Introduction
Imagine you find a lost wallet and want to prove who owned it and how it was handled. In cybersecurity and investigations, keeping track of evidence is just as important to ensure it is trustworthy and untampered.
Imagine passing a secret note through a group of friends. Each friend signs and dates the note before handing it to the next. This way, everyone knows who had the note and when, ensuring no one changed the message.
┌───────────────┐ ┌───────────────┐ ┌───────────────┐ │ Evidence │────▶│ Handler 1 │────▶│ Handler 2 │ │ Collection │ │ (Documented) │ │ (Documented) │ └───────────────┘ └───────────────┘ └───────────────┘ │ │ │ ▼ ▼ ▼ ┌───────────────┐ ┌───────────────┐ ┌───────────────┐ │ Secure Storage│ │ Documentation │ │ Court/Invest. │ │ (Locked, Safe)│ │ (Logs, Sign) │ │ Presentation │ └───────────────┘ └───────────────┘ └───────────────┘