[Cryptography] Auditable logs?

Jerry Leichter leichter at lrw.com
Mon Oct 27 06:17:59 EDT 2014


On Oct 26, 2014, at 10:01 PM, Matt Crawford <matt8128 at gmail.com> wrote:
>> Hash the data, timestamp it by publishing it widely and/or hash chaining it (git, Bitcoin blockchain, as well as various online trusted timestamping services etc).
>> 
>> To protect the generation of the logs and this authencity, you'll need a trusted hardware platform, like with a TPM. Something which can enforce what software has access to what. 
> Step right up to be the first prosecutor or expert witness to try to convince a jury.
That's what expert witnesses are for.  Juries accept DNA evidence, which is technically much more complex than a hash chain.

(Of course, juries accept evidence from "trained experts" in what latter turns out to be pseudo-science and wishful thinking - like much bite analysis, for example.  But that's a different problem.)
                                                        -- Jerry



More information about the cryptography mailing list