25 posted 2 years ago by xihg 2 years ago by xihg +27 / -2 28 comments share 28 comments share save hide report block hide replies
You can use end-to-end encryption.
That kind of proof cannot exist. It is on you to show how that is so.
There is the issue of encrypted material being potentially decipherable in the future. Use modern algorithms with very long keys.