A community for the latest discussions about the cutting edge of crypto design, it's culture and significant crypto news. Decentralize everything. Check out our [Community Guidelines](https://relevant.community/crypto/post/6122269e61d1cd005a877277/62427d3ed587ad005b647828)
53485 Members
We'll be adding more communities soon!
© 2020 Relevant Protocols Inc.
A community for the latest discussions about the cutting edge of crypto design, it's culture and significant crypto news. Decentralize everything. Check out our [Community Guidelines](https://relevant.community/crypto/post/6122269e61d1cd005a877277/62427d3ed587ad005b647828)
53485 Members
We'll be adding more communities soon!
© 2020 Relevant Protocols Inc.
Relevant
Hot
New
Spam
Relevant
Hot
New
Spam
0
153
0
153
“Because .ETH names are native to ENS, ENS is the only source of truth for who owns a particular one, and no admin powers exist in ENS to take away a user’s .ETH name. Such admin powers do ultimately exist, however, for DNS names on ENS. Because whoever owns the name on DNS can always claim the corresponding name on ENS, the ultimate security of a DNS name on ENS depends on the security of the name on DNS.”
“Because .ETH names are native to ENS, ENS is the only source of truth for who owns a particular one, and no admin powers exist in ENS to take away a user’s .ETH name. Such admin powers do ultimately exist, however, for DNS names on ENS. Because whoever owns the name on DNS can always claim the corresponding name on ENS, the ultimate security of a DNS name on ENS depends on the security of the name on DNS.”
Some low-ranking comments may have been hidden.
Some low-ranking comments may have been hidden.