FINDING · DEFENSE

In a DHT-based censorship-resistant name system, poisoning attacks (injecting invalid mappings) are neutralized by requiring signature verification on stored values; eclipse attacks (isolating specific mappings from the network) require replication across multiple DHT nodes. Critically, decentralizing lookups from a single ISP resolver to a DHT shifts query visibility from ISPs to arbitrary peers, requiring per-query encryption keyed to secrets known only to the querying client to limit adversaries to confirmation attacks.

From 2013-wachs-feasibilityOn the Feasibility of a Censorship Resistant Decentralized Name System · §4.4 · 2013 · Foundations \& Practice of Security

Implications

Tags

censors
generic
techniques
dns-poisoning
defenses
meta-resistancetor

Extracted by claude-sonnet-4-6 — review before relying.