Hacker News new | past | comments | ask | show | jobs | submit login

You can certainly claim something is centralized and tamper-evident. ie demonstrate proof that something has not been mutated over time.

See RFC6962 Certificate Transparency logs and their consistency proofs for a widely used example.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: