Tony, Let’s stick to Zooko’s triangle for now, as it is not the same thing as CAP, and I disagree with your assertions regarding it. We can discuss CAP off list if you want.
Going with the Security edge of the triangle, you assert: > So it's possible to MitM name registration How? > exploit the split brain/partitioned state of the network to claim a name on > someone else's behalf What? > and trick people who are trying to look up keys by a human meaningful name > into accepting an attacker's key. How? Please describe the attack you have in mind in detail. I believe we’ve already argued about the blockchain a bunch (on [metzdowd]), I hope this is not a rehash of those arguments. Cheers, Greg -- Please do not email me anything that you are not comfortable also sharing with the NSA.
signature.asc
Description: Message signed with OpenPGP using GPGMail
_______________________________________________ Messaging mailing list [email protected] https://moderncrypto.org/mailman/listinfo/messaging
