Disclosure: The opinions and opinions expressed right here belong to the authors solely and don’t characterize the views or opinions of the crypto.information editorial.
Because the scandal continues to unfold and consultants take a look at how they strictly compromise our nationwide safety with its sign chat leaks and disgrace themselves by controversial post-statements, I wish to take a better take a look at one explicit episode of the story.
You would possibly prefer it too: When AI rewrites historical past, blockchain know-how is a line of protection | Opinion
Initially, the White Home denied that chats existed. Nevertheless, when it turned clear that there was an excessive amount of proof to refute, they modified their ways and denied that the chat contained delicate details about the significance of nationwide safety. And definitely, what proof can journalist Jeffrey Goldberg give after leaving that chat? Moreover, chats have been set to self-destruct messages after a sure time period. Due to this fact, think about a court docket listening to the place the events must current proof. The one accessible proof is screenshots, that’s, just about nothing. Such proof is nearly inconceivable to confirm.
The reply is fairly easy. If journalists have been cautious to correctly protect such proof. He was capable of show that he may entry delicate info when he shouldn't have by publishing the hash complete of the encryption of that info. If he hadn't been within the chat, he would have by no means recognized when and the place he had deliberate to assault Yemen. Sure particulars could also be printed later, however is it appropriate when the chat happens?
The answer lies in encryption strategies often called proof of existence with out disclosure. This contains two fundamental components: encryption and trusted timestamps. This may be finished manually on the blockchain (if you recognize the method) or by quite a lot of purposes and companies that present proof of blockchain-based timestamps.
Right here's how the perform works: Write a message (for instance, copy and paste from chat), generate a hash complete for the message, publish it on the blockchain, and retailer the personal key of the tackle used to publish it. Later, you want this personal key to show that it was your tackle (i.e. you personally) that printed the hash, and subsequently you could show that you just had information of the unique message at the moment. Social media accounts could carry out related features, however don't neglect that social platforms are centralized methods.
So, it's – watch out for all journalists who must show the existence of info someday with out revealing their content material.

Course of Diagram: Proof of existence utilizing blockchain | Supply: Offered by the writer
This course of creates a report of plain timestamps that affirm {that a} explicit unique message exists and is thought to the writer on the time the blockchain transaction is confirmed. This didn't publish every little thing till the journalists selected to take action.
learn extra: Past Consensus: Transaction Privateness is the subsequent safety frontier in blockchain | Opinion