{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2025:ZGLP37XF6KDDRF4P2G7FWCE67J","short_pith_number":"pith:ZGLP37XF","canonical_record":{"source":{"id":"2509.13316","kind":"arxiv","version":4},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CL","submitted_at":"2025-09-16T17:59:04Z","cross_cats_sorted":["cs.LG"],"title_canon_sha256":"91e1e145ceb946c9885a5eab80de9832eb57acc4f3538b326acda3d1b5fcb10c","abstract_canon_sha256":"1035edc7ab951531302b200c86cd643f8fa001acae8f7392d04f44cca60c4b37"},"schema_version":"1.0"},"canonical_sha256":"c996fdfee5f28638978fd1be5b089efa591fedbbebbfe32b711134205ea02b4c","source":{"kind":"arxiv","id":"2509.13316","version":4},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2509.13316","created_at":"2026-05-18T02:44:33Z"},{"alias_kind":"arxiv_version","alias_value":"2509.13316v4","created_at":"2026-05-18T02:44:33Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2509.13316","created_at":"2026-05-18T02:44:33Z"},{"alias_kind":"pith_short_12","alias_value":"ZGLP37XF6KDD","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_16","alias_value":"ZGLP37XF6KDDRF4P","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_8","alias_value":"ZGLP37XF","created_at":"2026-05-18T12:33:37Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2025:ZGLP37XF6KDDRF4P2G7FWCE67J","target":"record","payload":{"canonical_record":{"source":{"id":"2509.13316","kind":"arxiv","version":4},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CL","submitted_at":"2025-09-16T17:59:04Z","cross_cats_sorted":["cs.LG"],"title_canon_sha256":"91e1e145ceb946c9885a5eab80de9832eb57acc4f3538b326acda3d1b5fcb10c","abstract_canon_sha256":"1035edc7ab951531302b200c86cd643f8fa001acae8f7392d04f44cca60c4b37"},"schema_version":"1.0"},"canonical_sha256":"c996fdfee5f28638978fd1be5b089efa591fedbbebbfe32b711134205ea02b4c","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T02:44:33.287739Z","signature_b64":"Ng5b2ZUUgfLaGGIqulCdkAvUAQNhRWLIbqoQFWWfHPYempyPlbOM6R6sPPf63bnnvA4cQv32kemriy227o1jDQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"c996fdfee5f28638978fd1be5b089efa591fedbbebbfe32b711134205ea02b4c","last_reissued_at":"2026-05-18T02:44:33.287300Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T02:44:33.287300Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"2509.13316","source_version":4,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T02:44:33Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Xx1joANmbnsg7SjmJwpnMi0LtgA85AK0ibB0kLYS7LCZMHHDYpKtEb+yBUUPcoycPUcDx4wHPqKsCSi2zP9oAQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T11:06:27.378471Z"},"content_sha256":"136d5ef730841a0566fcda8c9941ebab35b01efc7481b53fa34a7f873338325c","schema_version":"1.0","event_id":"sha256:136d5ef730841a0566fcda8c9941ebab35b01efc7481b53fa34a7f873338325c"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2025:ZGLP37XF6KDDRF4P2G7FWCE67J","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Do Activation Verbalization Methods Convey Privileged Information?","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.LG"],"primary_cat":"cs.CL","authors_text":"Alberto Mario Ceballos Arroyo, Byron C. Wallace, Giordano Rogers, Millicent Li, Naomi Saphra","submitted_at":"2025-09-16T17:59:04Z","abstract_excerpt":"Recent interpretability methods have proposed to translate LLM internal representations into natural language descriptions using a second verbalizer LLM. This is intended to illuminate how the target model represents and operates on inputs. But do such activation verbalization approaches actually provide privileged knowledge about the internal workings of the target model, or do they merely convey information about the inputs provided to it? We critically evaluate popular verbalization methods and datasets used in prior work and find that one can perform well on such benchmarks without access "},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2509.13316","kind":"arxiv","version":4},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T02:44:33Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"T1v8pIgzPXjoUsK1XVkvEbLZDtjPz/NBXJcpkp9/8/JxRHiXm8N7mV4LEtEomm4cOkeKtaFOEm3hIhDY9OUEDQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T11:06:27.378821Z"},"content_sha256":"72d1b1a7a93727362937fd001d06cfbdccc00142ddc619dd3e8c1256b73f758e","schema_version":"1.0","event_id":"sha256:72d1b1a7a93727362937fd001d06cfbdccc00142ddc619dd3e8c1256b73f758e"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/ZGLP37XF6KDDRF4P2G7FWCE67J/bundle.json","state_url":"https://pith.science/pith/ZGLP37XF6KDDRF4P2G7FWCE67J/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/ZGLP37XF6KDDRF4P2G7FWCE67J/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T11:06:27Z","links":{"resolver":"https://pith.science/pith/ZGLP37XF6KDDRF4P2G7FWCE67J","bundle":"https://pith.science/pith/ZGLP37XF6KDDRF4P2G7FWCE67J/bundle.json","state":"https://pith.science/pith/ZGLP37XF6KDDRF4P2G7FWCE67J/state.json","well_known_bundle":"https://pith.science/.well-known/pith/ZGLP37XF6KDDRF4P2G7FWCE67J/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2025:ZGLP37XF6KDDRF4P2G7FWCE67J","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"1035edc7ab951531302b200c86cd643f8fa001acae8f7392d04f44cca60c4b37","cross_cats_sorted":["cs.LG"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CL","submitted_at":"2025-09-16T17:59:04Z","title_canon_sha256":"91e1e145ceb946c9885a5eab80de9832eb57acc4f3538b326acda3d1b5fcb10c"},"schema_version":"1.0","source":{"id":"2509.13316","kind":"arxiv","version":4}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2509.13316","created_at":"2026-05-18T02:44:33Z"},{"alias_kind":"arxiv_version","alias_value":"2509.13316v4","created_at":"2026-05-18T02:44:33Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2509.13316","created_at":"2026-05-18T02:44:33Z"},{"alias_kind":"pith_short_12","alias_value":"ZGLP37XF6KDD","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_16","alias_value":"ZGLP37XF6KDDRF4P","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_8","alias_value":"ZGLP37XF","created_at":"2026-05-18T12:33:37Z"}],"graph_snapshots":[{"event_id":"sha256:72d1b1a7a93727362937fd001d06cfbdccc00142ddc619dd3e8c1256b73f758e","target":"graph","created_at":"2026-05-18T02:44:33Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Recent interpretability methods have proposed to translate LLM internal representations into natural language descriptions using a second verbalizer LLM. This is intended to illuminate how the target model represents and operates on inputs. But do such activation verbalization approaches actually provide privileged knowledge about the internal workings of the target model, or do they merely convey information about the inputs provided to it? We critically evaluate popular verbalization methods and datasets used in prior work and find that one can perform well on such benchmarks without access ","authors_text":"Alberto Mario Ceballos Arroyo, Byron C. Wallace, Giordano Rogers, Millicent Li, Naomi Saphra","cross_cats":["cs.LG"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CL","submitted_at":"2025-09-16T17:59:04Z","title":"Do Activation Verbalization Methods Convey Privileged Information?"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2509.13316","kind":"arxiv","version":4},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:136d5ef730841a0566fcda8c9941ebab35b01efc7481b53fa34a7f873338325c","target":"record","created_at":"2026-05-18T02:44:33Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"1035edc7ab951531302b200c86cd643f8fa001acae8f7392d04f44cca60c4b37","cross_cats_sorted":["cs.LG"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CL","submitted_at":"2025-09-16T17:59:04Z","title_canon_sha256":"91e1e145ceb946c9885a5eab80de9832eb57acc4f3538b326acda3d1b5fcb10c"},"schema_version":"1.0","source":{"id":"2509.13316","kind":"arxiv","version":4}},"canonical_sha256":"c996fdfee5f28638978fd1be5b089efa591fedbbebbfe32b711134205ea02b4c","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"c996fdfee5f28638978fd1be5b089efa591fedbbebbfe32b711134205ea02b4c","first_computed_at":"2026-05-18T02:44:33.287300Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T02:44:33.287300Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"Ng5b2ZUUgfLaGGIqulCdkAvUAQNhRWLIbqoQFWWfHPYempyPlbOM6R6sPPf63bnnvA4cQv32kemriy227o1jDQ==","signature_status":"signed_v1","signed_at":"2026-05-18T02:44:33.287739Z","signed_message":"canonical_sha256_bytes"},"source_id":"2509.13316","source_kind":"arxiv","source_version":4}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:136d5ef730841a0566fcda8c9941ebab35b01efc7481b53fa34a7f873338325c","sha256:72d1b1a7a93727362937fd001d06cfbdccc00142ddc619dd3e8c1256b73f758e"],"state_sha256":"a325bf796ab508baf29b387ac5ef96f9ea55304b7b7082726d86d1d163e5d175"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"QmKiKpk39N71K0Id4FxawM1tv/uaUJy84C9Ns8no3rAjo26m5lV+wlqmLchfymcfZ4XVX8LSnDZPN+c583zjAg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T11:06:27.380820Z","bundle_sha256":"a660a2ae69efc3198271899267e77e0e1b526f704487b20dd78c8206c1b77035"}}