Ensuring verifiable communication between nyzo node operators by designing and deploying an authentication protocol
This article shares the motivation and goals pertaining to the development of an authentication protocol which enables nyzo network participants to communicate in a verifiable manner. It touches on how verifiable communication is established, how the protocol is defined, how it is - and should be - deployed, possible variations & concludes with a synopsis of observations in regards to the nyzo network.