The way DNS works in i2p makes it unreliable and vulnerable to attacks. It wouldn’t be to hard for an adversary to do a man in the middle or even do a fake version of a site. Also resolving DNS names is hard and takes a lot of effort.

Honestly the entire system needs to be rethought.

  • Possibly linux@lemmy.zipOP
    link
    fedilink
    English
    arrow-up
    2
    ·
    2 months ago

    I think the reason it isn’t like that is because it is incredibly complex to do. Also if there is a design flaw it could be used to attack people.

    • sploodged@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      2
      ·
      2 months ago

      definitely opens up another surface for attack, could see flooding namespace, sibyl, hijacking consensus mechanism somehow, lots of very bad content would surface too which some of the current “curators” try to dampen. Consensus mechanism would be tricky to get right

      • Possibly linux@lemmy.zipOP
        link
        fedilink
        English
        arrow-up
        1
        ·
        2 months ago

        It would need to have some sort of overhead cost to make attacks unfeasible. By adding that you would then be slowing everything down and creating a new source of problems.

        It isn’t a winning battle I guess.