I guess this can only be solved by someone attesting to the validity of that particular decrypted file hash. It must be public knowledge / well-known. Very similar to how torrents work though, so it seems to be fine.

Reply to this note

Please Login to reply.

Discussion

No replies yet.