Thanks. That’s informative. I would be happy with the DNS route only if I had faith in DNSSEC receiving wide adoption.
As far as I’m aware every resolver on every system I use will silently fail open to non-DNSSEC DNS. It feels like that’s going to be the case for a long time yet, so maybe the rely on DNS you can trust route isn’t the best option.
To be clear: I’m not worried about malicious nodes on the IPFS network corrupting data which I’ve asked for. It’s more about how to avoid being phished with ipfs:// links I find posted online whose contents claim to be something they are not.
I hadn’t realised how much I relied on the safety of the padlocked domain name at the top of my browser, and on the domain name in links over which I hover. With plain IPFS every click feels like a new website?
As far as I’m aware every resolver on every system I use will silently fail open to non-DNSSEC DNS. It feels like that’s going to be the case for a long time yet, so maybe the rely on DNS you can trust route isn’t the best option.
To be clear: I’m not worried about malicious nodes on the IPFS network corrupting data which I’ve asked for. It’s more about how to avoid being phished with ipfs:// links I find posted online whose contents claim to be something they are not.
I hadn’t realised how much I relied on the safety of the padlocked domain name at the top of my browser, and on the domain name in links over which I hover. With plain IPFS every click feels like a new website?