- From: Gabe Cohen <gabe.cohen@toolsforhumanity.com>
- Date: Tue, 15 Jul 2025 15:59:46 -0700
- To: Leonard Rosenthol <lrosenth@adobe.com>
- Cc: Manu Sporny <msporny@digitalbazaar.com>, W3C Credentials CG <public-credentials@w3.org>, "dzagidulin@gmail.com" <dzagidulin@gmail.com>
- Message-ID: <CAJCqzvgp7oLZxY=AbFaQd_i1zatFq-v1dzmsWmv6Kkq9cgUdtA@mail.gmail.com>
Interesting work, glad to see it. We’re exploring similar concepts working on World. Importantly, we can’t treat all data as embedded in the log itself. We have a need to store files and/or archives of files that are addressable independently from the archive. This is also useful for pruning old state if necessary. Curious what you think, Gabe On Jul 14, 2025 at 6:52:53 AM, Leonard Rosenthol <lrosenth@adobe.com> wrote: > In Content Credential parlance, we use a feature we call ingredients ( > https://spec.c2pa.org/specifications/specifications/2.2/specs/C2PA_Specification.html#ingredient_assertion). > A simple chain is done via `parentOf` ingredients. You create a new > manifest (either regular or update) representing the new actions (etc.) > taken, and include an ingredient assertion to the previous instance. In > media, this would be where (for example) you open an image in an editor, > make some changes, and then save – the original is the `parentOf` the new > one. Same with your log model. > > > > One difference is that we don’t restrict each entry/Manifest to a single > event (or what we call an action) – you can have multiple actions, and > potentially others statements (what we call assertions) in each one. > > > > Leonard > > > > *From: *Dmitri Zagidulin <dzagidulin@gmail.com> > *Date: *Sunday, July 13, 2025 at 9:42 PM > *To: *Leonard Rosenthol <lrosenth@adobe.com> > *Cc: *Manu Sporny <msporny@digitalbazaar.com>, W3C Credentials CG < > public-credentials@w3.org> > *Subject: *Re: [PROPOSED WORK ITEM] Cryptographic Event Log > > *EXTERNAL: Use caution when clicking on links or opening attachments.* > > > > Hi Leonard, > > > > I'm wholly with you -- evaluating existing solutions for fit is incredibly > important when developing new specs! Huge fan of that approach. And hey, > who doesn't like hearing that somebody has already done the hard work (of > spec writing and library implementation) for them, and so we can move on to > other projects! :) > > > > Since you mentioned that the Content Credentials C2PA spec would fit the > use case (a general purpose cryptographic event log), I read through it > (and the related Attestations spec), to see if we can use any pieces from > it. > > > > So, what we're talking about when we say cryptographic event log is a > linked list of objects, with each entry having hash-bound pointers to the > previous entry in the list. > > > > The closest thing I could find to this, a general purpose hash chain, > would probably be the Update Manifests section of the Content Credentials > spec? > https://spec.c2pa.org/specifications/specifications/2.2/specs/C2PA_Specification.html#_update_manifests > > > > Is that accurate, or where would you recommend we look instead? > > > > If that's the section you meant, I'm not sure it would fit our purpose for > the event log. Partly because - I couldn't figure out how backwards hash > links are expressed, for the update manifest. And also, the entries to the > manifest seem fairly constrained to C2PA stuff, including strict > restrictions to the c2pa.actions property, etc? > > > > For comparison, this is what a hash chain / cryptographically bound event > log looks like in the did:webvh spec: > https://identity.foundation/didwebvh/next/#the-did-log-file > > A pretty basic list of objects, with flexible properties in 'parameters', > and the 'entryHash' of the previous object being placed in the 'versionId' > object. > > > > Would we be able to model something like that with C2PA manifests data > models or something similar? > > > > Thanks, > > Dmitri > > > > > > On Sun, Jul 13, 2025 at 2:19 PM Leonard Rosenthol <lrosenth@adobe..com> > wrote: > > >Today, there is no standardized data structure for a cryptographic event > log. > > > > > While we refer to it as a content provenance system, I would strongly > argue that the Content Credentials technology from C2PA (https://c2pa.org) > serves the purpose you describe : > > *express changes to data over time and the means for a verifier > tocryptographically verify those changes.’* > > > > Perhaps, before creating a new specification, evaluation of this (and > possibly other solutions in use today) would be the right approach. > > > > Leonard > > > > >
Received on Wednesday, 16 July 2025 08:50:52 UTC