“…The closest overlap with computer science concerns the processing of data. Most prominently, related work puts great emphasis on tracking and tracing in supply chains [33], [78], protecting against counterfeiting [79], [80], or recording ownership transfers [32], [81]- [83], with only a few approaches proposing end-to-end-secured information flows [84]. Such approaches have in common that they focus on the secure processing of information or identifiers: To date, barely any work considers the tamperproof and authentic sensing of data (G1 & G2) [17].…”