FINDING · EVALUATION

Blockchain-based naming systems such as Namecoin are insufficient under a strong adversary model where a nation-state can muster more computational resources than all other participants combined, allowing it to produce alternative valid chain histories. This vulnerability is most acute during system bootstrapping and in censored regions where the user base is small, precisely the conditions under which a censorship-resistant naming layer is most needed.

From 2014-wachs-censorship-resistantA Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System · §6 · 2014 · Cryptology and Network Security

Implications

Tags

censors
generic
techniques
ip-blocking
defenses
meta-resistance

Extracted by claude-sonnet-4-6 — review before relying.