FINDING · EVALUATION

A malicious server operator with write access can mount a redirection attack by inserting a fake update file pointing to adversary-controlled content. If the client retrieves only k shares and Mallory controls k collaborating servers, all k update URLs match and the client proxy follows the redirect. A 1-bit non-updatable flag in the Publius URL blocks this vector by instructing clients to ignore all update files.

From 2000-waldman-publiusPublius: A robust, tamper-evident, censorship-resistant web publishing system · §5.2 · 2000 · USENIX Security Symposium

Implications

Tags

censors
generic
techniques
active-probing
defenses
meta-resistance

Extracted by claude-sonnet-4-6 — review before relying.