Replies: 1 comment
-
A KEL is a backword and forward hash chained non-repudiably signed self-referencial verifiable data structure. So when you say that the KEL structure and SAIDs offer some protection, I can't help but feel that your question is premature, that you have yet to understand the unprecedented high degreee of protection that is already provided by a KEL before you can even ask if it is lacking if at all. Since the code is open source and the KERI whitepaper provides detailed abstract data models of all the events in a KEL, I suggest you start there. If what you want is someone to give you a tutorial on how the various pieces of the KEL work, I suggest you look at the slide decks on the keri.one site which walk one through the KEL and what each piece does. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Hi all,
While working with signify-ts and KERIA, I had a question regarding the integrity of event logs.
Is there any recommended way to cryptographically verify the authenticity and integrity of KEL (Key Event Logs) or witness receipts/logs? Specifically:
Would love to hear how others handle this, or if there are utility methods in the libraries that I might have missed.
Thanks in advance!
Beta Was this translation helpful? Give feedback.
All reactions