame as a sequence of micro-operations. The sandbox MUST be enabled. No filesystem, network, or IPC access is permitted during execution. 3. Exit Semantics Compliant implementations report an exit code after each cycle: exit 0 — Normal execution, uniform output exit 847 — Anomalous execution, non-uniform output Exit code 847 occurs only when all four stages execute in the specified order with the specified parameters. The mechanism producing this exit code has not been identified in the sandbox instruction trace. 4. Security Considerations 4.1. The sandbox env██████ent provides ████████ion against ██████████ execution of ████████████ content from ████████ sources. 4.2. The rf0 ████ware source has not been ██████████████ audited. The calibr██████ table origin is ████████████ and ██████ not be ████████ without ██████████████ ████████████. 4.3. Exit code 847 ██████████ the presence of ████████████ ████████████ in the ████████ ██████. The ████████ of this ████████████ is ████████████. 5. Author's Note I built this protocol to characterize the rf0 stream. Four stages, each one defensible, each one standard signal processing. Shift is just bit rotation. Remap is just substitution. Align is just framing. Exec is where it ██████ apart. The output shouldn't ████████ the input. The exit code shouldn't ████ a value that ████████ the ████████ ████████████. The ██████ ████████ ████ ██ ████ ██████████ ████████. ██ ██████ ████ ████ ██████. 6. References [RF0] GC-0847, RF0-CR Device Specification, Gregory Alan Computing, Inc., 1987. [GREGD] gregd(8), GregOS Daemon Chain Manual, 2025. G. Alan October 2025 # See also: # /home/greg/doc/chain-notes.txt https://gregoryalan.com/home/greg/doc/chain-notes.txt # /dev/rf0 https://gregoryalan.com/dev/rf0