How does the SHA-256 hash work?
A unique digital fingerprint that detects any tampering.
Every contract generates a SHA-256 hash computed over its content. If anyone modifies even a comma, the hash changes and verification fails.
The hash is deterministic: the same contract always yields the same hash, regardless of when or where the PDF is generated.