Robert Hailey wrote: > If it is not already the case, perhaps it would make good sense to only > verify the signature: > 1) If we are the 'receiving' node. interested in it, or > 2) If we are caching the network data locally, or > 3) Statistically (1-in-every-N packets) to sanitize a 'bad' network > (where N is probably related to HTL)
This could have implications for anonymity: if we check the signature and it fails, we know the previous hop didn't check, therefore it didn't cache the data. (Also, all nodes along the path cache the data IIRC, so they'd all have to check the signature at some point anyway.) Cheers, Michael
