SERVER : Linux us-phx-web1140.main-hosting.eu 4.18.0-513.11.1.lve.el8.x86_64 #1 SMP Thu Jan 18 16:21:02 UTC 2024 x86_64
IP     : 147.79.120.79
PWD    : /home/u182381751/domains/cryptotokentracker.com/public_html

Name Type Actions
app Directory Rename | Remove
bootstrap Directory Rename | Remove
config Directory Rename | Remove
database Directory Rename | Remove
documentation Directory Rename | Remove
hooks Directory Rename | Remove
public Directory Rename | Remove
resources Directory Rename | Remove
revision-updates Directory Rename | Remove
routes Directory Rename | Remove
sitemap Directory Rename | Remove
storage Directory Rename | Remove
tests Directory Rename | Remove
vendor Directory Rename | Remove
.env File Edit | Rename | Remove
.htaccess File Edit | Rename | Remove
ads.txt File Edit | Rename | Remove
artisan File Edit | Rename | Remove
composer.json File Edit | Rename | Remove
default.php File Edit | Rename | Remove
index.php File Edit | Rename | Remove
qing.php File Edit | Rename | Remove
robots.txt File Edit | Rename | Remove
zj.zip File Edit | Rename | Remove
Note to Jeffrey Goldberg and all journalists: How to prove facts using blockchain | Opinion
Crypto Token Tracker logo Crypto Token Tracker logo
crypto.news 2025-04-05 14:15:49

Note to Jeffrey Goldberg and all journalists: How to prove facts using blockchain | Opinion

Disclosure: The views and opinions expressed here belong solely to the author and do not represent the views and opinions of crypto.news’ editorial. As the scandal continues to unfold and experts examine just how severely top officials have compromised US national security in that Signal chat leak —and embarrassed themselves through controversial post-statements—I want to take a closer look at one particular episode from the story. You might also like: As AI rewrites history, blockchain technology is a line of defense | Opinion At first, the White House denied that the chat ever existed. But when it became clear that there was too much evidence to refute, they shifted tactics, denying that the chat ever contained any classified information of national security significance. And indeed, what proof can journalist Jeffrey Goldberg present after leaving that chat? Moreover, the chat was set to self-destruct messages after a period of time. So imagine a court hearing where parties are required to present evidence, and the only available proof consists of screenshots—in other words, virtually nothing, as such evidence is almost impossible to verify. The answer is rather simple—if the journalist had taken care to properly preserve such evidence. He could prove that he had access to sensitive information at a time when he should not have, by publishing cryptographic hash sums of that information. Had he not been in the chat, he would not have known when and where they were planning to strike Yemen, who the target was, and so forth. Certain details may become public later, but not at the time the chat occurred—correct? The solution lies in a cryptographic method known as proof of existence without disclosure. It involves two basic elements: cryptographic hashes and reliable timestamps. This can be done on blockchain manually—if one knows the process—or through a variety of applications and services offering blockchain-based timestamping proofs. Here’s how it works: you write a message (for example, by copying and pasting from the chat), generate a hash sum of the message, publish it on a blockchain, and save the private key for the address used to publish it. You’ll later need this private key to prove that it was your address (i.e., you personally) that published the hash, and thus that you had knowledge of the original message at that time. A social media account might also serve a similar function, but remember that social platforms are centralised systems—vulnerable and, unlike blockchains, not immutable. So, there it is—a note for all journalists who may one day need to prove the existence of a fact without revealing its contents. Process diagram: Proof of existence using blockchain | Source: Courtesy of the author This process creates an undeniable, timestamped record confirming that a specific original message existed and was known to the publisher at the time the blockchain transaction was confirmed—all without revealing the content publicly until the journalist chooses to do so. Read more: Beyond consensus: Transaction privacy is blockchain’s next security frontier | Opinion

Read the Disclaimer : All content provided herein our website, hyperlinked sites, associated applications, forums, blogs, social media accounts and other platforms (“Site”) is for your general information only, procured from third party sources. We make no warranties of any kind in relation to our content, including but not limited to accuracy and updatedness. No part of the content that we provide constitutes financial advice, legal advice or any other form of advice meant for your specific reliance for any purpose. Any use or reliance on our content is solely at your own risk and discretion. You should conduct your own research, review, analyse and verify our content before relying on them. Trading is a highly risky activity that can lead to major losses, please therefore consult your financial advisor before making any decision. No content on our Site is meant to be a solicitation or offer.