Pages:
Author

Topic: use blockchain for proof in court? (Read 2476 times)

sr. member
Activity: 476
Merit: 250
April 01, 2012, 11:20:00 AM
#33

is this implemented anywhere? the paper blows my brains out just by looking at it.

you can use it in the way described in proof of concept, but it burns money. I will implement it in a month or two as part of my thesis, however.

and offer some publicly accessible service with it?

website forms for submission/verification, most likely.
legendary
Activity: 1708
Merit: 1020
April 01, 2012, 10:59:24 AM
#32

is this implemented anywhere? the paper blows my brains out just by looking at it.


you can simply register a name of up to 253 characters with namecoin. timestamping - piece of cake.
sr. member
Activity: 462
Merit: 250
April 01, 2012, 06:38:34 AM
#31
mila, btc_bear: you are discussing "blockchain in court" in more general terms than the OP asked for, correct?

because using it to prove some data has existed before time x does not involve ownership of keys and such, since it doesn't matter who inserted the hash, right?

https://bitcointalksearch.org/topic/m.829561
well, ^^ here I was returning from the general topic detour if that link between a file and its timestamp would stand in court. got confused by the reply (forgo the proof unless answering qui bono) and thought about the seti@blockchain for a while but was unable to contribute to the talk.
I mean finding a hash of anything useful in the blockchain should be harder than finding a blockchain (unless I have the file, know which function to use to get its hash and the method how it's encoded in the blockchain).

so refocusing back to OP, I think it is a proof. while a use of a commercial authority to provide something like XAdES-T (signature with certified timestamp) could be easier to justify in a court, blockchain would do basically the same without revealing who made the request in the first place
donator
Activity: 2772
Merit: 1019
April 01, 2012, 06:28:33 AM
#30
mila, btc_bear: you are discussing "blockchain in court" in more general terms than the OP asked for, correct?

because using it to prove some data has existed before time x does not involve ownership of keys and such, since it doesn't matter who inserted the hash, right?
donator
Activity: 2772
Merit: 1019
April 01, 2012, 06:22:46 AM
#29

is this implemented anywhere? the paper blows my brains out just by looking at it.

you can use it in the way described in proof of concept, but it burns money. I will implement it in a month or two as part of my thesis, however.

and offer some publicly accessible service with it?
vip
Activity: 490
Merit: 271
March 31, 2012, 06:25:41 PM
#28
Quote
Why it's there, who's benefit it is I don't discuss. Would the link between the file and it's fingerprint in blockchain stand?

Forgoing the former as that is back to intent and purpose, the latter can be done within a mathematical certainty if the chain is verified as being correct. (The actual current chain in use and not an alt or forked chain) Even without timestamps, the blocks occur approximately every 10 min on average so one could give an approximate time frame with only the time of the first block being confirmed.


btw: Files have been encoded into the blockchain. But with time, no encoding would be necessary as the data will be there. One could just write a program to pick out the data necessary to create a file.  Simple example: Rather than encode 'Hello World', just find an ascii equivalent in the chain and point the reader to those addresses to decode. Hence, someone else unintentionally encoded the message, the reader just picks the right address to produce the desired message/file. Granted this is easier for simple messages and very difficult for harder messages or images but possible.

IMO


kjj
legendary
Activity: 1302
Merit: 1026
March 31, 2012, 06:20:31 PM
#27
I'm willing to further discuss and finally probably also to agree that an indisputable link between a person and a transaction can not be established (issues with copies, backups, ...).
But (and I quote OP here) I would continue to argue that a hash of a digital file (a photo in this case) can be found in the blockchain and also that it can be proven when it has been included in the blockchain.

Why it's there, who's benefit it is I don't discuss. Just the fact that it's there and when it was included. Would the link between the file and it's fingerprint in blockchain stand?

Exactly right.

Unless one or more of the major functions used by bitcoin is seriously broken, then the existence of the hash in the block chain would easily and convincingly prove that the document existed prior to the timestamp on the block (more or less) and that it has not been modified since then.

It could still have been modified prior to being hashed, and it could have existed for a long time prior to being included, and anyone in the world could have posted it.  But it existed, in that form, at that time, and you can prove it.
sr. member
Activity: 462
Merit: 250
March 31, 2012, 06:11:30 PM
#26
Can I put a hash of a photo into the blockchain and use it later in court to prove that particular photo was taken before time x?

I posted private keys in semi-public forum to challenge users to grab a bitcoin and then refilled the address to see how fast they notice and grab it again. I have even no idea how many wallets have now that key. but that was intended and I would not use that key to exercise any kind of serious TX (like writing to blockchain for future use in court should be)

Then I think we agree that it is a bad idea to try to use it in court. As one can foresee the Prosecution telling the Jury only the defendant could send the money/msg. Then 'someone' else uses a copy of the wallet/private key to send money/msg and destroy the prosecution's case.

I'm willing to further discuss and finally probably also to agree that an indisputable link between a person and a transaction can not be established (issues with copies, backups, ...).
But (and I quote OP here) I would continue to argue that a hash of a digital file (a photo in this case) can be found in the blockchain and also that it can be proven when it has been included in the blockchain.

Why it's there, who's benefit it is I don't discuss. Just the fact that it's there and when it was included. Would the link between the file and it's fingerprint in blockchain stand?

edit: but my initial argument in this tread, you disproved it
vip
Activity: 490
Merit: 271
March 31, 2012, 05:51:09 PM
#25
@BTC_bear very interesting questions, thought provoking. I'd start with a claim that private keys are secrets and that TX1 and TX2 could only be initiated by a person(s) with knowledge of the keys to sign ... and here are the keys.


Thanx.

 Just pointing out that private keys in no way ties it to a single entity or person even. A person's computer might have been compromised, or even by intent more than one person might have a copy of the private keys. I know of one business entity that does this. In fact, the QT Client does this.

Supposedly there are 3 persons with the ability to send a message to the client. (Gavin, Theymos, and Satoshi) Who sent the recent message to the clients about the security update?
 

I posted private keys in semi-public forum to challenge users to grab a bitcoin and then refilled the address to see how fast they notice and grab it again. I have even no idea how many wallets have now that key. but that was intended and I would not use that key to exercise any kind of serious TX (like writing to blockchain for future use in court should be)

the above example of a collective knowledge (especially the keys from bitcoin message function), I assume the key has been changed so Satoshi no longer knows it, unless Gavin and Theymos are married to each other, they should be able to testify against each other. If the key is the same since project inception, then it might be a problem if both deny writing that message and Satoshi would not show up in court.

I have multiple pgp keys and I share some of them willingly and proactively (cyber last will, trusted friends hold copies to settle my affairs in case of brain damage or death) but I still consider them as personal and do all I can to keep them safe and secret. some of the keys have even my name in them : )



Then I think we agree that it is a bad idea to try to use it in court. As one can foresee the Prosecution telling the Jury only the defendant could send the money/msg. Then 'someone' else uses a copy of the wallet/private key to send money/msg and destroy the prosecution's case.


sr. member
Activity: 462
Merit: 250
March 31, 2012, 05:35:23 PM
#24
@BTC_bear very interesting questions, thought provoking. I'd start with a claim that private keys are secrets and that TX1 and TX2 could only be initiated by a person(s) with knowledge of the keys to sign ... and here are the keys.


Thanx.

 Just pointing out that private keys in no way ties it to a single entity or person even. A person's computer might have been compromised, or even by intent more than one person might have a copy of the private keys. I know of one business entity that does this. In fact, the QT Client does this.

Supposedly there are 3 persons with the ability to send a message to the client. (Gavin, Theymos, and Satoshi) Who sent the recent message to the clients about the security update?
 

I posted private keys in semi-public forum to challenge users to grab a bitcoin and then refilled the address to see how fast they notice and grab it again. I have even no idea how many wallets have now that key. but that was intended and I would not use that key to exercise any kind of serious TX (like writing to blockchain for future use in court should be)

the above example of a collective knowledge (especially the keys from bitcoin message function), I assume the key has been changed so Satoshi no longer knows it, unless Gavin and Theymos are married to each other, they should be able to testify against each other. If the key is the same since project inception, then it might be a problem if both deny writing that message and Satoshi would not show up in court.

I have multiple pgp keys and I share some of them willingly and proactively (cyber last will, trusted friends hold copies to settle my affairs in case of brain damage or death) but I still consider them as personal and do all I can to keep them safe and secret. some of the keys have even my name in them : )
sr. member
Activity: 476
Merit: 250
March 31, 2012, 05:29:56 PM
#23

I'll do my best. It's actually pretty straightforward to implement (especially using something like bitcoinj), but there's so much (non-bitcoin related) stuff to be done alongside that... Smiley


Like what, design?

no no, a few other totally unrelated projects.
legendary
Activity: 1078
Merit: 1000
Charlie 'Van Bitcoin' Shrem
March 31, 2012, 05:26:26 PM
#22

is this implemented anywhere? the paper blows my brains out just by looking at it.

you can use it in the way described in proof of concept, but it burns money. I will implement it in a month or two as part of my thesis, however.

Dude, good job on that. I will include this in my presentation at Future of Money Summit if you dont mind.

commitcoin isn't my idea, to clarify. I'll just do the implementation, since there isn't one yet, as far as I can tell.

Heh, thats just as good. If you can have a working beta within 4 weeks, I'd love to use it in the presentation  Grin

I'll do my best. It's actually pretty straightforward to implement (especially using something like bitcoinj), but there's so much (non-bitcoin related) stuff to be done alongside that... Smiley


Like what, design?
vip
Activity: 490
Merit: 271
March 31, 2012, 05:17:28 PM
#21
@BTC_bear very interesting questions, thought provoking. I'd start with a claim that private keys are secrets and that TX1 and TX2 could only be initiated by a person(s) with knowledge of the keys to sign ... and here are the keys.


