Verifier Node
Verifier Nodes leverage the TEE (Trusted Execution Environment) and FHE (Fully Homomorphic Encryption) technologies, it plays a crucial role for checking quality of service foreach Subnet Protocol, validate data integrity and maintaining the privacy of user's data.
Data Versioning: Track changes in data and version control.
Cyclic Redundancy Check (CRC): Detect errors in data transmission.
Digital signatures: Use public key encryption to verify the origin and integrity of the data.
Hash functions: Use algorithms such as MD5, SHA-256 to create a unique fingerprint for the data.
Last updated