Abstract: One variation of a method for secure and distributed timekeeping includes: at a node in a set of nodes in a network, at a first time, sampling two time sources and calculating a minor consensus time between the two time sources; in response to designation of the node as a leader node, accessing a second minor consensus time generated by a second node, accessing a third minor consensus time generated by a third node, calculating a first major consensus time between the first, second, and third minor consensus times, and distributing a request to validate the first major consensus time; and, based on validation of the request from a threshold quantity of nodes, cryptographically hashing a hash of a previous block and the major consensus time to generate a first block and distributing the first block to each node in the set of nodes.
Abstract: One variation of a method for secure and distributed timekeeping includes: at a node in a set of nodes in a network, at a first time, sampling two time sources and calculating a minor consensus time between the two time sources; in response to designation of the node as a leader node, accessing a second minor consensus time generated by a second node, accessing a third minor consensus time generated by a third node, calculating a first major consensus time between the first, second, and third minor consensus times, and distributing a request to validate the first major consensus time; and, based on validation of the request from a threshold quantity of nodes, cryptographically hashing a hash of a previous block and the major consensus time to generate a first block and distributing the first block to each node in the set of nodes.