FINDING · DEFENSE

GNS uses a proof-of-work-gated network flood for key revocation, requiring an adversary to block flood traffic on every path between the revocation origin and all peers to suppress it. This is substantially more robust than X.509 certificate revocation lists, which an adversary can render ineffective by simply blocking access to CRL servers — a weakness severe enough that browser vendors must bundle revocation lists inside software updates.

From 2014-wachs-censorship-resistantA Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System · §A.5 · 2014 · Cryptology and Network Security

Implications

Tags

techniques
ip-blocking
defenses
meta-resistancebridges

Extracted by claude-sonnet-4-6 — review before relying.