Peter Todd @Peter Todd - 9d
Pro-tip: if you want to prove that Pete Hegseth actually leaked you details of US strikes on Yemen hours ahead of time – rather than you just faking a few screenshots – timestamp those screenshots with OpenTimestamps. https://www.theatlantic.com/politics/archive/2025/03/trump-administration-accidentally-texted-me-its-war-plans/682151/
Basically no. That is a _much_ harder problem than time-stamping...
The thing is with keys alone you're not proving that data was created by an _device_. But rather, just by a key. That by itself doesn't mean anything. To actually prove something about a device is a difficult key validation problem.