Giving users control over their data and restoring trust requires open, verifiable and tamper-resistant infrastructure, which ...