Digital Currency for Public Good: Difference between revisions

From Computer Laboratory Group Design Projects
Jump to navigationJump to search
No edit summary
No edit summary
Line 1: Line 1:
Client: Jan Kis, [[IMC]] <Jan.Kis@imc.nl>
Client: Jan Kis, [[IMC]] <Jan.Kis@imc.nl>


The digital currency Bitcoin uses a block chain distributed database to guarantee that any transaction can be traced to a unique original coin. The same technique could be used for anonymous authentication of other kinds of data. Your task in this project is to create a secure end-to-end system for authenticated reporting and verification of criminal activity, safety violations, human rights abuses etc. You need to think about how reports can get into the system, and how those receiving a report can use the block chain to confirm it is true without endangering the whistleblower.
The digital currency Bitcoin uses a block chain distributed database to guarantee that any transaction can be traced to a unique original coin. The same technique could be used for anonymous authentication of a chain of custody for other kinds of data. Your task in this project is to create a secure end-to-end system for authenticated reporting and verification of criminal activity, safety violations, human rights abuses etc. You need to think about how reports can get into the system safely, and how those receiving a report can use the block chain to prove that the evidence has not been tampered with, all without endangering the whistleblower.

Revision as of 10:23, 10 November 2015

Client: Jan Kis, IMC <Jan.Kis@imc.nl>

The digital currency Bitcoin uses a block chain distributed database to guarantee that any transaction can be traced to a unique original coin. The same technique could be used for anonymous authentication of a chain of custody for other kinds of data. Your task in this project is to create a secure end-to-end system for authenticated reporting and verification of criminal activity, safety violations, human rights abuses etc. You need to think about how reports can get into the system safely, and how those receiving a report can use the block chain to prove that the evidence has not been tampered with, all without endangering the whistleblower.