Every security system in production today writes logs. Access logs. Audit logs. Change logs. Alert logs. Decision logs. Compliance logs.
Hundreds of billions of log lines per day, across every enterprise on earth.
And not a single one of them is evidence.
They are notes. Written by the system about itself. Stored by the operator who benefits from what they say. Editable by anyone with sufficient access. Deletable by anyone with sufficient motive. Unverifiable by any third party who wasn't present when they were written.
This is the foundational assumption that the entire security industry is built on, and it is wrong.
The Forensic Problem With Logs
When a breach happens, the first thing the incident response team does is pull the logs. This is treated as obvious. Logs are where truth lives. The SIEM collected them. The SOC watched them. The compliance team certified the pipeline.
But here's what actually happens in practice:
The attacker who compromised the system had the same access to the logs as the defender. If they had the privileges to exfiltrate data, they had the privileges to modify, truncate, or delete the log entries that recorded their presence. If they compromised the logging infrastructure itself, they could inject false entries that create an entirely fictional narrative of events.
This is not theoretical. It is the default outcome of every sophisticated breach. The Verizon Data Breach Investigations Report has documented for over a decade that the median time to detect a breach exceeds 200 days. During those 200 days, the attacker lives inside the logging infrastructure. The logs that exist when you finally discover the breach are the logs the attacker allowed to exist.
And yet these are the logs that get handed to the forensics team. To the regulator. To the insurer. To the judge.
Self-Attestation Is Not Attestation
The core problem is structural, not operational. It cannot be solved by better SIEM products, faster detection, or more aggressive retention policies.
A log is a self-attested record. The system that performed the action is the same system that recorded the action. The operator who runs the system is the same operator who stores the record. There is no independent witness. There is no cryptographic binding between the event and the record. There is no way for a third party to verify that the record was not created, modified, or deleted after the fact.
In any other domain, this would be considered absurd. Financial auditors do not accept self-reported numbers without independent verification. Courts do not accept testimony from a witness who also wrote the police report, filed the charges, and judged the case. Insurance adjusters do not accept damage assessments from the party making the claim.
But in security, self-attestation is the standard. Every log, every alert, every audit trail is a system's testimony about its own behavior. And we treat it as ground truth.
The Legal Liability Is Real and Growing
This matters commercially because the legal landscape has shifted. Regulators and courts are no longer willing to accept "we had logs" as sufficient evidence of compliance or due diligence.
Consider what happens after a breach that triggers litigation:
- The plaintiff's attorney asks: "Can you prove that your access controls were enforced at the time of the breach?" The defendant produces access logs. The attorney asks: "Who wrote those logs?" The defendant says: "The same system that was breached." The attorney says: "So the compromised system is your witness."
- The regulator asks: "Can you prove that your data handling policies were followed during the period in question?" The company produces audit logs. The regulator asks: "Can an independent party verify these logs were not modified?" The company cannot answer.
- The insurer asks: "Can you prove that your security controls were continuously operational, not just at the time of your last penetration test?" The company produces SIEM dashboards. The insurer asks: "Can you prove those dashboards reflect reality and not just what the SIEM was configured to show?" Silence.
The $10.2 million average breach cost in 2025 is not just the cost of the breach itself. It is the cost of being unable to prove what happened, what didn't happen, and what governance was in place when it mattered.
What Cryptographic Proofs Change
A cryptographic proof is fundamentally different from a log entry. It is not a record of an event. It is a mathematical commitment that an event occurred, bound to the state of the system at the exact moment it happened, signed by keys whose authority is independently verifiable, and anchored to a timeline that cannot be retroactively modified.
The distinction matters in every dimension that logs fail:
Tamper Evidence vs. Tamper Resistance
Logs are sometimes described as "tamper-evident" because they use append-only storage or hash chains. But tamper evidence only works if someone is watching. If the attacker modifies the log and the hash chain before anyone checks, the tampered version becomes the new "authentic" chain. There is no external anchor.
A cryptographic proof is tamper-resistant. The proof is bound to a commitment that exists outside the system. Even if the attacker compromises the entire infrastructure, they cannot retroactively change the proof without breaking the mathematical relationship between the commitment and the event. The proof either verifies or it doesn't. There is no "modified but consistent" state.
Independent Verifiability
A log can only be verified by the system that produced it. You ask the system: "Did this happen?" The system checks its own logs and says: "Yes." You are trusting the system to tell the truth about itself.
A cryptographic proof can be verified by anyone, anywhere, at any time, without contacting the system that produced it. The verifier needs only the proof, the public key, and the algorithm. The prover does not need to be online, cooperative, or even still in existence. The proof stands on its own.
This is the difference between asking a suspect if they committed the crime and presenting DNA evidence to a jury. One requires trust. The other requires math.
Temporal Binding
A log entry has a timestamp. But who set the clock? The system itself. Can the timestamp be changed? Yes, by anyone with system access. Can you prove the event happened at that exact time and not earlier or later? No.
A cryptographic proof can be bound to an external timestamp authority, a blockchain, a satellite clock, or any combination of independent time sources. The temporal binding is not a field in a database. It is a mathematical relationship between the proof and an independently verifiable anchor point.
Negative Proofs
This is where the gap becomes a chasm. Logs can tell you what happened. They cannot tell you what didn't happen. The absence of a log entry could mean the event didn't occur, or it could mean the log was deleted, the logging was disabled, the system was compromised, or the event occurred in a way that the logging configuration didn't capture.
Cryptographic systems can produce negative proofs. A properly constructed attestation chain can prove that a specific action was impossible given the governance state at that moment. Not "we have no record of it happening" but "the mathematical constraints of the system made it impossible for this to have occurred."
Proving what could not have happened is orders of magnitude more valuable than recording what did happen. An insurer does not want to know that your firewall logged a block. An insurer wants to know that unauthorized data access was mathematically impossible given your key hierarchy and policy state at the time of the incident.
The Post-Quantum Dimension
Everything above is true for classical cryptographic proofs. But classical proofs have a shelf life. RSA and ECC signatures, which underpin most current PKI and code-signing infrastructure, will be broken by sufficiently powerful quantum computers. The timeline is debated, but the direction is not.
This creates a specific and urgent problem for evidentiary proofs: they need to survive longer than the cryptographic assumptions they are built on.
A log from 2026 that was "cryptographically signed" with RSA-2048 may be worthless by 2035. Not because the log was tampered with, but because the signature can no longer be trusted. Anyone with a quantum computer could forge a signature that appears valid. The proof degrades to the same status as an unsigned log: a self-attested claim with no independent verification.
Post-quantum attestation solves this by using signature algorithms whose security is based on mathematical problems that quantum computers cannot efficiently solve. NIST has standardized three families: lattice-based (ML-DSA, formerly Dilithium), hash-based (SLH-DSA, formerly SPHINCS+), and structured-lattice-based (ML-KEM for key exchange, FN-DSA/FALCON for signatures). Each family rests on a different mathematical hardness assumption.
A proof attested with three independent post-quantum signature families breaks only if all three underlying mathematical assumptions are simultaneously broken. This is not defense in depth through redundancy. It is defense in depth through mathematical independence. The probability of all three failing is the product of three independent low probabilities, not the sum.
What This Looks Like in Practice
Replace the mental model of "write a log line" with "produce an attestation."
When an AI agent makes a decision, the system doesn't log "Agent X decided Y at time T." It produces a cryptographic attestation that binds the agent's identity, the decision, the input data hash (without exposing the data), the policy state that authorized the decision, the governance chain that authorized the agent, and the computational path that produced the result. All signed with three post-quantum signature families. All anchored to an immutable external timeline.
When an employee approves a wire transfer, the system doesn't log "User A approved transfer B." It produces an attestation that binds the user's organizational role, the delegation chain that granted them authority, the policy that allows that role to approve transfers of that size, the governance state of the organization at that exact moment, and the cryptographic proof that all of these conditions were simultaneously true.
When a compliance control is evaluated, the system doesn't log "Control X passed at time T." It produces a continuously-updated attestation that proves the control was enforced at every point in time, not just the moments when someone checked. The proof is not a snapshot. It is a chain.
The Operational Integrity Score
When you compose these attestations across an entire organization, something emerges that logs could never produce: a continuous, independently verifiable score of operational integrity.
Not a dashboard that shows green because the SIEM is configured to show green. Not an audit report that reflects a point-in-time assessment. A living score computed from cryptographically attested operational evidence, independently verifiable by any party, at any point in time, without trusting the operator.
This is what an insurer actually needs to price cyber risk. Not your self-assessment questionnaire. Not your penetration test from six months ago. A continuous, independently replayable proof that your governance was enforced, your controls were operational, and your systems behaved within their authorized boundaries.
Why Logs Persist Despite Being Inadequate
If logs are so fundamentally flawed as evidence, why does every system still use them?
Three reasons:
Operational utility. Logs are genuinely useful for debugging, monitoring, and operational troubleshooting. A developer looking at application logs to find a bug does not need cryptographic proof. They need readable text with timestamps. This operational utility is real, and nothing proposed here eliminates it. Logs remain valuable for operations. They just aren't evidence.
