cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Effective binary transparency methods

MahdiG
Making moves

1. Two identities

In this method, users would directly connect and download binary packages but there are some log transparency servers, too. however, users will be forced to use an anonymizing tool like Tor to connect the log server to check their log with the log's server. This way it would be hard for some kind of split-view-attack

(Already, there is a monetized version of Tor and users could be forced to pay for that one)

2. Proof of Work blockchain

Use of Proof of Work blockchain (or its second layers) to store files' checksum. In this method, client can independently verify the difficulty of the blockchain it is viewing so it can assure if it is viewing an international powerful blockchain, therefore it does not need gossiping with other servers. For high gas fee problems, a second layer can be used. As money moves to Proof of stake blockchains, consider a blockchain that remains for binary transparency. binary transparency is enough important for firms to pay for miners.

0 REPLIES 0