<div dir="ltr"><div class="gmail_extra"><div class="gmail_quote">On Thu, Jul 23, 2015 at 5:35 PM, Tao Effect <span dir="ltr"><<a href="mailto:contact@taoeffect.com" target="_blank">contact@taoeffect.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div style="word-wrap:break-word"><div><div dir="ltr"><div class="gmail_extra"><div class="gmail_quote"><div>What you are describing is not an attack IMHO, but the definition of first-come-first-served.</div><div><br></div><div>It is by no means a real “security” issue for Namecoin.</div></div></div></div></div></div></blockquote><div><br></div><div>I've just demonstrated how an attacker can perform a man-in-the-middle attack which lets them publish a malicious key under a name that the victim assumes is theirs. You don't care?</div><div><br></div><div>An attacker who can mine a Namecoin fork in Alice's view of split-brain world could convince Alice she's successfully claimed the name. This is particularly easy right now because very few people are mining Namecoin.</div><div><br></div><div>Since there's so little actual Namecoin mining going on, the amount of mining power needed to take control of the network is well within the reach of a sufficiently motivated and funded attacker.</div></div><div><br></div>-- <br><div class="gmail_signature">Tony Arcieri<br></div>
</div></div>