Skip to content

Commit

Permalink
Improve wording of use cases
Browse files Browse the repository at this point in the history
  • Loading branch information
thobson88 committed Jul 10, 2024
1 parent 1a6b2bf commit 2b41ce8
Showing 1 changed file with 3 additions and 3 deletions.
6 changes: 3 additions & 3 deletions docs/use-cases.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,21 +12,21 @@ We adopt the W3C standard for Verifiable Credentials, which specifies their tech

## Data Provenance

Trustchain enables anybody to check the authenticity and provenance of data and digital media, by verifying its integrity and the identity of its original source.
Trustchain enables anybody to check the authenticity and provenance of data and digital media by verifying its integrity and the identity of its original source.

Every news article, every image, every video could be signed by the original publisher, to prove it has not been modified or tampered with since its release. And because Trustchain is open and decentralised, this ability is available to everyone, not just large content providers.

## Verifiable URLs

There is currently no foolproof way to verify that a web page is legitimate before visiting it. This is a particular problem when URLs are displayed in QR codes at payment locations such as car parks or EV charging points, so-called [QR code scams](https://www.bbc.co.uk/programmes/articles/2ds8k78dDqJbrLz6SnbqBw0/qr-code-scams).

By making URLs cryptographically verifiable, Trustchain can provide robust defence against all types of phishing attacks, including QR code scams.
By tying together URLs and institutional identity, in a cryptographically verifiable way, Trustchain can provide robust defence against all types of phishing attacks, including QR code scams.

## Secure Communication

Public Key Infrastructure is used on the Web to enable secure communication between clients and servers. Without this technology, online commerce and many services, such as internet banking, would be impossible.

However, in many contexts data sharing remains inefficient and insecure. For instance, when making loan or mortgage applications individuals often share sensitive information, such as bank statements, over insecure channels and in plain text. When provenance is required, it is common to resort to hard copies with physical signatures or stamps.
However, all too often data sharing practices remain inefficient and insecure. For instance, when making loan or mortgage applications individuals often share sensitive information, such as bank statements, over insecure channels and in plain text. When provenance is required, it is common to resort to hard copies with physical signatures or stamps.

Trustchain provides a general solution to the problem of secure communication, including data sharing. It does this by creating a trustworthy PKI in which public key certificates refer to recognisable legal entities themselves (not merely their web domains), and different keys are available for different purposes. In that scenario, all data exchanges can be encrypted and their source verifiable, paving the way for a truly digital economy.

Expand Down

0 comments on commit 2b41ce8

Please sign in to comment.