Here we provide some useful examples.
Example hash digests produced using Toolkit Bay BLAKE2b-256 tool.
This is a fun example for a first constitution from Ryan.
File: ryan-constitution
Hosted at (to go onchain): ipfs://bafkreida43nd62yu4vl6czo7hcc7wecxgjdsnphzlg2i6daii5q4ai6npi
Blake2b-256 hash digest (to go onchain): 55b35f81de519b320da15a4f1faf6b9cfe0cf18cf6daa320224ebb1a924d2986
Example rendered: ryan-rendered.png
Hosted document via a IPFS https gateway: https://bafkreiggjdt7kxsohnewkcligixppzkccmsqv4lljpy7d65djtfaxqkzxm.ipfs.w3s.link
This is an example 5th generational constitution, which is malicious.
File: malicious-constitution
Hosted at (to go onchain): ipfs://bafkreiggjdt7kxsohnewkcligixppzkccmsqv4lljpy7d65djtfaxqkzxm
Blake2b-256 hash digest (to go onchain): 6a246e447f0e03a065666394121696ee5fb61a6289dc20029279622ee2d2622d
Example rendered: malicious-rendered.png
Hosted document via a IPFS https gateway: https://bafkreida43nd62yu4vl6czo7hcc7wecxgjdsnphzlg2i6daii5q4ai6npi.ipfs.dweb.link/