[Cryptography] Auditable logs?

Matt Crawford matt8128 at gmail.com
Sun Oct 26 22:01:24 EDT 2014

> Den 27 okt 2014 01:59 skrev "Sandy Harris" <sandyinchina at gmail.com>:
> >
> > Various computer-mediated activities may end up in court for a range
> > of reasons and in many cases log files  will be used as evidence.
> > [...]

On Oct 26, 2014, at 8:22 PM, Natanael <natanael.l at gmail.com> wrote:
> Hash the data, timestamp it by publishing it widely and/or hash chaining it (git, Bitcoin blockchain, as well as various online trusted timestamping services etc).
> To protect the generation of the logs and this authencity, you'll need a trusted hardware platform, like with a TPM. Something which can enforce what software has access to what. 

Step right up to be the first prosecutor or expert witness to try to convince a jury.

More information about the cryptography mailing list