Someone needs to have verified the decrypted file hash before. Could be the merkle root of a torrent file for example, or some other well-known data (like the Blockchain).

Reply to this note

Please Login to reply.

Discussion

No replies yet.