@bascule Yes, but they do it in different ways, and the blockchain actually protects you from the MITM attack.
-
-
-
Replying to @taoeffect
@taoeffect if I have a "privileged network position" against a "blockchain" system I can construct a false reality the software will accept1 reply 0 retweets 0 likes -
Replying to @taoeffect
The cost of constructing such a false reality would be generating a considerable amount of proof work on namecoin?
@taoeffect@bascule1 reply 0 retweets 0 likes -
Replying to @taoeffect
Oh the proof of recentness attack... . we talked about that on moderncrypto too...
@taoeffect@bascule1 reply 0 retweets 0 likes -
Replying to @taoeffect
@taoeffect Facilitating a local root of trust is one design pattern CT should consider@bascule2 replies 0 retweets 1 like
@zmanian @taoeffect they could publish a Merkle tree root that gives a snapshot of the state of many auditors /cc @sleevi_
-
-
Replying to @bascule
@bascule@zmanian@taoeffect Shhhh... Don't steal all of@BenLaurie 's thunder for the grand gossip reveal. He's trying to Fermat it ;)0 replies 0 retweets 0 likesThanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.