Instructor's notes - before lecture
The false identity or Sybil attack problem Undesirable consequences Sock puppetry in discussions Ballot stuffing Breaking algorithms, e.g., consensus Injecting deliberate bias, e.g., political Spreading FUD Countermeasures: IP addresses CAPTCHAs E-mail or phone number verification ID verification, PKI, KYC Social/trust networks Biometric identity Proof-of-Work Other investment Personhood parties or PoP Post-lecture blackboard snapshot 2019:
Last modified: Thursday, 5 November 2020, 18:05