09-17-2022 03:08 PM - edited 09-17-2022 03:29 PM
1. Two identities
In this method, users would directly connect and download binary packages but there are some log transparency servers, too. however, users will be forced to use an anonymizing tool like Tor to connect the log server to check their log with the log's server. This way it would be hard for some kind of split-view-attack
(Already, there is a monetized version of Tor and users could be forced to pay for that one)
2. Proof of Work blockchain
Use of Proof of Work blockchain (or its second layers) to store files' checksum. In this method, client can independently verify the difficulty of the blockchain it is viewing so it can assure if it is viewing an international powerful blockchain, therefore it does not need gossiping with other servers. For high gas fee problems, a second layer can be used. As money moves to Proof of stake blockchains, consider a blockchain that remains for binary transparency. binary transparency is enough important for firms to pay for miners.