Re: And thus..
"if someone already owns the box to the extent that they can fake text log entries, they can surely fake binary log entries.."
Not if they only control ONE process (which they're using to post fake log messages using text formatting tricks). The thing with gatekeeping is that it's a lot harder to fake it since the gatekeeper knows which process is emitting which message. And the ONLY way to enforce this is to use a more-complicated logging format that allows for discrimination. You simply CANNOT do this correctly with a text-based log; it's too simple for that. To put it in perspective. If all you have to work with is a single bit (1 or 0), how do you correctly inform when a coin flip lands edge?