Cryptographic Provenance¶
How UCCA proves where data came from and that it hasn't been tampered with.
Content pending
Document the provenance model, hash chains, and trust anchors.
How UCCA proves where data came from and that it hasn't been tampered with.
Content pending
Document the provenance model, hash chains, and trust anchors.