• Dr_Nik@lemmy.world
    link
    fedilink
    arrow-up
    12
    ·
    17 hours ago

    This is actually a problem in scientific note taking and the very simple rule is you write all notes in pen and if you are needing to remove text you only use a single line to cross it out. That way if someone scribbles out the words/data you know it was tampered with as opposed to modified by the original writer. It also helps to put your initials on every edit and sign the end of the page, as well as have a witness sign the end of the page (but that may be excessive in your case). Also use only bound notebooks with numbered pages that are obvious if a page has been removed.

  • Nibodhika@lemmy.world
    link
    fedilink
    arrow-up
    12
    ·
    23 hours ago

    It all depends on your threat model, what is your fear? I personally would be very comfortable noting stuff down on a notebook, or even having a random text file on my PC, neither of those is likely to get compromised/tampered. Let’s assume you have someone living with you that you can’t trust, and you don’t want them to either be able to alter or read your entries, notebook and text files are not enough, but you can encrypt the notebook using any multitude of ways (including inventing your own language and symbols) and you can password encrypt the file in your PC. They could still destroy entries or the entire thing, if that is more of your concern then having backups might be more important. If you’re worried about altering past entries you can use something similar to a Blockchain, where the hash of your previous message is used in the new one so it’s obvious if someone erased a message, in the notebook you can do something like starting each message with the 5th to last word from the previous one or in some other way reference it.

    At the end of the day it all depends on what is it you’re afraid could happen to your entries, so we’ll need more information on that.

  • Infrapink@thebrainbin.org
    link
    fedilink
    arrow-up
    33
    ·
    1 day ago

    Write your journal by hand, with a pen or pencil on paper. You’ll know you wrote it because it’s your handwriting.

  • solrize@lemmy.ml
    link
    fedilink
    arrow-up
    38
    ·
    1 day ago

    Maybe there’s a technical solution but what if you forget to check it?

    Anyway watch the movie “Memento” if you haven’t.

  • Matt The Horwood@lemmy.horwood.cloud
    link
    fedilink
    English
    arrow-up
    2
    ·
    21 hours ago

    Not the best idea, but use a write once read many S3 bucket. That way once the note is stored it’s not going anywhere or getting edited, AWS can do that and also backblaze.

  • chicken@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    5
    ·
    1 day ago

    Pull an eyelash or similar, keep it between a specific page and check every time that it’s still there. If someone tampers with the journal it will fall out and they won’t realize it matters.

  • Jimbabwe@lemmy.world
    link
    fedilink
    arrow-up
    12
    arrow-down
    1
    ·
    1 day ago

    You could invent your own. It wouldn’t stop someone who was really determined to trick you, because the tradeoff between convenience and perfect security would likely leave you vulnerable to reverse engineering. But that being said, you can take your message, reverse it, Caesar cypher it, replace letters with numbers, drop vowels or spaces, etc etc until you’ve mangled it into a “hash” that only you know how to produce.

    • Brave Little Hitachi Wand@lemmy.world
      link
      fedilink
      English
      arrow-up
      16
      ·
      1 day ago

      Easier to have a cryptic rule, such as “third sentence in every entry must have exactly three words, and the last word in the entry must rhyme with the very first word.” That would validate the entry with far less work, and people would need massive sample sizes to have any chance at finding the pattern.

    • LifeInMultipleChoice@lemmy.world
      link
      fedilink
      arrow-up
      5
      ·
      edit-2
      1 day ago

      I remember in college one of my teachers told the class if we were going to be late with our submissions that were do by midnight to submit a corrupted document before midnight. Then when you finished your document to change your bios/system clock to before that time, paste it into a fresh document and save it with the same name. That way when he told you the document was corrupted it wouldn’t be obvious the document was created after the due date.

      Can’t remember if I ever ended up having to do that. (You can do it using the touch command in terminal I believe, instead of having to change your clock.). I just remember thinking it was comical that the professor told us to do it.

  • TheLeadenSea@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    6
    ·
    1 day ago

    Set up a code to yourself, easily remembered, and don’t share it with anyone. Then include it secretly in communications to yourself. If you don’t remember sending it, but it has your code, you can trust it.

  • Zwuzelmaus@feddit.org
    link
    fedilink
    arrow-up
    6
    arrow-down
    4
    ·
    edit-2
    1 day ago

    system which you can verify that its not tampered with?

    Blockchain technology is one possibility to store data in a way that it cannot be changed later.

  • awrreny@lemmy.world
    link
    fedilink
    English
    arrow-up
    3
    ·
    1 day ago

    if you are able to remember the method to create the signatures then you can do many things e.g a simplified digital signature. but if you can’t remember a method then you can’t ensure that someone else has forged a signature, because if you forget everything then you have the same information as anyone else and anything you can do, they can also do

    apology for word salad