Tony,

Let’s stick to Zooko’s triangle for now, as it is not the same thing as CAP, 
and I disagree with your assertions regarding it. We can discuss CAP off list 
if you want.

Going with the Security edge of the triangle, you assert:

> So it's possible to MitM name registration

How?

> exploit the split brain/partitioned state of the network to claim a name on 
> someone else's behalf

What?

> and trick people who are trying to look up keys by a human meaningful name 
> into accepting an attacker's key.


How?

Please describe the attack you have in mind in detail. I believe we’ve already 
argued about the blockchain a bunch (on [metzdowd]), I hope this is not a 
rehash of those arguments.

Cheers,
Greg

--
Please do not email me anything that you are not comfortable also sharing with 
the NSA.

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
Messaging mailing list
[email protected]
https://moderncrypto.org/mailman/listinfo/messaging

Reply via email to