Fact-checked by Grok 2 weeks ago
References
-
[1]
[PDF] The Sybil Attack - The Free Haven ProjectAbstract – Large-scale peer-to-peer systems face security threats from faulty or hostile remote computing elements. To resist these threats, many such systems ...<|control11|><|separator|>
-
[2]
Sybil Attack - Glossary | CSRCDefinitions: A cybersecurity attack wherein an attacker creates multiple accounts and pretends to be many persons at once. Sources: NISTIR 8301.
- [3]
-
[4]
Sybil in the Haystack: A Comprehensive Review of Blockchain ...As the need for Sybil attack resistance only arises in these truly decentralised systems, research into these attacks is still in its infancy. Many different ...
-
[5]
Full article: Sybil attack vulnerability trilemma - Taylor & Francis OnlineProof of work (PoW) is the archetypal approach to preventing Sybil attacks. While it predates Bitcoin [Citation84], its use in the context of decentralised ...
-
[6]
Sybil attack detection and traceability scheme based on temporal ...This study introduces a Sybil attack tracing method based on a temporal heterogeneous graph attention network designed for vehicle networks. As cooperative ...
-
[7]
The Sybil Attack - Microsoft ResearchJan 1, 2002 · The Sybil Attack. John (JD) Douceur. Proceedings of 1st ... This paper shows that, without a logically centralized authority, Sybil attacks ...Missing: definition | Show results with:definition
-
[8]
The Sybil Attack | SpringerLinkOct 10, 2002 · This paper shows that, without a logically centralized authority, Sybil attacks ... An Efficient Sybil Attack Detection for Internet of Things.The Sybil Attack · Chapter Pdf · About This PaperMissing: definition | Show results with:definition
-
[9]
[PDF] chaum-mix.pdf - The Free Haven ProjectUntraceable Electronic Mail,. Return Addresses, and. Digital Pseudonyms. David L. Chaum. University of California, Berkeley. A technique based on public key ...
-
[10]
Untraceable electronic mail, return addresses, and digital pseudonymsUntraceable electronic mail, return addresses, and digital pseudonyms. Author: David L. Chaum ... First page of PDF. Formats available. You can view the full ...
-
[11]
The Spam That Started It All | WIREDApr 13, 1999 · The notorious "Green Card Spam" marked the beginning of a flood of spam that has since made Usenet a very different place.
-
[12]
[PDF] SoK: The Evolution of Sybil Defense via Social NetworksThe goal of sybil defense is to accurately identify sybil identities. This paper surveys the evolution of sybil defense protocols that leverage the structural ...
-
[13]
[PDF] Mitigation of Sybil-based Poisoning Attacks in Permissionless ... - HALMar 24, 2025 · Despite its advantages, the decentralized nature of these systems increases vulnerability to malicious behavior. A sig- nificant threat is the ...<|control11|><|separator|>
- [14]
-
[15]
[PDF] A Survey of Solutions to the Sybil AttackA Sybil attack is when one entity masquerades as multiple identities. Trusted certification is a potential solution, but requires a centralized authority.
-
[16]
The Sybil AttackThis paper shows that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource ...
-
[17]
[PDF] The Sybil Attacks and Defenses: A Survey - arXivDec 22, 2013 · Attacking the kad network, 2009. [26] B.N. Levine, C. Shields, and N.B. Margolin. A survey of solutions to the sybil attack. Technical.
-
[18]
[PDF] SybilDefender: Defend Against Sybil Attacks in Large Social Networksattack edges in online social networks by relationship rating. I. INTRODUCTION. Distributed systems are vulnerable to sybil attacks [7], in which an ...<|control11|><|separator|>
-
[19]
The Sybil Attack | Revised Papers from the First International ...This paper shows that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions.Missing: origin | Show results with:origin
-
[20]
[PDF] Real-World Sybil Attacks in BitTorrent Mainline DHTBitTorrent has two independent, incompatible distributed tracker implementations, even though both are based on the Kademlia DHT [2]. ... attack in p2p file ...<|control11|><|separator|>
-
[21]
Sybil Attack Strikes Again: Denying Content Access in IPFS with a ...Jul 30, 2024 · A practical use of this attack is to almost entirely deny access to a given content on the network. Thus we provide some recommendations to ...
-
[22]
[PDF] Sybil Attack Strikes Again: Denying Content Access in IPFS with a ...Aug 1, 2024 · Douceur in 2002 [12], many research papers have refined the attack and ... iting Sybil Attacks in Structured P2P Networks. In 26th IEEE ...<|control11|><|separator|>
- [23]
-
[24]
Preventing Sybil attacks - IOHK BlogOct 28, 2018 · This type of attack, where the attacker assumes many identities, is called a Sybil attack, named after the 1973 novel Sybil by Flora Rheta Schreiber.
-
[25]
What Is a Sybil Attack in Crypto? - LedgerMar 7, 2024 · A Sybil attack is when a single entity attempts to gain control over a blockchain network through the use of multiple fraudulent nodes.
-
[26]
[PDF] A Truth-Inducing Sybil Resistant Decentralized Blockchain OracleA non- linear stake scaling rule is proposed to discourage Sybil attacks. This paper also provides a theoretical analysis and guidelines for implementation as ...
-
[27]
Fraud Proofs Are Broken - Layer 2 - Ethereum ResearchApr 8, 2024 · Fraud proofs are vulnerable to Sybil attacks, and the financial imbalance between honest and dishonest validators makes the hero at a ...
