@taoeffect the same attacks you allege affect CT also affect “blockchain” based systems. But are either attacks practical?
-
-
Replying to @taoeffect
@taoeffect a MitM who controls what you see on the Internet can construct a false reality in either case1 reply 0 retweets 1 like -
Replying to @bascule
@bascule Yes, but it is different in CT than it is in blockchains. See discussion in claim #2: http://blog.okturtles.com/2014/09/the-trouble-with-certificate-transparency/ …3 replies 0 retweets 0 likes -
Replying to @taoeffect
@taoeffect I allege it’s the same thing and the difficulty of the attack is similar in both cases1 reply 0 retweets 0 likes -
-
Replying to @bascule
@bascule Well, this too, is addressed in the post, see “wasted energy”: http://blog.okturtles.com/2014/09/the-trouble-with-certificate-transparency/ …1 reply 0 retweets 0 likes -
Replying to @taoeffect
@taoeffect an attacker with the capabilities to pull off the attack you describe can just as easily confuse either system1 reply 0 retweets 0 likes
@taoeffect CT actually has a lot more potential defenses against complete connection poisoning
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.