It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
The first time I heard about blockchains was at a party where a friend of mine spent the night talking my ear off about this thing called Bitcoin and why I ought to buy some. I suspect that many others have had a similar experience. Although Bitcoin can be credited with bringing blockchains—a type of distributed digital ledger—into popular discourse, it wasn’t the progenitor of the obscure technology’s key features. In fact, the world’s oldest blockchain predates Bitcoin by 13 years and it’s been hiding in plain sight, printed weekly in the classified section of one of the world’s most widely circulated newspapers: The New York Times. The world’s first blockchain At its core, a blockchain is just a database that is maintained by a network of users and secured through cryptography. When new information is added to the database it is parceled in “blocks,” which can be thought of as containers for this data. Every so often a new block is created and linked to a “chain” of previously created blocks. Each block has a unique ID called a hash that is created by running the ID of the block that preceded it and the data stored in the current block through a cryptographic algorithm. This ensures the integrity of all the data stored on the blockchain because altering the data in any block would produce a different hash.
a friend of mine spent the night talking my ear off about this thing called Bitcoin and why I ought to buy some. I suspect that many others have had a similar experience.
Surety’s main product is called “AbsoluteProof” that acts as a cryptographically secure seal on digital documents. Its basic mechanism is the same described in Haber and Stornetta’s original paper. Clients use Surety’s AbsoluteProof software to create a hash of a digital document, which is then sent to Surety’s servers where it is timestamped to create a seal. This seal is a cryptographically secure unique identifier that is then returned to the software program to be stored for the customer.
At the same time, a copy of that seal and every other seal created by Surety’s customers is sent to the AbsoluteProof “universal registry database,” which is a “hash-chain” composed entirely of Surety customer seals. This creates an immutable record of all the Surety seals ever produced, so that it is impossible for the company or any malicious actor to modify a seal. But it leaves out an important part of the blockchain equation: Trustlessness. How can anyone trust that Surety’s internal records are legi
Instead of posting customer hashes to a public digital ledger, Surety creates a unique hash value of all the new seals added to the database each week and publishes this hash value in the New York Times. The hash is placed in a small ad in the Times classified section under the heading “Notices & Lost and Found” and has appeared once a week since 1995.
originally posted by: BlueShaman
a friend of mine spent the night talking my ear off about this thing called Bitcoin and why I ought to buy some. I suspect that many others have had a similar experience.
Yes... and I kick myself daily for not following his advice.
originally posted by: theantediluvian
a reply to: Groot
These three paragraphs explain the whole thing fairly succinctly:
Surety’s main product is called “AbsoluteProof” that acts as a cryptographically secure seal on digital documents. Its basic mechanism is the same described in Haber and Stornetta’s original paper. Clients use Surety’s AbsoluteProof software to create a hash of a digital document, which is then sent to Surety’s servers where it is timestamped to create a seal. This seal is a cryptographically secure unique identifier that is then returned to the software program to be stored for the customer.
At the same time, a copy of that seal and every other seal created by Surety’s customers is sent to the AbsoluteProof “universal registry database,” which is a “hash-chain” composed entirely of Surety customer seals. This creates an immutable record of all the Surety seals ever produced, so that it is impossible for the company or any malicious actor to modify a seal. But it leaves out an important part of the blockchain equation: Trustlessness. How can anyone trust that Surety’s internal records are legi
Instead of posting customer hashes to a public digital ledger, Surety creates a unique hash value of all the new seals added to the database each week and publishes this hash value in the New York Times. The hash is placed in a small ad in the Times classified section under the heading “Notices & Lost and Found” and has appeared once a week since 1995.
So basically a cryptographic hash is the result of a one-way function, that is easy to do on inputs but hard to reverse from the output to obtain the input. Take for instance the following text: "This is incredibly imaginative test text."
Run that through a bcrypt hash generator like this one and you'll get a hash like so (in fact if you keep submitted the form, you'll notice you get a different hash each time):
$2y$12$LR1ZvhjLAItskUGsj2vMn.YO5mVRjlDHooC3psuax3zKgPf3DC9Hu
You can't take one of the outputted hashes and run it through a reverse algorithm to get the original. (technically, only the last 24 bytes are the bash64 hash but that's irrelevant to the concept) What you can do however is verify the original input against the resulting hash. And if one single character has changed, it will not verify.
So basically, you can generate a hash of something, say a document, and then publish it. And if at some later date somebody with a copy of that document wants to verify that it is exactly what you had when you generated the hash, they could verify it against the published hash.
Essentially, they do something like this for their clients. The customer sends the hash, they add the timestamp for when it was sent and create a virtual "seal" which they then encrypt and store on their servers. The problem becomes that somebody could manipulate their database, replacing a stored "seal" with a their own, with a bogus timestamp or hash.
So what they do is make a hash of the "seals" in their database and then publish it weekly in the NYT so it's out there in the public record. If somebody changed one of the stored "seals" then the database couldn't be verified against the hash.
They're not wrong, it does serve the same purposes as a blockchain.