Approaches using traditional notarization services would rely on trusted counterparties and require complex operational processes, implying higher costs and risks.
Trustless timestamping creates proofs of integrity and time certainty over data. This proofs could be used to satisfy regulatory requirements such the ones asked from Dodd-Frank.
I found a two-year-old snapshot of the defendant’s website on a public archiving service, but how do I know if has been forged today?
I need to install this two-year-old software package to recover old records, but the developer revoked their PGP key six months ago - apparently their laptop got stolen. How do I know I’m getting the real thing? Stolen keys could be used to create backdated signature!
Our colocation centre informed us that someone broke into the cage the backend servers are located in last night; the last off-site backups were a week ago. The auditors want to know which records the intruders might have changed after they broke in. What do I tell them?
Tech or Social