Timelines That Don’t Lie: Date Your Claims

Timelines That Don’t Lie: Date Your Claims

Start dating claims today

Make every claim provable: add verifiable timestamps, immutable evidence, and clear provenance to reduce disputes and build trust — learn how to start.

Dating claims — assigning clear, verifiable timestamps and provenance — turns vague statements into auditable records. Whether for journalism, research, product updates, or legal assertions, a simple, repeatable workflow prevents confusion, preserves context, and speeds resolution when facts change.

  • TL;DR: Use ISO 8601 timestamps, capture immutable evidence (hashes/archives/screenshots), version changes with signed logs, attach source metadata, and automate where possible.
  • Make dates and provenance visible to readers and stakeholders.
  • Automate capture, verification, and storage to scale and reduce human error.

Quick answer: Date every claim with a verifiable timestamp

Use ISO 8601 timestamps with timezone and appropriate precision, record source and context, preserve immutable evidence (cryptographic hashes, archived copies, or time-stamped forensic screenshots), automate capture/versioning, display dates prominently, and maintain signed change logs so claims are auditable and disputes resolve quickly.


Capture exact timestamps (format, timezone, and precision)

Consistent timestamp format is the foundation of traceable claims. Adopt ISO 8601 (YYYY-MM-DDThh:mm:ssZ or with offset like 2026-02-01T14:30:00+01:00) for machine-readability and global clarity.

  • Include timezone or UTC: Prefer UTC (Z) or explicit offsets to avoid ambiguity across regions.
  • Select precision intentionally: Use seconds for most claims, milliseconds for financial/real-time systems, and dates only for long-lived statements.
  • Record both generated and observed times: e.g., when a sensor produced data (observed) vs. when the system logged it (recorded).

Example timestamp fields (JSON snippet):

{
  "claim": "Model X accuracy 94.2%",
  "observed_at": "2026-01-30T09:12:03.452Z",
  "recorded_at": "2026-01-30T09:12:04.001Z",
  "timezone": "UTC"
}
Recommended timestamp precision by use case
Use caseRecommended precision
Policy statements / articlesDate or second
Research measurementsSecond or millisecond
Financial transactionsMillisecond or microsecond
Sensor telemetry / IoTMillisecond or better

Preserve immutable evidence (hashes, archives, and forensic screenshots)

Dates alone can be disputed; preserving immutable evidence ties content to a verifiable artifact. Use cryptographic hashes, third-party archives, and meticulous screenshots to create robust proof.

  • Cryptographic hashes (SHA-256 or better) of claim texts, documents, or files: store the hash alongside the timestamp so anyone can verify integrity later.
  • Web archives: Submit pages to services like the Internet Archive or Perma.cc and record the archive URL and archive timestamp.
  • Forensic screenshots: Capture full-page screenshots with metadata (browser, viewport, OS) and, if possible, embed a visible timestamp within the capture.
  • Third-party notarization: Where required, use timestamping authorities or blockchain anchoring for higher assurance.

Example evidence record (compact):

{
  "claim_id": "c-20260130-001",
  "text_hash": "sha256:3a1f...b7f2",
  "archive": "https://web.archive.org/web/20260130091203/https://example.com/post",
  "screenshot": "s3://evidence/screenshots/c-20260130-001.png",
  "evidence_recorded_at": "2026-01-30T09:12:10Z"
}

Use version control and signed change logs

Versioning makes claim evolution transparent. Treat claims like code or documents: track edits, keep diffs, and sign logs to prove authorship and sequence.

  • Store claim content in a version control system (Git, Fossil) or a database that preserves immutable historical snapshots.
  • Record diffs and human-friendly changelogs that include who made the change, why, and the precise timestamp.
  • Digitally sign change logs with developer keys or use HMACs so logs themselves can be verified.
  • Expose version history to stakeholders; allow rolling back or annotating prior versions.

