{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2026:YQ5CMQVNG7SJ7VUXDUNP34IUAP","short_pith_number":"pith:YQ5CMQVN","canonical_record":{"source":{"id":"2605.20984","kind":"arxiv","version":1},"metadata":{"license":"http://creativecommons.org/licenses/by-sa/4.0/","primary_cat":"cs.CR","submitted_at":"2026-05-20T10:14:21Z","cross_cats_sorted":["cs.NI"],"title_canon_sha256":"bcc1080d0736bcdd230393bcf1853bead50d6147ba5c2ac166eca73cc6c3fc30","abstract_canon_sha256":"ce4d57d4824e169a0a61f528e726d6a713c801537030ffe4d05d95374a931ea7"},"schema_version":"1.0"},"canonical_sha256":"c43a2642ad37e49fd6971d1afdf11403e03505464982adc26e26ac88fa1f3f5d","source":{"kind":"arxiv","id":"2605.20984","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.20984","created_at":"2026-05-21T01:05:31Z"},{"alias_kind":"arxiv_version","alias_value":"2605.20984v1","created_at":"2026-05-21T01:05:31Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.20984","created_at":"2026-05-21T01:05:31Z"},{"alias_kind":"pith_short_12","alias_value":"YQ5CMQVNG7SJ","created_at":"2026-05-21T01:05:31Z"},{"alias_kind":"pith_short_16","alias_value":"YQ5CMQVNG7SJ7VUX","created_at":"2026-05-21T01:05:31Z"},{"alias_kind":"pith_short_8","alias_value":"YQ5CMQVN","created_at":"2026-05-21T01:05:31Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2026:YQ5CMQVNG7SJ7VUXDUNP34IUAP","target":"record","payload":{"canonical_record":{"source":{"id":"2605.20984","kind":"arxiv","version":1},"metadata":{"license":"http://creativecommons.org/licenses/by-sa/4.0/","primary_cat":"cs.CR","submitted_at":"2026-05-20T10:14:21Z","cross_cats_sorted":["cs.NI"],"title_canon_sha256":"bcc1080d0736bcdd230393bcf1853bead50d6147ba5c2ac166eca73cc6c3fc30","abstract_canon_sha256":"ce4d57d4824e169a0a61f528e726d6a713c801537030ffe4d05d95374a931ea7"},"schema_version":"1.0"},"canonical_sha256":"c43a2642ad37e49fd6971d1afdf11403e03505464982adc26e26ac88fa1f3f5d","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-21T01:05:31.017215Z","signature_b64":"xJHB7S4Vo2kdY6M3lj45lJTB92qDpcTm+ca7WM+X/EiYKS0DTKOIAF2HK65O0aKGCAtUzspXBjEjIsTOelOuBg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"c43a2642ad37e49fd6971d1afdf11403e03505464982adc26e26ac88fa1f3f5d","last_reissued_at":"2026-05-21T01:05:31.016407Z","signature_status":"signed_v1","first_computed_at":"2026-05-21T01:05:31.016407Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"2605.20984","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T01:05:31Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"AlynPCMAeQr1u/jxLhOOHoFaGLGwOykCl8/4qXZ3iRHhLESDvxLQI6ZY6bVDZvX4fjlAFS199TYkLTegVeoRAg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T09:04:30.303604Z"},"content_sha256":"73dcceee910fd9c5fa9ea2d67fe16dd33cbdc90c113a5b99eb6d34786f3e8951","schema_version":"1.0","event_id":"sha256:73dcceee910fd9c5fa9ea2d67fe16dd33cbdc90c113a5b99eb6d34786f3e8951"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2026:YQ5CMQVNG7SJ7VUXDUNP34IUAP","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Domijn: The Security of Domain Registrars and the Risk of a Domain Name Takeover","license":"http://creativecommons.org/licenses/by-sa/4.0/","headline":"","cross_cats":["cs.NI"],"primary_cat":"cs.CR","authors_text":"Jeroen van der Ham-de Vos, Koen van Hove, Roland van Rijswijk-Deij","submitted_at":"2026-05-20T10:14:21Z","abstract_excerpt":"Domain names are key assets for organisation. They anchor an organisation's online presence and reputation, and serve as linking pin for web services and, e.g., email. Consequently, a malicious takeover of a domain can lead to significant damages. Organisations register domain names through so-called registrars, a type of business that plays a key role in the domain name industry. This implies that registrars play an important part in safeguarding against malicious takeovers of domains. In this paper we empirically study how registrars implement security controls to prevent against such takeov"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2605.20984","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"integrity":{"clean":true,"summary":{"advisory":0,"critical":0,"by_detector":{},"informational":0},"endpoint":"/pith/2605.20984/integrity.json","findings":[],"available":true,"detectors_run":[],"snapshot_sha256":"c28c3603d3b5d939e8dc4c7e95fa8dfce3d595e45f758748cecf8e644a296938"},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T01:05:31Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"zdyw0hynuYDCI9CyJRPvnPQv06OGd+xaBmKTI5ZwrXofAXy4NXlMo2LDWMwx7Ckt2JEjbOFTDd5LQdIFkULPCQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T09:04:30.304409Z"},"content_sha256":"4b0ba9aadf2481a3ae2af64dacd61e36f340d6017d72dfbe7a9962ebadea08ed","schema_version":"1.0","event_id":"sha256:4b0ba9aadf2481a3ae2af64dacd61e36f340d6017d72dfbe7a9962ebadea08ed"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/YQ5CMQVNG7SJ7VUXDUNP34IUAP/bundle.json","