Instructor's notes - before lecture
Completion requirements
The false identity or Sybil attack problem Undesirable consequences Sock puppetry in discussions Ballot stuffing Breaking algorithms, e.g., consensus Injecting deliberate bias, e.g., political Spreading FUD Countermeasures: IP addresses CAPTCHAs E-mail or phone number verification ID verification, PKI, KYC Social/trust networks Biometric identity Proof-of-Work Other investment Personhood parties or PoP Post-lecture blackboard snapshot 2019:
Last modified: Thursday, 5 November 2020, 6:05 PM
