Back when I first heard about this idea (a long time ago),
I wondered two things:
1. What about Haber and Stornetta's work (and patents)?
2. What's to stop me from setting up Sean's Discount Postmark Service,
where, each time unit, I collect document hashes from customers,
build a hash tree,
i guess it's appropriate that the world's deepest
hole is next to something labelled a trust territory :)
--Sean
:)
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL
Well, there's always the IBM 4758, which we built as a general-purpose
secure computer environment for hostile environments, with the ability
for on-device applications to prove to the outside world what they are
and where they're running.
IBM's been marketing it primarily as a crypto