eli5: why do we still rely on hand signatures to validate contracts?

450 views

aren’t by now easy to fake? (e.g hand-writing robots)

Plus we often do digital signatures, which are basically a jpg on top of a PDF document, no?

In: 132

48 Answers

Anonymous 0 Comments

Japanese Redditor’s. I noticed while visiting Japan, legal documents were stamped. Does that take the place of signatures?

Anonymous 0 Comments

Japanese Redditor’s. I noticed while visiting Japan, legal documents were stamped. Does that take the place of signatures?

Anonymous 0 Comments

Adobe Acrobat and other similar apps utilize digital authentication which is replacing hand signatures in many cases.

Anonymous 0 Comments

Adobe Acrobat and other similar apps utilize digital authentication which is replacing hand signatures in many cases.

Anonymous 0 Comments

They’re not really about identification. Most important contracts are signed in the presence of a 3rd party. They’re the actual evidence.

A signature can be an X or an O on a page. In some Asian countries, they even use stamps; which aren’t necessarily identifiable as one person’s name

A signature is more about saying “this is a legally mandated promise.” It lays the grounds for legal consequence if someone doesn’t follow through. Otherwise, forgetting about a spoken promise is a civil court issue.

Anonymous 0 Comments

They’re not really about identification. Most important contracts are signed in the presence of a 3rd party. They’re the actual evidence.

A signature can be an X or an O on a page. In some Asian countries, they even use stamps; which aren’t necessarily identifiable as one person’s name

A signature is more about saying “this is a legally mandated promise.” It lays the grounds for legal consequence if someone doesn’t follow through. Otherwise, forgetting about a spoken promise is a civil court issue.

Anonymous 0 Comments

In addition to the other points, whilst working on an IT project in local government, we came across legislation/ regulations that specified a signature was required.

Could a digital signature be used? Their legal team said no.

Anonymous 0 Comments

In addition to the other points, whilst working on an IT project in local government, we came across legislation/ regulations that specified a signature was required.

Could a digital signature be used? Their legal team said no.

Anonymous 0 Comments

Digital signatures are quite interesting and it works like this:

STEP 1:

the document is converted into a fixed-size string of bits, called hashing. The key point to remember about hashing is that hashing the same original input will always produce this same number, but this number cannot be reconstructed into its original input.

We do this so that the document can be arbitrarily long without needing to work with a huge number in the next step.

STEP 2:

we encrypt this hash with a private key and attach it to the document. We also attach the corresponding public key.A private/public key pair is unique, and has the property such that

* only the public key can decrypt something the private key encrypted and vice versa.
* It is also impossible to compute the public key from the private key and vice versa.

STEP 3:

anyone wishing to verify that the person who signed the document is in possession of the private key that corresponds to the attached public key can attempt to decrypt the encrypted hash.

If they are successful, this proves 2 things: the person who signed it is the owner of the public key, and the document has not been modified since it was signed (this is because if it was modified, it would produce a different hash than the one we decrypted).

STEP 4:

we look up the public key on some service. For example, websites use certificate authorities to check to see which website owns which public key.

Anonymous 0 Comments

Digital signatures are quite interesting and it works like this:

STEP 1:

the document is converted into a fixed-size string of bits, called hashing. The key point to remember about hashing is that hashing the same original input will always produce this same number, but this number cannot be reconstructed into its original input.

We do this so that the document can be arbitrarily long without needing to work with a huge number in the next step.

STEP 2:

we encrypt this hash with a private key and attach it to the document. We also attach the corresponding public key.A private/public key pair is unique, and has the property such that

* only the public key can decrypt something the private key encrypted and vice versa.
* It is also impossible to compute the public key from the private key and vice versa.

STEP 3:

anyone wishing to verify that the person who signed the document is in possession of the private key that corresponds to the attached public key can attempt to decrypt the encrypted hash.

If they are successful, this proves 2 things: the person who signed it is the owner of the public key, and the document has not been modified since it was signed (this is because if it was modified, it would produce a different hash than the one we decrypted).

STEP 4:

we look up the public key on some service. For example, websites use certificate authorities to check to see which website owns which public key.