[messaging] Do Blockchains solve Zooko's triangle? (was: Another Take At Public Key Distribution)

Tony Arcieri bascule at gmail.com
Thu Jul 23 17:28:28 PDT 2015

On Thu, Jul 23, 2015 at 5:22 PM, Tao Effect <contact at taoeffect.com> wrote:

> How?

An attacker with a privileged network position can MitM the traffic of a
client (let's call her Alice), intercept the transaction to register a name
in the Namecoin block chain, and register the name themselves with an
attacker-controlled key.

Since names are first-come-first-served, so long as the MitM can reach a
destined-to-be-longer fork of the Namecoin blockchain than Alice, they can
get the name first before Alice does.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://moderncrypto.org/mail-archive/messaging/attachments/20150723/b150de42/attachment.html>

More information about the Messaging mailing list