On Tue, Nov 15, 2016 at 2:49 PM, Ben Laurie <[email protected]> wrote: > Eran asked me to briefly describe how redaction in a transparency log > would work. > > First, we introduce a new leaf type, "Redacted". The content of this > leaf is simply the hash of the original leaf, the entry number of the > redaction reason entry (see below) and a signature over the content by > the log key. > > Rather than hashing this entry, verifiers simply use the enclosed hash > to calculate the tree hash. > > Secondly, we introduce a second new leaf type, "Redaction reason". > This leaf contains two things: the entry number of the redacted entry > and a textual explanation of why it was redacted (possibly we need to > get a little more elaborate here, but perhaps the simplest thing to do > is to allow it to include URLs to point to any supporting material). > This leaf type would be hashed in the usual way. > > Observers of the log can verify that every redacted entry has a > corresponding redaction reason entry, and if not, can produce proof it > does not (this is why the redacted entry has to be signed directly). > > Note that the redacted entry could not include the entry number of the > redaction reason, if preferred, though that would force an observer of > that entry to download the whole log to verify the reason and also > would make proof of non-compliance bulky. :-) >
I decided I had to do something of this sort in the Mesh notary log. It is probably a good idea to do it as a matter of course. Lets consider the general case for a moment, what happens if someone puts some child pornography into the log. Obviously you can't publish it or you go to jail. So you have to take it out which breaks the log. So either you have to devise a scheme that you are certain cannot be used to publish abusive material or you have to have a way to suppress it either. I think the second approach is better. Of course putting bad stuff in a Trans log would be a lot more effort than putting it into the blockchain or the like. But don't think it is impossible. I have a few attacks that are worrying enough not to want to share in public. The sort of thing that has Special Branch making house calls. So I would hash the received data values before enrolling the hash in the notary log as a matter of course.
_______________________________________________ Trans mailing list [email protected] https://www.ietf.org/mailman/listinfo/trans
