Data Integrity

How Partner Data is Hashed to Ensure Integrity

When partners share data with us (such as event details or user information), we take the raw data and generate a unique hash using cryptographic techniques. This hash is essentially a "digital fingerprint" of the data that is:

  • Unique: Even the slightest change in the data will result in a completely different hash, making it easy to detect tampering.
  • Immutable: Once the data is hashed and stored, the hash cannot be reversed to reveal the original data, ensuring confidentiality.

The generated hash is then stored on the blockchain, along with any relevant metadata (e.g., timestamps, partner IDs). Because the blockchain is decentralized and immutable, the stored hash acts as a permanent, verifiable record of the data’s original state at the time it was shared.

How Partner Data is Hashed to Ensure Integrity

Partners can verify the integrity of their data at any point by following these steps:

  1. Retrieve the Original Data: The partner can retrieve the original data they shared with us, either from their own records or from our system.
  2. Re-Hash the Data: Using the same hashing algorithm, they can re-generate the hash of the original data. This can be done using simple cryptographic functions provided in our SDK or a separate tool that supports the same hashing algorithm.
  3. Compare Hashes: The partner can then compare the newly generated hash with the one that was stored on the blockchain. If the two hashes match, this guarantees that the data has not been altered in any way since it was originally shared. If the hashes are different, it indicates that the data may have been tampered with.

📘

Example:

Initial Data: A partner submits event data like

{"event": "user_login", "timestamp": "2024-10-24T12:00:00Z"}.

Hash Generation: The data is hashed (using SHA-256, for instance), producing a hash like 3f7c3b7f...c5d8bda5.

Stored on Blockchain: The hash 3f7c3b7f...c5d8bda5 is stored on-chain.

A third party could take the original event data, hash it, and compare it to the blockchain-stored hash. If both hashes are identical, this confirms that the data has not been tampered with since its original submission.


How We Handle Security and Integrity

  1. Data Encryption:
    All user data is encrypted during transmission and at rest. This ensures the highest level of security.
  2. Blockchain Security:
    Key data points (such as event hashes) are stored on the blockchain, ensuring they cannot be tampered with. This added layer of security provides verifiable trust.
  3. User Consent:
    We require explicit user consent for data-sharing actions, and this consent is tracked and logged for transparency.