On Thu, Jul 23, 2015 at 5:22 PM, Tao Effect <[email protected]> wrote:

> How?
>

An attacker with a privileged network position can MitM the traffic of a
client (let's call her Alice), intercept the transaction to register a name
in the Namecoin block chain, and register the name themselves with an
attacker-controlled key.

Since names are first-come-first-served, so long as the MitM can reach a
destined-to-be-longer fork of the Namecoin blockchain than Alice, they can
get the name first before Alice does.
_______________________________________________
Messaging mailing list
[email protected]
https://moderncrypto.org/mailman/listinfo/messaging

Reply via email to