[Cryptography] Auditable logs?
Jerry Leichter
leichter at lrw.com
Mon Oct 27 06:17:59 EDT 2014
On Oct 26, 2014, at 10:01 PM, Matt Crawford <matt8128 at gmail.com> wrote:
>> Hash the data, timestamp it by publishing it widely and/or hash chaining it (git, Bitcoin blockchain, as well as various online trusted timestamping services etc).
>>
>> To protect the generation of the logs and this authencity, you'll need a trusted hardware platform, like with a TPM. Something which can enforce what software has access to what.
> Step right up to be the first prosecutor or expert witness to try to convince a jury.
That's what expert witnesses are for. Juries accept DNA evidence, which is technically much more complex than a hash chain.
(Of course, juries accept evidence from "trained experts" in what latter turns out to be pseudo-science and wishful thinking - like much bite analysis, for example. But that's a different problem.)
-- Jerry
More information about the cryptography
mailing list