Hacker News new | past | comments | ask | show | jobs | submit login

Yes, of course.

If you use a tree hash, the side sending you content can even include compact proofs that what they're sending you is a legitimate part of a full-file with the desired final hash.

So for example, if receiving a 10GB file, you don't have to get all 10GB before learning any particular relayer is a dishonest node.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: