Source Trust Networks
Who you trust is important. Multiple providers can store metadata and authenticate identities. Both metadata and identities can be endorsed to build your network of trusted sources.
By using de-centralized, distributed storage, metadata cannot be altered, adjusted or removed. Provenance is maintained by including both the timestamp, and a hash of the metadata.
"In a low-trust world it's more important than ever to know the source and provenance of information. This is a simple, elegant solution." Jeff Brazil , Pulitzer Prize-winning journalist.