The 2018 Adoption from Rohinton P. Medhora
- How do we make public and private assets safer from cyber threats?
- How do we ensure sovereign capabilities for our military?
- How do we establish and enforce new global cyber norms?
Deep Fakes and Blockchain
Blockchain systems use a decentralised, immutable ledger to record information in such a way that it is constantly checked and rechecked by each organisation that uses it, making it almost impossible to change information once it has been created. One of the best-known uses of blockchain is to manage the transfer of cryptocurrencies such as Bitcoin. But the blockchain’s ability to provide decentralised authentication and a unique chain of custody makes it a potentially effective tool for tracking and verifying not only financial resources, but also all types of content.
To understand the potential of blockchain in combating deepfakes, it is important to understand the basics of hashing algorithms, cryptographic signatures and blockchain timestamps (a secure method of tracking when a document was created and modified).
Cryptographic algorithms and hashing are not unique to the blockchain, but these particular features of the technology become even more powerful when combined with other features of blockchain technology.