Skip to main content

You are not logged in. Your edit will be placed in a queue until it is peer reviewed.

We welcome edits that make the post easier to understand and more valuable for readers. Because community members review edits, please try to make the post substantially better than how you found it, for example, by fixing grammar or adding additional resources and hyperlinks.

5
  • Good answer. Do you know of a few such services that provide APIs to automate the process? Commented Jun 12, 2014 at 0:11
  • @jt0dd: The EU maintains a Trusted List of Certification Service Providers, which would be a good starting point. Commented Jun 12, 2014 at 0:15
  • I'm still interested in a method that is 100% in-house (no third party), but such a thing is probably not invented yet. For now, I'll have to accept a 3rd party API, I expect. Commented Jun 12, 2014 at 0:26
  • 1
    @jt0dd: Well, if you create your own timestamped data with no third party involvement, it's unlikely that anybody else would have a reason to believe you if the validity of your timestamp were called into question. However, distributed methods (such as storing a hash inside a cryptocurrency block) rely on distribution of the information but do not rely on a single (or specific) third party. Commented Jun 12, 2014 at 0:29
  • It would require the private key to be inaccessible by the programmer but still able to sign the data. Possible? I don't know. Commented Jun 12, 2014 at 0:47