Public Key Cryptography - Signing
Public key cryptography is solid, mature, and well-documented. This project uses standard open-source implementations and formats.
A cryptographic identity consists of a public/private key pair.
The public key is shared openly, like a username.
The private key is kept secret, like a password.
The key holder can "sign" data using his private key.
That signature can be verified by anyone with the signer’s public key, ensuring:
the data was genuinely signed by the holder of the corresponding private key.
the signed data has not been modified.
No usernames or passwords are required — signed data is its own proof.
Strong cryptography is hard to defeat (that's why Bitcoin works).
("Liberating Trust", when I'm feelin' melodramatic ;)
(Unlike cryptography, the Internet liberated spam and misinformation, when I'm feeling realistic.)