Sudhir Nakka

The Ledger of Truth: A Signed Web for Zero‑Trust Media

November 28, 2025 (1m ago)16 views

TL;DR — Stop trying to prove content is “real” by looking at pixels. Assume everything is untrusted unless it carries a verifiable signature from a verified human or organization. Build a public, privacy‑preserving ledger of signed hashes and make browsers/apps show trust badges by default.

1) The core problem: the detection arms race is futile

Most proposals to fight deepfakes lean on AI/System detection (blink rates, audio spectrogram's, pixel artifacts). But half life of such detection models is quite short. Every AI model breakthrough shrinks their half‑life. We can’t rely on content analysis to tell us if something is real. We must validate the source and the chain of custody. In other words: content provenance.

2) Proposal: a public, “signed” web

SSL for web functions on the premise of zero trust. Meaning, every website is untrustable until proven to be real. And a SSL certificate is a digital signature from a trusted authority who guarantees the authenticity of the website.

But executing the same for public assets is a challenge purely because of the vast amount of content we have today.

A public record (like a blockchain) where content creators publish verifiable signatures on their content. This changes the default from "assume real until proven fake" to "assume unverified until proven authentic."

3) Technical architecture

Layer 1: The Identity Bridge (real‑world → digital)

Layer 2: The Signing Process (hashing)

Layer 3: The Consumption Layer (browser/app)

Platforms and browsers integrate a simple check: when media loads, compute the hash locally and query the ledger:

4) Scenarios

A) Deepfake politician video

Today: a deepfake video spreads, people panic, and fact-checkers spend hours investigating. With a signed web: the president's official account hasn't signed this video. Your browser shows "Uncertified." People dismiss it quickly.

B) News journalism

A reporter signs footage on upload. If someone edits and re‑uploads, the hash changes, breaking the signature. Viewers instantly see it’s not the original.

5) Critical challenges and mitigations

6) Why this is practical now

7) Closing

We’re past the “seeing is believing” era. The default posture for media should be zero‑trust: “verifying is believing.” A signed‑web standard—anchored in sovereign identity attestation and an immutable public record—creates a whitelisted path where human accountability is the prerequisite for trust.

In a follow-up post, let’s dive deeper and implement a proof of concept together.

References and further reading

1. ^ Coalition for Content Provenance and Authenticity (C2PA): https://c2pa.org/

2. ^ W3C Verifiable Credentials: https://www.w3.org/TR/vc-data-model/

3. ^ W3C Decentralized Identifiers (DIDs): https://www.w3.org/TR/did-core/

4. ^ NIST: Digital Identity Guidelines (SP 800‑63): https://pages.nist.gov/800-63-3/