-
Notifications
You must be signed in to change notification settings - Fork 21
Open
Description
How does the current architecture prevent malicious actors from hijacking the services ?
For example, assume a popular worker / service, named "dns-lookup" that is served by worker A. What is preventing worker B to also start providing a service with the same name but bad results (or incorrect ip-addresses)?
Is there a validation mechanism built-in? Something like binding service names to their ed25519 public keys etc?
Metadata
Metadata
Assignees
Labels
No labels