Instructor's notes - before lecture
The false identity or Sybil attack problem
Undesirable consequences
Sock puppetry in discussions
Ballot stuffing
Breaking algorithms, e.g., consensus
Injecting deliberate bias, e.g., political
Spreading FUD
Countermeasures:
IP addresses
CAPTCHAs
E-mail or phone number verification
ID verification, PKI, KYC
Social/trust networks
Biometric identity
Proof-of-Work
Other investment
Personhood parties or PoP
Post-lecture blackboard snapshot 2019:
Last modified: Thursday, 5 November 2020, 18:05