Thanx.

 Just pointing out that private keys in no way ties it to a single entity or person even. A person's computer might have been compromised, or even by intent more than one person might have a copy of the private keys. I know of one business entity that does this. In fact, the QT Client does this.

Supposedly there are 3 persons with the ability to send a message to the client. (Gavin, Theymos, and Satoshi) Who sent the recent message to the clients about the security update?
 
sr. member
Activity: 476
Merit: 250
March 31, 2012, 05:06:49 PM
#20

is this implemented anywhere? the paper blows my brains out just by looking at it.

you can use it in the way described in proof of concept, but it burns money. I will implement it in a month or two as part of my thesis, however.

Dude, good job on that. I will include this in my presentation at Future of Money Summit if you dont mind.

commitcoin isn't my idea, to clarify. I'll just do the implementation, since there isn't one yet, as far as I can tell.

Heh, thats just as good. If you can have a working beta within 4 weeks, I'd love to use it in the presentation  Grin

I'll do my best. It's actually pretty straightforward to implement (especially using something like bitcoinj), but there's so much (non-bitcoin related) stuff to be done alongside that... Smiley
sr. member
Activity: 462
Merit: 250
March 31, 2012, 05:06:43 PM
#19
@BTC_bear very interesting questions, thought provoking. I'd start with a claim that private keys are secrets and that TX1 and TX2 could only be initiated by a person(s) with knowledge of the keys to sign ... and here are the keys.
legendary
Activity: 1078
Merit: 1000
Charlie 'Van Bitcoin' Shrem
March 31, 2012, 05:04:31 PM
#18

is this implemented anywhere? the paper blows my brains out just by looking at it.

you can use it in the way described in proof of concept, but it burns money. I will implement it in a month or two as part of my thesis, however.

Dude, good job on that. I will include this in my presentation at Future of Money Summit if you dont mind.

commitcoin isn't my idea, to clarify. I'll just do the implementation, since there isn't one yet, as far as I can tell.

Heh, thats just as good. If you can have a working beta within 4 weeks, I'd love to use it in the presentation  Grin
sr. member
Activity: 476
Merit: 250
March 31, 2012, 04:59:53 PM
#17

is this implemented anywhere? the paper blows my brains out just by looking at it.

you can use it in the way described in proof of concept, but it burns money. I will implement it in a month or two as part of my thesis, however.

Dude, good job on that. I will include this in my presentation at Future of Money Summit if you dont mind.

commitcoin isn't my idea, to clarify. I'll just do the implementation, since there isn't one yet, as far as I can tell.
legendary
Activity: 1078
Merit: 1000
Charlie 'Van Bitcoin' Shrem
March 31, 2012, 04:48:33 PM
#16

is this implemented anywhere? the paper blows my brains out just by looking at it.

you can use it in the way described in proof of concept, but it burns money. I will implement it in a month or two as part of my thesis, however.

Dude, good job on that. I will include this in my presentation at Future of Money Summit if you dont mind.
vip
Activity: 490
Merit: 271
March 31, 2012, 04:45:54 PM
#15
It's evidence of Transactions occurring between addresses. Period.

To explain the intent or purpose of those transactions is a different story.

Can it be done, sure. But if LE is at that stage in investigating, they don't need the blockchain. It will just be another aspect of proof.

Think of how hard that is. Even if you prove that TX1 went to TX2, WHO sent TX1 and WHO received it and for what purpose. And now this gets even more complicated because the route from TX1 to TX2 may have thousands of transmissions between them.

Then you have the encrypted transfer of wallet.dat files containing an amount of BTC which would bypass miners and fees. I.E. There will be 21 Million BTC. Now imagine 21 Million Wallet.dat files being transferred to others bypassing miners all together. And the method of transfer doesn't even need to be electronic.

Not to mention that if it becomes accepted, people could send BTC to someone to implicate them in something that they had nothing to do with. Or cause them headaches.

For Example: PP customers send PP's CEO a $1 with a note: Thanks for the BitCoins   The PP CEO would be wrongly assumed to have violated his own companies policies. (But that wouldn't be fair or correct)

However there is a good point here:

The qt client allows the viewing of Transmissions and Receipts whether the wallet.dat is encrypted or not. This, IMO, is a privacy and security flaw. Anyone with access to the program could view your personal financial transactions.

To me this is akin to allowing everyone to see your online banking account details but they aren't allowed to transfer anything. If and until this is fixed, I would suggest for any serious and private TX to use the program from an encrypted disk and/or folder.

I'm sure I'm wrong about something, correct if necessary.
sr. member
Activity: 476
Merit: 250
March 31, 2012, 04:43:20 PM
#14

is this implemented anywhere? the paper blows my brains out just by looking at it.

you can use it in the way described in proof of concept, but it burns money. I will implement it in a month or two as part of my thesis, however.
Pages:
Jump to: