Content Authenticity & Verification

Data Transfer Procotols

Object Identifiers

Trusted & Linked Timestamps

Known Security Vulnerabilities?

Overlap With Identity

Identity & Uniqueness: Authenticity of Entities and Actions

Digital Signatures