On Thu, Jul 23, 2015 at 5:22 PM, Tao Effect <[email protected]> wrote:
> How? > An attacker with a privileged network position can MitM the traffic of a client (let's call her Alice), intercept the transaction to register a name in the Namecoin block chain, and register the name themselves with an attacker-controlled key. Since names are first-come-first-served, so long as the MitM can reach a destined-to-be-longer fork of the Namecoin blockchain than Alice, they can get the name first before Alice does.
_______________________________________________ Messaging mailing list [email protected] https://moderncrypto.org/mailman/listinfo/messaging
