yes, nostr allows back dating but you can instead require anchoring to a chain of events with multiple other events and spoofing that provenance is impossible.

the thing about AI is not going to go away, it's only going to get worse. provenance is going to get really important. cryptography is the solution. an infallible witness of causality.

Reply to this note

Please Login to reply.

Discussion

This chain of events sounds like something else I heard about trying to prove new laptop hardware. Apparently there is a TPM chip and then they build chains of private/public keys of the different hardware components. software measurements on boot up match the private key. It still needs like a manager private key to be provided by manufacturer or something.

yeah, TPM works like that. it also has little enclaves for storing secrets and such as well to prevent malicious programs being able to access the memory where the keys are stored, usually they also have some signature capabilities as well, but probably not gonna support BIP-340 schnorr signatures