Regulatory inertia. Compliance frameworks were written when logs were the best available technology. SOC 2 requires "logging of security-relevant events." PCI DSS requires "audit trails." HIPAA requires "audit controls." These requirements were written to describe logs because logs were the only option. The frameworks are slowly catching up, but regulatory change lags technological capability by years.
Tooling ecosystem. The SIEM market is a $6 billion industry. Splunk, Datadog, Elastic, CrowdStrike, Palo Alto, Microsoft Sentinel. Enormous engineering teams, enormous sales organizations, enormous customer bases, all built around the assumption that logs are the source of truth. The switching cost is not just technical. It is organizational, contractual, and cultural.
None of these reasons make logs adequate as evidence. They explain why logs persist. They do not justify treating them as proof.
The Transition Path
The practical question is not "should we replace all logs with cryptographic proofs?" It is "which events need to produce independently verifiable evidence, and which are fine as operational notes?"
The answer is straightforward:
- Governance decisions need proofs. Who approved what, under what authority, at what organizational state.
- AI agent actions need proofs. What the agent decided, what data it accessed, what policy constrained it, what computation it ran.
- Compliance controls need proofs. Not point-in-time snapshots, but continuous attestation of enforcement.
- Financial authorizations need proofs. Wire approvals, trading decisions, settlement confirmations.
- Data custody transitions need proofs. Who handled the data, what transformations occurred, what encryption protected it at each stage.
- Key lifecycle events need proofs. Key generation, delegation, rotation, revocation, authority transitions.
Everything else — application debugging, performance monitoring, user behavior analytics, capacity planning — can remain as logs. These are operational concerns, not evidentiary ones.
The distinction is simple: if you might need to prove it to a judge, a regulator, an insurer, or a counterparty, it needs to be a proof. If you only need it for internal operations, a log is fine.
What Changes When Evidence Replaces Notes
When organizations transition from self-attested logs to independently verifiable proofs for their critical events, several things change:
Insurance costs drop. Insurers can verify controls continuously instead of relying on annual questionnaires. The risk model changes from "we believe you" to "we can verify." Premiums reflect actual operational posture, not estimated posture.
Breach litigation shifts. Defendants can produce mathematical proof that governance was enforced, not just logs that claim it was. "We followed our policy" becomes verifiable, not just assertable. This doesn't prevent breaches, but it fundamentally changes the liability calculus.
Regulatory compliance becomes continuous. Instead of point-in-time audits that create a two-week scramble to "get everything in order," compliance is a byproduct of normal operations. Every governed action produces its own proof. The audit is always ready because the evidence is always being produced.
AI governance becomes provable. As AI agents take more autonomous actions in enterprise systems, the question "can you prove what your AI did and why?" becomes critical. Logs of AI decisions are notes. Attested decision chains with policy bindings and data provenance are evidence.
Cross-organizational trust becomes possible. When two organizations need to verify each other's security posture, logs are useless. Each party would need to trust the other's self-attested records. Cryptographic proofs allow independent verification without requiring access to the other organization's systems.
The 50-Year Question
The final dimension is time. Logs degrade. Storage fails. Formats become obsolete. Companies merge, split, or disappear. The system that wrote the log may not exist in ten years, let alone fifty.
But legal obligations, regulatory requirements, and insurance claims can span decades. A financial institution may need to prove what happened in 2026 to resolve a dispute in 2046. A healthcare organization may need to demonstrate data handling practices from twenty years ago. A government agency may need to reconstruct decision chains that span multiple administrations.
Logs cannot survive this. Not because of storage technology, but because their evidentiary value depends on the continued trustworthiness of the system that produced them and the operator that stored them. Both may be gone.
Post-quantum cryptographic proofs survive because their verification depends on mathematics, not on institutional continuity. The proof from 2026 can be verified in 2076 by anyone with the algorithm and the public key. The prover doesn't need to exist. The operator doesn't need to be trusted. The proof stands on its own.
This is not just a technical capability. It is a new category of infrastructure. Not logging. Not monitoring. Not auditing. Provable operational continuity.
The Category
Logs are notes. They are useful, familiar, and operationally necessary. They will continue to exist for debugging, monitoring, and day-to-day operations.
But they are not evidence. They never were. We just didn't have an alternative.
Now we do.
Cryptographic proofs, attested with post-quantum signature families, anchored to independent timelines, independently verifiable by any party, survivable across decades. This is what evidence looks like when it's built for machines, courts, regulators, insurers, and time.
The systems that act, decide, classify, govern, route, settle, authorize, and enforce policy should produce evidence of what they did. Not notes about what they think they did.
Breaches happen. Proof of governance shouldn't be optional.
See Cryptographic Evidence in Action
H33-Truth turns system behavior into independently verifiable proofs. Post-quantum attested. Continuously scored. Replayable forever.
Explore H33-Truth →