<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Specification |</title><link>https://example.com/tags/specification/</link><atom:link href="https://example.com/tags/specification/index.xml" rel="self" type="application/rss+xml"/><description>Specification</description><generator>HugoBlox Kit (https://hugoblox.com)</generator><language>en-us</language><lastBuildDate>Wed, 01 Apr 2026 00:00:00 +0000</lastBuildDate><image><url>https://example.com/media/icon_hu_da05098ef60dc2e7.png</url><title>Specification</title><link>https://example.com/tags/specification/</link></image><item><title>Research paper published: Toward Decentralized Trust and Verifiable Content on the Web</title><link>https://example.com/blog/paper-published/</link><pubDate>Wed, 01 Apr 2026 00:00:00 +0000</pubDate><guid>https://example.com/blog/paper-published/</guid><description>&lt;p&gt;We&amp;rsquo;re pleased to share the publication of &lt;em&gt;Toward Decentralized Trust and Verifiable Content on the Web&lt;/em&gt;, the paper that lays out the technical foundation for the HTMLTrust project.&lt;/p&gt;
&lt;h2 id="abstract"&gt;Abstract&lt;/h2&gt;
&lt;blockquote class="border-l-4 border-neutral-300 dark:border-neutral-600 pl-4 italic text-neutral-600 dark:text-neutral-400 my-6"&gt;
&lt;p&gt;We propose a decentralized, standards-aligned framework for embedding cryptographic trust directly into HTML content. Using a new &lt;code&gt;&amp;lt;signed-section&amp;gt;&lt;/code&gt; element, content creators and publishing platforms can sign semantically meaningful regions of web pages and include identity-linked metadata in-band. Signatures are validated using public key infrastructure (PKI) such as DIDs, and can be enhanced with third-party endorsements submitted to optional, federated trust directories. We introduce a simple canonicalization method for content normalization and outline how browsers and CMS systems can support user-configured web-of-trust policies for live content validation. Unlike blockchain-based or DRM-centric systems, our approach is lightweight, browser-compatible, and web-native — designed to scale across publishing workflows, civic media, and knowledge networks.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2 id="key-contributions"&gt;Key contributions&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;A proposed &lt;code&gt;&amp;lt;signed-section&amp;gt;&lt;/code&gt; HTML element for encapsulating signed regions of a page&lt;/li&gt;
&lt;li&gt;A canonicalization algorithm for consistent content normalization&lt;/li&gt;
&lt;li&gt;A trust model supporting both direct signature verification and third-party endorsements&lt;/li&gt;
&lt;li&gt;Integration paths for browsers and content management systems&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id="reference-implementations"&gt;Reference implementations&lt;/h2&gt;
&lt;p&gt;Alongside the paper, we&amp;rsquo;ve published reference implementations:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;
&lt;/strong&gt; — Node.js + MongoDB API for author management, content signing, verification, and reputation tracking&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;
&lt;/strong&gt; — Chrome extension for client-side signature validation&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;
&lt;/strong&gt; — WordPress plugin and Hugo integration for server-side content signing&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;
&lt;/strong&gt; — JavaScript, Go, and PHP implementations, all passing the same conformance suite&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="read-the-paper"&gt;Read the paper&lt;/h2&gt;
&lt;p&gt;The paper and its LaTeX source are available in the
repository.&lt;/p&gt;
&lt;p&gt;We welcome feedback and contributions. Visit the
to get involved, or reach out at
.&lt;/p&gt;</description></item></channel></rss>