BTW it (the overhead) will be likely bigger in the query than in the
> response so we should not get new amplification concerns.
Amplification happens when IP spoofing is possible. When the solution stop
IP spoofing, I guess, it cannot happen as well.
Hosnieh
Another note about builtin/inline encryption solutions: there is a
trade-off between encryption + authentication/integrity as recommended
by crypto design rules vs. performances and message sizes. Of course
this will be addressed during the crypto design, so when/after we
reach a consensus about w