* Giuseppe De Marco <giuseppe.demarco at unical.it> [2020-03-26 17:00]:
I never thought that a signature could be too much
computational
intensive but, it could be so.
Not a single one, but thousands of "cheap" GET requests to a
protected resource, as easily generated by a single unauthenicated
client on the network, resulting in "expensive" signing operations.
It's this asymmetry in the attacker's favor you'd want to avoid.
-peter