@Hyolobrika @dpwiz Sorry, didn't get around to responding yesterday. Not sure if your questions are still relevant after you saw that document but I guess I'll answer anyway.
> What does “context-sensitive” mean in this context?
It means that
example.com only maps to the same place for you and me because we happen to observe the same conventions when resolving the address. Where a particular author intended for a name to point is dependent on their local context. Everyone pretends there's only one way to do this but in reality I am free to hack on my system resolver and resolve .com differently than everyone else does. People just *don't* because it would be completely unmanageable at present.
Actually technically they do, GNS, ENS, and Tor are all examples of such. Try to resolve a .onion domain on a computer that isn't running tor and see how well it goes. That's context sensitivity.
Another example of this breaking down is if you pull up an old fedi message and try to follow a link for
neckbeard.xyz. In the context of that message the author intended for that name to resolve to sjw's fedi instance but it no longer does. The current context is different and the link is now broken as a result.
> > nomadic key based identity for DNS
> What does this mean?
Right now a tld such as .com authorizes you to map a particular name to an ip address (or some other sort of DNS record, the exact details aren't important). To a third party visiting your website you *are* the name. But at the end of the day you don't really control that name, the respective tld does. How are you supposed to seamlessly handle a name change?
For GNS instead of the tld controlling "your" name they associate your key with that name and then you can map things under your key however you'd like. Instead of your name being your identity your name resolves to a cryptographic identity. And a user is able to save a copy of your key at any time, so if the tld changes things they can still resolve your stuff.
It might help to glance at the examples in this section of the docs.
https://www.gnunet.org/en/use.html#gns_cliI suppose an "evil" tld might hypothetically be able to refuse to publish your key and instead directly map ips for you. At least I assume - I don't know enough about the details so I might be wrong. But even if so, my understanding is that it's not intended to be used that way.
You'd still probably want "default" tlds like you have right now. And they'd still presumably be centrally controlled. Right now various certs come preinstalled with browsers and operating systems. I don't think that would change. What would change is that your domain becomes its own zone and people can alias it to whatever they want and there's a standardized way to share, install, and manage all these zone keys.
So to me it seems like blockchain DNS and GNS are somewhat orthogonal. Blockchain stuff is creating a new registrar that operates internally quite differently from the current ones and isn't subject to ICANN. GNS is about the protocol details of how you associate names with identities and sort of turns everyone into their own registrar. Then you register your registrar with another registrar under a name and everything is recursive.
Presumably an ENS domain under GNS would want to map to a zone key instead of an IP or whatever else. Since ENS already supports stuff like IPFS hashes I assume supporting GNS keys would be trivial but I don't actually know how it would all work.
@dpwiz @roboneko Thank you. This document (attached) helped me a lot anyway.