state_url":"https://pith.science/pith/YQ5CMQVNG7SJ7VUXDUNP34IUAP/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/YQ5CMQVNG7SJ7VUXDUNP34IUAP/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-23T09:04:30Z","links":{"resolver":"https://pith.science/pith/YQ5CMQVNG7SJ7VUXDUNP34IUAP","bundle":"https://pith.science/pith/YQ5CMQVNG7SJ7VUXDUNP34IUAP/bundle.json","state":"https://pith.science/pith/YQ5CMQVNG7SJ7VUXDUNP34IUAP/state.json","well_known_bundle":"https://pith.science/.well-known/pith/YQ5CMQVNG7SJ7VUXDUNP34IUAP/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2026:YQ5CMQVNG7SJ7VUXDUNP34IUAP","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"ce4d57d4824e169a0a61f528e726d6a713c801537030ffe4d05d95374a931ea7","cross_cats_sorted":["cs.NI"],"license":"http://creativecommons.org/licenses/by-sa/4.0/","primary_cat":"cs.CR","submitted_at":"2026-05-20T10:14:21Z","title_canon_sha256":"bcc1080d0736bcdd230393bcf1853bead50d6147ba5c2ac166eca73cc6c3fc30"},"schema_version":"1.0","source":{"id":"2605.20984","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.20984","created_at":"2026-05-21T01:05:31Z"},{"alias_kind":"arxiv_version","alias_value":"2605.20984v1","created_at":"2026-05-21T01:05:31Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.20984","created_at":"2026-05-21T01:05:31Z"},{"alias_kind":"pith_short_12","alias_value":"YQ5CMQVNG7SJ","created_at":"2026-05-21T01:05:31Z"},{"alias_kind":"pith_short_16","alias_value":"YQ5CMQVNG7SJ7VUX","created_at":"2026-05-21T01:05:31Z"},{"alias_kind":"pith_short_8","alias_value":"YQ5CMQVN","created_at":"2026-05-21T01:05:31Z"}],"graph_snapshots":[{"event_id":"sha256:4b0ba9aadf2481a3ae2af64dacd61e36f340d6017d72dfbe7a9962ebadea08ed","target":"graph","created_at":"2026-05-21T01:05:31Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"integrity":{"available":true,"clean":true,"detectors_run":[],"endpoint":"/pith/2605.20984/integrity.json","findings":[],"snapshot_sha256":"c28c3603d3b5d939e8dc4c7e95fa8dfce3d595e45f758748cecf8e644a296938","summary":{"advisory":0,"by_detector":{},"critical":0,"informational":0}},"paper":{"abstract_excerpt":"Domain names are key assets for organisation. They anchor an organisation's online presence and reputation, and serve as linking pin for web services and, e.g., email. Consequently, a malicious takeover of a domain can lead to significant damages. Organisations register domain names through so-called registrars, a type of business that plays a key role in the domain name industry. This implies that registrars play an important part in safeguarding against malicious takeovers of domains. In this paper we empirically study how registrars implement security controls to prevent against such takeov","authors_text":"Jeroen van der Ham-de Vos, Koen van Hove, Roland van Rijswijk-Deij","cross_cats":["cs.NI"],"headline":"","license":"http://creativecommons.org/licenses/by-sa/4.0/","primary_cat":"cs.CR","submitted_at":"2026-05-20T10:14:21Z","title":"Domijn: The Security of Domain Registrars and the Risk of a Domain Name Takeover"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2605.20984","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:73dcceee910fd9c5fa9ea2d67fe16dd33cbdc90c113a5b99eb6d34786f3e8951","target":"record","created_at":"2026-05-21T01:05:31Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"ce4d57d4824e169a0a61f528e726d6a713c801537030ffe4d05d95374a931ea7","cross_cats_sorted":["cs.NI"],"license":"http://creativecommons.org/licenses/by-sa/4.0/","primary_cat":"cs.CR","submitted_at":"2026-05-20T10:14:21Z","title_canon_sha256":"bcc1080d0736bcdd230393bcf1853bead50d6147ba5c2ac166eca73cc6c3fc30"},"schema_version":"1.0","source":{"id":"2605.20984","kind":"arxiv","version":1}},"canonical_sha256":"c43a2642ad37e49fd6971d1afdf11403e03505464982adc26e26ac88fa1f3f5d","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"c43a2642ad37e49fd6971d1afdf11403e03505464982adc26e26ac88fa1f3f5d","first_computed_at":"2026-05-21T01:05:31.016407Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-21T01:05:31.016407Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"xJHB7S4Vo2kdY6M3lj45lJTB92qDpcTm+ca7WM+X/EiYKS0DTKOIAF2HK65O0aKGCAtUzspXBjEjIsTOelOuBg==","signature_status":"signed_v1","signed_at":"2026-05-21T01:05:31.017215Z","signed_message":"canonical_sha256_bytes"},"source_id":"2605.20984","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:73dcceee910fd9c5fa9ea2d67fe16dd33cbdc90c113a5b99eb6d34786f3e8951","sha256:4b0ba9aadf2481a3ae2af64dacd61e36f340d6017d72dfbe7a9962ebadea08ed"],"state_sha256":"902f50282a1655425c9eeb28511339e68e067ffbbde668413ab392c86d651c53"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"bfB/jtXaPWHDtuUAeZHdKtbj3DN6RRKUP29hhZ6FaIKcwacET025LVf9VWTpOcTKfqm78IvwgPciE1CuFLPxDw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-23T09:04:30.308365Z","bundle_sha256":"a75d8d4d1782cab10f71a3dfa2cd0ec0f77f2ef4f13315e5b76e0a96fe5cf681"}}