FINDING · EVALUATION
GNS bounds the trusted computing base (TCB) for any individual name resolution to fewer than approximately 125 entities (constrained by name label length) and makes the full trust chain transparent to the user. By contrast, even simple DNS lookups can silently depend on correct answers from over 100 DNS zones; China's DNS injection caused global collateral damage precisely because out-of-bailiwick NS record chains made the full trust graph invisible to resolvers and users alike.
From 2014-wachs-censorship-resistant — A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System · §5 · 2014 · Cryptology and Network Security
Implications
- Circumvention systems that rely on external name resolution (CDN fronting, domain generation algorithms) inherit a large, hidden TCB; designers should quantify and minimize the number of third-party authorities that can unilaterally break the resolution path.
- Prefer architectures where the trust chain to any circumvention endpoint is enumerable and short enough that users can verify it, enabling graceful recovery when one link in the chain is compromised or coerced.
Tags
Extracted by claude-sonnet-4-6 — review before relying.