Provenance — the verified chain of custody of a piece of information — is the bedrock of credible journalism. Traditional provenance relies on editorial policy and institutional reputation. On-chain provenance uses cryptographic signatures and immutable ledgers to make provenance mathematically verifiable rather than institutionally asserted.
How On-Chain Provenance Works
When a journalist publishes a fact-checked article using an on-chain provenance system: 1) The article's cryptographic hash (a unique fingerprint) is recorded on the blockchain with a timestamp. 2) The journalist's verified public key signs the hash, creating an immutable attribution record. 3) Each subsequent fact-check is recorded as a new transaction, linked to the original. Any attempt to alter the article changes its hash, making the alteration immediately detectable by anyone who checks the on-chain record.
Applications in Practice
Content provenance networks like the Coalition for Content Provenance and Authenticity (C2PA) are building industry standards for this approach. Adobe's Content Credentials, now embedded in Photoshop and Premiere, add cryptographic provenance to images and video. The New York Times' Photo Provenance Project has piloted C2PA-compliant metadata for combat zone photography — making it possible to verify that an image is what it claims to be before publication.