You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Jul 15, 2019. It is now read-only.
Hey folks! Interested in your work. Could summarize some of the changes being considered, compared to dename and CONIKS? (I'd also like to hear what quorum algorithms you're considering, now.)
Thanks!
The text was updated successfully, but these errors were encountered:
I think of coname as being quite like dename, except that the semi-decentralized consensus (that would ideally be implemented using something like Stellar Consensus Protocol) is replaced with letting the service provider associated with namespace dictate the order in which changes are applied to it. After an entry is recorded in the system, both systems require a signature from an authorized key to change it, and both systems allow third-party verifiers to vet and certify that key changes are handled correctly. The difference between coname and CONIKS is larger; CONIKS only lets third-party auditors vet that everybody sees a consistent view, each user is responsible for vetting changes to their own key and raising alarm in case an unauthorized change is detected. Nevertheless, coname includes the VRF-based system from CONIKS for hiding the usernames of registered users from third-party verifiers.
Hey folks! Interested in your work. Could summarize some of the changes being considered, compared to dename and CONIKS? (I'd also like to hear what quorum algorithms you're considering, now.)
Thanks!
The text was updated successfully, but these errors were encountered: