[Cryptography] Auditable logs?
matt8128 at gmail.com
Sun Oct 26 22:01:24 EDT 2014
> Den 27 okt 2014 01:59 skrev "Sandy Harris" <sandyinchina at gmail.com>:
> > Various computer-mediated activities may end up in court for a range
> > of reasons and in many cases log files will be used as evidence.
> > [...]
On Oct 26, 2014, at 8:22 PM, Natanael <natanael.l at gmail.com> wrote:
> Hash the data, timestamp it by publishing it widely and/or hash chaining it (git, Bitcoin blockchain, as well as various online trusted timestamping services etc).
> To protect the generation of the logs and this authencity, you'll need a trusted hardware platform, like with a TPM. Something which can enforce what software has access to what.
Step right up to be the first prosecutor or expert witness to try to convince a jury.
More information about the cryptography