I believe an image or video is sent along with a public key or hash of some kind, and you then run a computation yourself that the public key of the user with the data (video or image data) and check it matches the hash

Reply to this note

Please Login to reply.

Discussion

No replies yet.