Yann Büchau :nixos: · @nobodyinperson
234 followers · 994 posts · Server fosstodon.org

Damn, it took me less than five hours to go from zero to a fully usable :nixos: 💪:

- getting working
- homedir encryption with
- all software I need
- even managed to package 3 custom things not in nixpkgs (passrofi, my client fork, bemoji)

This is the result: gitlab.com/nobodyinperson/nixc

#nixos #gnupg #ecryptfs #opentimestamps

Last updated 1 year ago

Yann Büchau :python: · @nobodyinperson
216 followers · 891 posts · Server fosstodon.org

@rixx Fun. Can't backdate proofs in the GPG signature though 😅

opentimestamps.org

#opentimestamps

Last updated 1 year ago

Yann Büchau :python: · @nobodyinperson
164 followers · 599 posts · Server fosstodon.org

@pete This also plays nicely with @joeyh's :gitannex: :

# have Git Annex sign all commits + adding the
git config annex.allowsign true

You can then extract timestamp proofs that your documents existed at a past point in time (ots git-extract --annex file.txt) and you were actually the one creating the file (git log --show-signature file.txt). Neat!

#gitannex #opentimestamps

Last updated 1 year ago

Yann Büchau :python: · @nobodyinperson
164 followers · 598 posts · Server fosstodon.org

When you add @pete's (opentimestamps.org) and signatures to your commits, you can prove even more that it was really you doing that work *at that time*, not someone else. Even when your PGP key is compromised later.

Something along these lines:

# my PR with extra goodies, hopefully soon to be merged
pip install git+github.com/nobodyinperson/open
git config commit.gpgsign true
git config gpg.program ots-git-gpg-wrapper.sh

#opentimestamps #pgp

Last updated 1 year ago

Yann Büchau :python: · @nobodyinperson
164 followers · 598 posts · Server fosstodon.org

@linux_mclinuxface One solution around the someone-claims-they-made-it-first-and-accuse-you-of-copying-it-problem is to both add a signature and @pete's to your commits:

opentimestamps.org

The faker will have a really hard time trying to prove they have created an identical version before you.

The same goes for basically any other work you do. I sign amd timestamp each and every one of my commits like this.

#pgp #opentimestamps

Last updated 1 year ago

Yann :python: · @nobodyinperson
86 followers · 316 posts · Server fosstodon.org

#opentimestamps

Last updated 2 years ago

Steven Roose · @stevenroose
497 followers · 3906 posts · Server x0f.org

@dachary @forgefriends I mean if you invent a name and a logo and attribute it to the public domain, no one else can register it as a trademark, right? You just need to timestamp the time of invention ( and Twitter or something) and any party being sued by someone falsely claiming the copyright/trademark should be able to defend themselves using that.

#opentimestamps

Last updated 2 years ago

Yann :python: · @nobodyinperson
86 followers · 316 posts · Server fosstodon.org

Oooh I just found out that the (opentimestamps.org/) client (github.com/opentimestamps/open) supports extracting timestamp proofs form a (timestamped) git repository also for git-annexed files:

# This creates the proof file 'annexed-file.dat.ots'
ots git-extract --annex annexed-file.dat
# This can be used to verify:
ots [--no-bitcoin] verify annexed-file.dat.ots

Very much awesome! 🎉

#opentimestamps #python #git

Last updated 2 years ago

Steven Roose · @stevenroose
497 followers · 3906 posts · Server x0f.org

@waxwing @Bitcoinology @Hyolobrika Auditability in such a system is hard, but possible, each contract could opt-in to auditability and opting in would force the mints to publish every state update into a hash chain (committed to or something) and interactions could refer to the latest state hash to ensure there's no tampering etc.

#opentimestamps

Last updated 2 years ago

Peter Todd · @pete
1543 followers · 2469 posts · Server mastodon.petertodd.org

"[ots-dev] Stamp/Beacon Trees for Secure, Precise, Trusted Timestamping and Clock Synchronization" - lists.opentimestamps.org/piper

tl;dr: My new merkle tree construction combines the precision of NTP, and the security of Roughtime. And unlike either, it can be scaled arbitrarily with untrusted servers.

Added to the protocol, it'd allow one service to provide both high accuracy, trusted time, and trustless, low-accuracy, Bitcoin timestamps. A one-stop-shop for all your timing needs.

#opentimestamps

Last updated 4 years ago

berkes 🐝 🚐 🏄 🌱 · @berkes
546 followers · 4955 posts · Server bitcoinhackers.org

Samen met Nobleton heb ik op de Blockchain, met en een vette dienst gebouwd: "Algemene voorwaarden deponeren op de Blockchain". Legal meets crypto.

nobleton.nl/deponeren/

Meer informatie: nobleton.nl/algemene-voorwaard

#ipfs #opentimestamps #bitcoin

Last updated 5 years ago