If you are working with security you may have encountered situations where you wanted to verify a hash “out of band”. This could be done in many ways. Secured secondary chat channels or https enabled websites. But sometimes this would be done verbally over the phone or to an audience. I'm pretty fascinated with the security model used to secure the private keys used to sign the root zone in DNS. They meet four times a year for a carefully scripted ceremony where they take out smart cards, HSMs and so on from safes locked in cages.
Cutouts is an open source application. Code licensed under the MIT license. Copyright 2018 Siddharth Kannan