Hacker News new | past | comments | ask | show | jobs | submit login

The answer is mostly in the link I gave you. Here's an implementation:

http://www.surety.com/digital-copyright-protection/prove-own...

You publish the hash chains with signature in places you can't retract. They use New York Times for instance. Far as their sigs, they can use one or more HSM's. One or more atomic clocks plus high-quality NTP for timing. Open-source client checks all of it right after it happens, maybe keeping local copy. Every other aspect is just standard INFOSEC.

I dont have time to answer the last question right now. Off to work. :(




But the last one is the most interesting to finally be able to trust the results. It's the same problem as faced in distributed systems, but in, say, NoSQL databases I haven't heard anyone consider the possibility of 4 of 6 members of a quorum to be undermined, and how to detect that.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: