-
Notifications
You must be signed in to change notification settings - Fork 40
Open
Description
Context: There are a variety of models, standards and services for secure / verifiable / trusted timestamp protocols such as
- RFC 3161 - Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)
- PGP Digital Timestamping Service
- OriginStamp
- Various blockchains
- Etc....
But Keybase also provides visible timestamps on chats, and timestamps other content in a variety of ways.
So how does Keybase stack up as a trusted timestamp service? I've searched the documentation that seemed relevant and see no discussion of this.
- What guarantees are there on the validity of timestamps? Are they generated based on clocks on on local devices, or checked for being in sequence with nearby chat messages, or ??
- Are there ways for users to subvert the timestamps of their own content, and pre- or post-date it? (E.g. deleting a public object such that Keybase or archived data can't be used to document its data and existence in the future, or modifying a timestamp?)
- At what granularity might someone be able to prove a given timestamp?
- How can timestamps on kbfs files, proofs, signatures and other content be conveniently uncovered by users, and related guarantees on validity, granularity etc be communicated?
- What denial of service attacks are there? Can I publish something in a way that a timestamp on it is guaranteed to be verifiable, even if the Keybase server goes away some day or tries to violate any of these guarantees?
Issue: Can you answer these sorts of questions in the Keybase documentation, or point to existing answers?
Reference use case: I've been looking for public, easy-to-verify timestamps for a long time, and posted this example use case focused on publication and auditing of election results in 2010:
xgess
Metadata
Metadata
Assignees
Labels
No labels