International audienceAsymmetric cryptography brings the ability for anyone on earth to check the signature of a digital object (Diffie & Hellman, 1976). From that perspective, trusted timestamping of a digital object provides very strong evidence of its author or inventor and integrity (Haber, 1991). 26 years later, one might have expected that trusted timestamping would have long ago replaced traditional paper laboratory notebooks, which has not happened yet. In this paper, we argue that the reason is that authenticity is a document process: while trusted timestamping remains a necessary part of the process, a digital object must be involved in a sociotechnical process in order to become a document. We first point out the gap, intractable...