Compact changelog example:

2026-01-30T09:12:04Z | +claim | alice@example.com | initial claim; sha256:3a1f...b7f2
2026-01-31T11:00:15Z | ~edit  | bob@example.com   | clarified metric; sha256:9c4d...8e21

Automate time-stamping with tools and workflows

Manual steps are error-prone. Automate capture, hashing, archiving, and logging in CI pipelines, content management hooks, or dedicated tooling.

  • Use webhooks or CMS plugins to trigger evidence capture when content is published or edited.
  • Integrate with archive APIs, compute hashes automatically, and push artifacts to immutable storage (WORM, append-only logs).
  • Leverage task runners or CI (GitHub Actions, GitLab CI) to sign and publish change logs and store artifacts in a reproducible job output.
  • Notify stakeholders (email, Slack, webhooks) with a concise provenance summary and links to artifacts.

Simple automation flow:

  1. Publish/edit event fires webhook.
  2. Worker captures page, computes hash, archives page, saves screenshot.
  3. Worker commits metadata + hash to version control and signs the entry.
  4. System displays timestamp & provenance badge on the public claim page.

Attach verifiable sources and metadata (who, where, how)

Metadata gives context that makes timestamps meaningful. Capture and surface who made the claim, source material, location, and method of capture.

  • Who: author identity (email, ORCID, organization), authenticated user ID, or signing key fingerprint.
  • Where: URL, dataset ID, geolocation (if applicable), or repository path.
  • How: method of capture (manual, API, sensor), tools used, and any preprocessing applied.
  • Related artifacts: links to datasets, source documents, or upstream evidence.
Essential metadata fields
FieldExample
author_idalice@example.com
source_urlhttps://example.com/report.pdf
capture_methodautomated-archive-api
evidence_hashsha256:3a1f…b7f2

Communicate dates clearly to stakeholders and readers

Surface the most relevant timestamps where readers look: top of articles, next to claims, on API responses, and in exportable metadata. Make it human- and machine-readable.

  • Show primary timestamp prominently (e.g., “Claim dated: 2026-01-30T09:12:03Z”).
  • Offer a hover or expandable section with full provenance (hashes, archive links, change history).
  • Provide machine-readable metadata (JSON-LD or API endpoints) so third parties can verify automatically.
  • Use clear labels: observed vs recorded, published vs edited, archived_at, evidence_verified_at.

Accessibility tip: Ensure timestamp text is selectable and included in ARIA live regions for dynamic updates.


Common pitfalls and how to avoid them

  • Pitfall: Ambiguous local times. Fix: Always include UTC or explicit offset in timestamps.
  • Pitfall: Relying solely on screenshots. Fix: Combine screenshots with hashes and archived URLs.
  • Pitfall: Storing metadata only in a single location. Fix: Replicate critical metadata (hashes, archives) across independent stores.
  • Pitfall: Unsigned change logs. Fix: Digitally sign logs or use append-only ledgers.
  • Pitfall: No automation, causing missed captures. Fix: Integrate capture into CI/CMS webhooks and test regularly.

Implementation checklist

  • Adopt ISO 8601 UTC timestamps across systems.
  • Compute and store cryptographic hashes for every claim artifact.
  • Archive claim URLs with third-party services and keep archive links in metadata.
  • Enable version control and signed change logs for claims.
  • Automate capture and notifications via webhooks/CI.
  • Expose provenance and timestamps to readers and via APIs.

FAQ

Q: Which timestamp format should I use?
A: Use ISO 8601 with UTC (2026-01-30T09:12:03Z) or explicit offset for clarity and machine parsing.
Q: Are screenshots sufficient as evidence?
A: Screenshots help but pair them with a cryptographic hash and an archived URL to ensure long-term verifiability.
Q: How do I prove a change log hasn’t been tampered with?
A: Digitally sign logs (asymmetric keys) or append entries to an immutable ledger or blockchain anchor to provide tamper evidence.
Q: What if a source retracts or deletes content?
A: Archived copies and stored hashes preserve the prior state; record the deletion event with its timestamp and archived evidence.
Q: How much automation is necessary?
A: Aim to automate capture for all published/edited claims. Manual capture can complement but increases risk of missed or inconsistent records.