Closed Neylix closed 1 month ago
I'm wondering if we can even improve the security of this flow, by checking the proof of integrity of the transaction chain in the stream processing.
I'm wondering if we can even improve the security of this flow, by checking the proof of integrity of the transaction chain in the stream processing.
As discussed, we are planning to evolve the proof of integrity so that it can be validated without the need of the previous transaction data. Combined with the proof of validation using BLS signatures, all the proofs could be validated in the message request before entering the replication process.
Description
During replication, if a node has to sync previous transactions of a chain, when it downloads them it ensure all transactions are fetched from the paging address to the limit address. It ensure all transactions using there previous address which should be the address of the previous transaction fetched.
Fixes #1563
Type of change
Checklist: