If you use a tree hash, the side sending you content can even include compact proofs that what they're sending you is a legitimate part of a full-file with the desired final hash.
So for example, if receiving a 10GB file, you don't have to get all 10GB before learning any particular relayer is a dishonest node.
If you use a tree hash, the side sending you content can even include compact proofs that what they're sending you is a legitimate part of a full-file with the desired final hash.
So for example, if receiving a 10GB file, you don't have to get all 10GB before learning any particular relayer is a dishonest node.