diff --git a/lib/crypto/Cargo.toml b/lib/crypto/Cargo.toml
index 52160523b6fa6006d1031b38ffa726bb34627e36..497a2849bb393f2fb3e0a0432747ae155351eee1 100644
--- a/lib/crypto/Cargo.toml
+++ b/lib/crypto/Cargo.toml
@@ -28,5 +28,6 @@ log = "0.4.*"
 
 [dev-dependencies]
 bincode = "1.2.0"
+#hex = "0.3.1"
 
 [features]
diff --git a/lib/crypto/src/keys/ed25519.rs b/lib/crypto/src/keys/ed25519.rs
index 413c26d9d0f9291bcb2d2896b8334407c8e3ec83..e51c8304c7710e721a77ca31e7aac8acf2c71408 100644
--- a/lib/crypto/src/keys/ed25519.rs
+++ b/lib/crypto/src/keys/ed25519.rs
@@ -667,4 +667,20 @@ Timestamp: 0-E3B0C44298FC1C149AFBF4C8996FB92427AE41E4649B934CA495991B7852B855
             .sign(message.as_bytes());
         assert!(keypair.verify(message.as_bytes(), &sig).is_ok());
     }
+
+    /*#[test]
+    fn test_tmp() {
+        let message = "InnerHash: A9697A9954EA447BBDC88D1B22AA8B60B2D11986DE806319C1A5AAFEB348C213\nNonce: 10300000043648\n";
+
+        let pubkey =
+            PublicKey::from_base58("8kXygUHh1vLjmcRzXVM86t38EL8dfFJgfBeHmkaWLamu").unwrap();
+        let sig: super::Signature = Signature::from_base64("XDIvgPbJK02ZfMwrhrtNFmMVGhqazDBhnxPBvMXLsDgPbnh28NbUbOYIRHrsZlo/frAv/Oh0OUOQZD3JpSf8DQ==").unwrap();
+
+        let pubkey_hex = hex::encode(&pubkey.0[..]);
+        println!("{}", pubkey_hex);
+        let sig_hex = hex::encode(&sig.0[..]);
+        println!("{}", sig_hex);
+
+        assert!(pubkey.verify(message.as_bytes(), &sig).is_ok());
+    }*/
 }
diff --git a/lib/modules/blockchain/blockchain/src/dubp/check/local.rs b/lib/modules/blockchain/blockchain/src/dubp/check/local.rs
index f79b90bc872769ea99d7511ea25c5a8e0fd8a5fe..6205fa614f3de5d97f347ea6fbe4c7903dedc73c 100644
--- a/lib/modules/blockchain/blockchain/src/dubp/check/local.rs
+++ b/lib/modules/blockchain/blockchain/src/dubp/check/local.rs
@@ -43,7 +43,7 @@ pub enum LocalVerifyBlockError {
     /// Not-genesis block specific rules
     LocalVerifyNotGenesisBlockError(LocalVerifyNotGenesisBlockError),
     /// Signature error
-    BlockSignatureError(DocumentSigsErr),
+    _BlockSignatureError(DocumentSigsErr),
     /// Identity signature error
     IdentitySignatureError(DocumentSigsErr),
     /// Joiner signature error
@@ -123,9 +123,10 @@ pub fn verify_local_validity_block_v10(
     // As it has been checked that block.issuers.len() == 1 and as
     // block.issuers.len() == block.signatures.len() is check in block.verify_signatures()
     // there is no need to check that block.signatures.len() == 1
-    block
-        .verify_signatures()
-        .map_err(LocalVerifyBlockError::BlockSignatureError)?;
+    // check bloc sig tmp disabled because #183
+    /*block
+    .verify_signatures()
+    .map_err(LocalVerifyBlockError::BlockSignatureError)?;*/
     for identity in &block.identities {
         identity
             .verify_signatures()