FINDING · POLICY
In an adversary model where the censor may hold more computational power than all honest nodes combined, a squatting attack lets the adversary enumerate and pre-register every memorable name, formally proving it is impossible to simultaneously achieve memorable, secure, and global names in a single name system (Zooko's triangle).
From 2013-wachs-feasibility — On the Feasibility of a Censorship Resistant Decentralized Name System · §3 · 2013 · Foundations \& Practice of Security
Implications
- Accept that any censorship-resistant name system must explicitly sacrifice one of memorability, security against powerful adversaries, or global uniqueness — build the trade-off into the protocol rather than hoping to satisfy all three.
- Use pseudo-TLDs to allow multiple name systems with different property trade-offs to coexist under a single resolver, rather than seeking a single unified solution.
Tags
Extracted by claude-sonnet-4-6 — review before relying.