There has to be an additional mechanism to make this safe. Sometimes this is called "barriers", and there have to be checksums that tell when a part of the log is corrupted.
Cookies help us deliver our services. By using our services, you agree to our use of cookies.