[Cryptography] Auditable logs?

Henry Baker hbaker1 at pipeline.com
Mon Oct 27 10:56:26 EDT 2014

At 07:01 PM 10/26/2014, Matt Crawford wrote:
>On Oct 26, 2014, at 8:22 PM, Natanael <natanael.l at gmail.com> wrote:
>> Hash the data, timestamp it by publishing it widely and/or hash chaining it (git, Bitcoin blockchain, as well as various online trusted timestamping services etc).
>> To protect the generation of the logs and this authencity, you'll need a trusted hardware platform, like with a TPM. Something which can enforce what software has access to what. 
>Step right up to be the first prosecutor or expert witness to try to convince a jury.

Juries believe those "time stamps" embedded into CCTV images all the time, because they look so official, with an individual serial number on each frame !

More information about the cryptography mailing list