FINDING · EVALUATION

GNS bounds the trusted computing base (TCB) for any individual name resolution to fewer than approximately 125 entities (constrained by name label length) and makes the full trust chain transparent to the user. By contrast, even simple DNS lookups can silently depend on correct answers from over 100 DNS zones; China's DNS injection caused global collateral damage precisely because out-of-bailiwick NS record chains made the full trust graph invisible to resolvers and users alike.

From 2014-wachs-censorship-resistantA Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System · §5 · 2014 · Cryptology and Network Security

Implications

Tags

censors
cn
techniques
dns-poisoning
defenses
meta-resistance

Extracted by claude-sonnet-4-6 — review before relying.