Data Authentication
When data is received from a device, what guarantees do we have that the data is indeed authentic?
Trusted hardware leads us to believe that a device with a trusted platform module should be trusted. How much is this true?
We would have to trust the TPM itself.
How do we form trust from unverified sources?
In many cases it is the corroboration of multiple data sources that allows us to eventually take the data as verified and authentic.
This happens in network protocols. Reliable protocols are built on top of unreliable protocols.
This is sometimes done in testimony. The facts must be corroborated.
What's the difference? Ultimately in the testimony there is a jury and judge. Jury makes a decision as to the ultimate conclusion, that implicitly decides what data is verified.
We need a protocol to corroborate and verify data.
Fake news is one such example today where its needed. Multiple news sources will show the facts.
What's the issue?
There are enough competiting news sources that will distort the facts.