Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Could you elaborate precisely how this scheme works to stop a company claiming reports are duplicates when they’re not?


If it was a duplicate they would be able to show how the hash of the duplicate report was already in the tree. For more information you might want to read about Merkel proofs. For example here: https://www.quora.com/Cryptography-How-does-a-Merkle-proof-a...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: