If you're interested in issue of trust then you should look more into these technologies, as they enable you to build systems that greatly minimize the trust between users.
Even as nothing more than an audit log with tamper evidence, it's clear that there are a variety of applications for this data structure. All the other functionality that folks are building on top is just gravy.