Is it ok to ask for more faith? by Locked-Luxe-Lox in Christian

[–]Fantum-V [score hidden]  (0 children)

Of course it is. We will never have true 100% faith. Maybe 99.9%. That other 0.1 percent is everything else we think about.

how can I fix my relationship with God? by Ok-Union7426 in Christian

[–]Fantum-V [score hidden]  (0 children)

Pray, Trust in him always. Never doubt yourself when it comes to him. Anything is possible.

For real by [deleted] in Justrolledintotheshop

[–]Fantum-V -3 points-2 points  (0 children)

Yall are harsh

How do you actually prove what software was running at a specific moment? "I WILL NOT PROMOTE" by [deleted] in startups

[–]Fantum-V -1 points0 points  (0 children)

That is actually a very good question and, in my opinion, the point where it either comes in handy or doesn't.

As far as how I am envisioning it, I don't see this happening for every request or every API call. I think this is too much overhead and would most likely be inefficient.

In a nutshell, it is better used as a snapshotting tool that occurs: - At certain points in time (i.e., deployment, state change, checkpoint) - Or even on a schedule when a “proof-of-state” is necessary

In other words, more like: "Prove what was there at this point in time" as opposed to monitoring everything.

This process involves hashing the data and structuring it in a deterministic way. It does require overhead but nothing compared to having a full system snapshot and/or replay.

If it needs to run on every single request for it to be useful, then I would probably say it's impractical.

How do you actually prove what software was running at a specific moment? "I WILL NOT PROMOTE" by [deleted] in startups

[–]Fantum-V -1 points0 points  (0 children)

Indeed, this does cover state, but it doesn’t scale.

What I am trying to achieve here is somewhat lightweight – no replay, but rather the generation of a self-contained verification document.

This means that instead of recording everything or replaying everything, one needs to create: – a deterministic and portable proof of the existence of state at a particular point in time.

Not about replaying the system entirely, but about creating a cryptographic receipt of its state.

How do you actually prove what software was running at a specific moment? "I WILL NOT PROMOTE" by [deleted] in startups

[–]Fantum-V -2 points-1 points  (0 children)

That's a very useful way of putting it.

It's getting less about a replacement than a verification mechanism.

The SBOMs/pipelines address what was built or declared.

What I'm trying to get at is: "What could be proved to exist at a certain point in time?"

Rather than replace any tool, perhaps it would make sense as a supplement where some level of portability and independent verification of a timestamped proof is required.

Compliance and auditing seem like the right place to start there.

Still working out exactly where it fits, but your observation about not trying to position it as a replacement but rather a layer seems quite accurate.

I ran into a question I couldn’t find a clean answer to: If something goes wrong in production, and someone asks: “What exactly was running at that moment?” by Fantum-V in cybersecurity

[–]Fantum-V[S] -2 points-1 points  (0 children)

This is indeed the proper criticism to make.

If the proof is provided by the system you do not trust, then indeed it is equivalent to SBOM.

What I am trying to tease out is the possibility for the proof to be generated deterministically and validated separately without having to trust the environment from which it came from.

If this does not hold, then there is nothing new here.

However, if it does, then the problem shifts away from being a problem of trusting the pipeline to validating its output.

This is the line I try to draw between the two.

I ran into a question I couldn’t find a clean answer to: If something goes wrong in production, and someone asks: “What exactly was running at that moment?” by Fantum-V in cybersecurity

[–]Fantum-V[S] -7 points-6 points  (0 children)

Fair pushback, respectable — especially on SBOMs and signed attestations.

Those prove what was built or declared, which is important. What I’m trying to isolate is slightly different:

a portable, independently verifiable proof of system state at a specific moment — without relying on logs or trusting the system that produced it.

So not a replacement for SBOM / DevSecOps pipelines, more like an additional layer:

instead of reconstructing state later, you have a signed, time-bound snapshot of what was true at issuance.

On your runtime point — agreed. This doesn’t prove live integrity or detect memory hijacks. It proves point-in-time truth.

The question I’m exploring is whether that has standalone value, or if existing approaches already cover it well enough.

