FINDING · POLICY

In an adversary model where the censor may hold more computational power than all honest nodes combined, a squatting attack lets the adversary enumerate and pre-register every memorable name, formally proving it is impossible to simultaneously achieve memorable, secure, and global names in a single name system (Zooko's triangle).

From 2013-wachs-feasibilityOn the Feasibility of a Censorship Resistant Decentralized Name System · §3 · 2013 · Foundations \& Practice of Security

Implications

Tags

censors
generic
techniques
dns-poisoning
defenses
meta-resistance

Extracted by claude-sonnet-4-6 — review before relying.