1. You want to resolve a name.
2. You hash it.
3. You find this hash in the public database and obtain its encrypted value.
4. You hash the name again using a different hash algorithm.
5. You decrypt the value with the last hash as a key.
Search found 2 matches
Search found 2 matches • Page 1 of 1
- Fri Apr 27, 2018 4:29 pm
- Forum: General Discussion
- Topic: Why names are not encrypted?
- Replies: 5
- Views: 2945
Anybody can collect all id/ entries and spam their emails. Tor implemented V3 onion addresses to protect hidden sites from discovery of their existense, but public .bit domains destroy this feature. Instead of storing a plain text name its hash can be used. It uniquely identifies a name. You cannot ...