Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

But if you can accept centralization, then why not just use a conventional DBMS? (This is a real question, not a rhetorical argument.)


So that you (or other interested parties) can verify the correct operation of the centralized authority, and so that the central authority can prove that they aren't hiding anything.

For example, in the case of certificate transparency, that the CAs aren't mis-issuing certificates, and further that the logs aren't conspiring to hide entries (such as via split views).




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: