HYDRA mutation chain — each token mutation ratchets a SHA3-256 hash chain.
This provides Post-Compromise Security (PCS): a stolen token becomes
invalid once the legitimate holder advances the chain.
KOLMOGOROV entropy certification: verify that a byte slice is “sufficiently random”
by checking that no 4-byte pattern repeats more than a statistical threshold.
Real randomness test: run-length compression ratio must be > 0.85.