1. In every blockchain solution that relies on external data, data is originated, submitted to the blockchain by an oracle, and finally confirmed and made usable for blockchain applications
2. There are Different stages in the lifecycle of data
a. Creation/Cleaning: It may be inputted manually by humans or collected automatically by computers and devices, or both.
b. Stroge/Getway: in this stage, there is a man-in-the-middle attack in which an attacker intercepts real data from the legitimate data source and replaces it with modified data before submitting it to the blockchain
c. Oracle: in another variety of man-in-the-middle attack, the oracle intercepts real data from the legitimate data source and replaces it with modified data before submitting it to the blockchain
Question: depending on points b and c above, What techniques and solutions are available to do against man-in-the-middle attacks to support data integrity in a blockchain?