Verification Strategies

Overview

Verification strategies in Wayfinder ensure data integrity and authenticity when fetching content from Arweave through AR.IO gateways. These strategies use cryptographic methods to verify that the data you receive matches what was originally stored on Arweave, protecting against tampering, corruption, or malicious gateways.

Why Verification Matters

  • Data Integrity: Ensures content hasn't been corrupted during transmission
  • Security: Protects against malicious gateways serving fake data
  • Trust: Provides cryptographic proof that data is authentic
  • Compliance: Meets security requirements for sensitive applications

Strategy Comparison

← Swipe to see more →
StrategySecurity LevelBest ForUse CaseVerification Method
Hash VerificationHighFast integrity checks and developmentHigh-throughput applicationsSHA-256 hash vs trusted gateway digest
Signature VerificationVery HighAuthenticity validation and ownership proofFinancial or legal documentsTransaction signature validation
Data Root VerificationHighestMaximum security and critical dataProduction applicationsMerkle tree data root comparison
← Swipe to see more →
Important

Verification methods require that the gateway being used has the relevant transaction data indexed locally. Gateways cannot proxy out verification requests to other sources, as this would compromise the security and reliability of the verification process. If a gateway doesn't have the required data indexed, verification will fail.

Was this page helpful?