Aux root: Difference between revisions

From Cibernética Americana
Jump to navigationJump to search
No edit summary
No edit summary
Line 31: Line 31:


</blockquote>
</blockquote>
As used here, the background operation of the public priced name systems are assumed as needed, excluded where prohibited, e.g. for privacy or security.
As used here, the background operation of the public priced name systems are assumed as needed, excluded where prohibited, e.g. for privacy or security. Our system is constructed using the standard unix networking software and forms a superspace of the public name system with these properties:
<ul>
<li>Individual operators of the system determine which TLDs they recognize. The system administered here only allocates the TLDs FCFS to operators, it doesn't otherwise act as an authoritative source even for the .dom name.</li>
<li>IPV6 and TLS are defaults</li>
<li>A rich default common systems application environment is provided in which all users are identified, traceable, at least in principal.</li>
</ul>
</blockquote>
</blockquote>
<hr>
<hr>