Verifiable proof

Control access

Sharing data in a form that is hard to forge. It can be checked using mathematical formulas, for example to verify that messages are end-to-end encrypted.

Advantages

  • Doesn’t rely on external infrastructure that could be malicious

Limitations

  • Some people won’t understand what is being checked

  • The underlying maths can later be found to be insecure