logoalt Hacker News

sublimefiretoday at 6:30 PM1 replyview on HN

Dunno, IMO you need to know the bits of what operator is running to fully trust the third party, eg run in an enclave and share attestation evidence and the source code. Otherwise, operator can just mimic the appearance of the log.


Replies

FiloSottiletoday at 6:38 PM

No, the point of the Merkle tree inclusion proofs and of the witness cosignatures is precisely that the operator can't show a different view of the log to different parties.