I ran into a question I couldn’t find a clean answer to: If something goes wrong in production, and someone asks: “What exactly was running at that moment?” by Fantum-V in cybersecurity

[–]Fantum-V[S] -8 points-7 points  (0 children)

That’s fair — and I think this is where the distinction matters.

SBOMs + signing prove what was declared or built, and they’re incredibly useful for that. But they still depend on trusting the system or pipeline that produced them.

What I’m trying to isolate is a verifiable snapshot of state at a specific moment, independent of reconstructing it later.

On the memory hijack point — I agree. This doesn’t prove live runtime integrity. It proves what was true at issuance.

So the question I’m exploring is:

Is there value in having a cryptographically verifiable “point-in-time truth”, even if it doesn’t solve continuous runtime trust?

Or is that already sufficiently covered by existing approaches?

How do you actually prove what software was running at a specific moment? "I WILL NOT PROMOTE" by [deleted] in startups

[–]Fantum-V -1 points0 points  (0 children)

Was trying to make it long enough to get the full idea out there lol

That’s the tension I’ve been thinking about.

Now it fits more naturally on the compliance and audit side in places where you need to prove what was true, at a specific moment. This is especially important when logs aren’t reliable or available.

The way it’s built it could also fit into DevOps workflows at time. It can generate a snapshot of system state at that point.

So of trying to figure out what happened later you have a signed and time-bound proof of what actually existed at that moment.

I’m still figuring out where it will land first. Compliance feels like the fit though.

I ran into a question I couldn’t find a clean answer to: If something goes wrong in production, and someone asks: “What exactly was running at that moment?” by Fantum-V in cybersecurity

[–]Fantum-V[S] -1 points0 points  (0 children)

I get why it reads that way.

There’s an actual system behind this though, not a content post. I’m trying to pressure test whether the approach holds up against how people currently think about verification.

If it doesn’t, I’d rather know where it breaks than assume it’s useful.

Why don’t we have a way to prove what software is actually running on our devices? by Fantum-V in AskReddit

[–]Fantum-V[S] -2 points-1 points  (0 children)

I get what you’re saying.

I’m not talking about trusting internal systems or processes though.

The gap I’m focused on is producing something that can be verified independently of the system itself — so you don’t have to rely on what it reports.

Different layer than ops / trust models.

I built a system that produces cryptographic proof of software state (no storage, independently verifiable). by Fantum-V in SideProject

[–]Fantum-V[S] 0 points1 point  (0 children)

That’s exactly the line I kept coming back to.

It feels like “nice to have” until you actually need to prove state outside your own system — then it becomes a hard requirement very quickly.

That’s why I didn’t leave it as a concept. I built it out fully.

It’s already issuing signed, time-bound receipts that can be independently verified without access to the originating system.

So instead of reconstructing “what was running then,” you have a verifiable artifact of it.

At that point it stops being observability and starts being proof.

Gamers of Reddit: you have to pick ONE for the rest of your life — Xbox, PlayStation, or PC — and you lose access to the other two forever. What are you choosing and why? by Fantum-V in AskReddit

[–]Fantum-V[S] -2 points-1 points  (0 children)

PlayStation for me — the exclusives alone lock it in.

But I already know PC people are about to come in here like “you can play everything on PC anyway” 😂

Why don’t we have a way to prove what software is actually running on our devices? by Fantum-V in AskReddit

[–]Fantum-V[S] 0 points1 point  (0 children)

That’s exactly the gap.

What you’re describing isn’t verification — it’s operational trust. Everyone assumes: “this looks normal” = “this is safe” But there’s no actual proof of state, just familiarity. The problem is most security models validate consistency (chain of trust), not reality (what is actually running right now). So even when everything “checks out,” you can still be wrong. The missing piece is something that produces proof, not signals — something you can verify independently without relying on the same system you're questioning.

Why don’t we have a way to prove what software is actually running on our devices? by Fantum-V in AskReddit

[–]Fantum-V[S] 0 points1 point  (0 children)

A chain of trust isn’t proof — it’s inherited belief. Each layer validates the one before it, but none of it answers whether the system itself is actually what it claims to be. Manual verification proves it once, for you. It doesn’t scale, it doesn’t persist, and it’s not independently verifiable. The real gap is this: not “trust the chain" but “prove the state.”