• The false identity or Sybil attack problem

    • Undesirable consequences

  • Sock puppetry in discussions

  • Ballot stuffing

  • Breaking algorithms, e.g., consensus

  • Injecting deliberate bias, e.g., political

  • Spreading FUD

  • Countermeasures:

  • IP addresses

  • CAPTCHAs

  • E-mail or phone number verification

  • ID verification, PKI, KYC

  • Social/trust networks

  • Biometric identity

  • Proof-of-Work

  • Other investment

  • Personhood parties or PoP



Post-lecture blackboard snapshot 2019:

Last modified: Thursday, 5 November 2020, 18:05