zhurovandrew 12 Apr 2024 in Public Weassume that the identity (public key) of the node can be ex-tracted from its signature, e.g., using ECDSA. ^ identity from signature