FINDING · DEFENSE

GNS encrypts all DHT queries and responses using a zone-private-key-derived symmetric key (h = x·l mod n; query = H(hG)) such that a passive DHT observer can only mount a confirmation attack — requiring simultaneous knowledge of both the zone's public key and the specific label. Without both values, an adversary observing DHT traffic cannot determine the label, zone, or record data; even fully participating malicious DHT nodes see only opaque signed blobs unlinkable to their originating query.

From 2014-wachs-censorship-resistantA Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System · §4 · 2014 · Cryptology and Network Security

Implications

Tags

techniques
dpitraffic-shape
defenses
meta-resistancerandomization

Extracted by claude-sonnet-4-6 — review before relying.