How Is the Data Request Authenticated in a DON?
Data requests are authenticated cryptographically. The smart contract sends a request that is cryptographically signed and verified by the oracle nodes.
The nodes, in turn, use their private keys to cryptographically sign the data they provide, proving that the data originated from a legitimate oracle node within the network. This ensures the integrity and non-repudiation of both the request and the response.