-
[28]
Review of Vulnerabilities and Countermeasures Against Sybil ...The current paper summarizes the pertinent studies on Sybil attacks, discusses how to avoid them, and offers potential countermeasures to Sybil attacks.Missing: methods | Show results with:methods
-
[29]
[1504.05522] Survey of Sybil Attacks in Social Networks - arXivApr 21, 2015 · Abstract:This paper reviews the Sybil attack in social networks, which has the potential to compromise the whole distributed network.Missing: scholarly | Show results with:scholarly<|separator|>
-
[30]
An analysis of social network-based Sybil defensesIn this paper, we show that, despite their considerable differences, existing Sybil defense schemes work by detecting local communities.
-
[31]
The Rise of Social Bots - Communications of the ACMJul 1, 2016 · But false accusations also circulated widely on Twitter in the aftermath of the attack, mostly due to bots automatically retweeting posts ...
-
[32]
[PDF] Detecting Elite Sybil Attacks in User-Review Social NetworksFeb 18, 2018 · We observe that 12.4% of Sybil communities post fake reviews for chain stores, which is different from recent research performed on Yelp [27].
-
[33]
Covert Influence Operations - TikTokThis report contains information about the covert influence operations disrupted between August 1-31, 2025. In addition to these network disruptions, we removed ...
-
[34]
(PDF) SOCIAL MEDIA SYBIL DETECTION IN THE AGE OF AI ...Oct 9, 2025 · This article systematizes new countermeasures, including the use of LLMs themselves to detect stylistic anomalies in text (e.g., perplexity ...
-
[35]
[PDF] The Sybil Attack in Sensor Networks: Analysis & Defenses∗A Sybil attack is when a malicious node illegitimately claims multiple identities, acting as if it were a larger number of nodes.
-
[36]
[PDF] SybilControl: Practical Sybil Defense with Computational PuzzlesMany distributed systems are subject to the Sybil attack, where an adversary subverts system operation by emulating the behavior of multiple distinct nodes.
-
[37]
NoneNothing is retrieved...<|separator|>
-
[38]
None### Summary of Memory-Bound Functions and Their Use in Resisting Sybil Attacks
-
[39]
Web3 Sybil avoidance using network latency - ScienceDirect.comWe show how message flows of latency measurements can be used to detect Sybils over the Internet (Section 5). 4. We create a version of our peer sampling ...
-
[40]
None### Summary: How Proof-of-Work Prevents Sybil Attacks in Bitcoin
-
[41]
Zero-Knowledge Proof-of-Identity: Sybil-Resistant, Anonymous ...May 22, 2019 · Zero-Knowledge Proof-of-Identity from trusted public certificates (e.g., national identity cards and/or ePassports; eSIM) is introduced here ...Missing: resource 2020s
-
[42]
[PDF] Aiding the Detection of Fake Accounts in Large Scale Social Online ...It relies on social graph properties to rank users according to their perceived like- lihood of being fake (Sybils). SybilRank is computation- ally efficient ...Missing: 2012 | Show results with:2012
-
[43]
[PDF] Uncovering Social Network Sybils in the Wildof SIGCOMM (2006). 265. Page 8. Summary Review Documentation for. “Uncovering Social Network Sybils in the Wild”. Authors: Z. Yang, C. Wilson, X. Wang, T. Gao ...
- [44]
-
[45]
Battling Fake Accounts, Twitter to Slash Millions of FollowersJul 11, 2018 · Twitter will begin removing tens of millions of suspicious accounts from users' followers on Thursday, signaling a major new effort to restore trust.
-
[46]
Mitigating identity attacks in DeFi through biometric-based Sybil ...Jul 13, 2023 · This paper proposes a novel approach to enhance the security of DeFi platforms through the integration of Sybil-resistant techniques like ...
-
[47]
[PDF] Webs of Trust: Choosing Who to Trust on the InternetSybil attack A problem related to cheap pseudonyms is the Sybil attack [23], where a system, or parts of it, is subverted by creating a large—and possibly.
- [48]
-
[49]
[PDF] Limiting Sybil Attacks in Structured P2P Networks - William EnckAttack on a steady network (attack starts at t = 10 hours). with a mean of 2.3 hours. This is consistent with a study performed on the Gnutella P2P network [6].
-
[50]
Decentralized Society: Finding Web3's SoulMay 11, 2022 · Vitalik Buterin In this paper, we illustrate how non-transferable “soulbound” tokens (SBTs) representing the commitments, credentials, and ...<|separator|>
-
[51]
[PDF] DEFENSE AGAINST SYBIL ATTACK IN VEHICULAR AD HOC ...Newsome et al. [8] proposed radio resource testing and pair-wise key based Sybil attack detection method in a static wireless sensor network. Due to the ...
-
[52]
[PDF] Attack Resistant Trust Metrics - Raph LevienWe discuss experiences with a real- world deployment of a group trust metric, the Advogato website. Finally, we explore possible applications of attack.
-
[53]
[PDF] The EigenTrust Algorithm for Reputation Management in P2P ...Sybil Attack. An adversary initiates thousands of peers on the network. Each time one of the peers is selected for download, it sends an inauthentic file ...
-
[54]
[PDF] Designs to Account for Trust in Social Network-based Sybil DefensesIn this paper we study paramagnetic designs to tune the per- formance of Sybil defenses by accounting for trust in social graphs and modeling the trust as ...Missing: erosion | Show results with:erosion
-
[55]
Gitcoin Passport: Identity Verification Built on CeramicNov 9, 2022 · The Gitcoin Passport and the Trust Bonus are grants mechanisms that provide identity verification, improve Sybil resistance, increase the cost ...
-
[56]
[PDF] Swirlds and Sybil AttacksJun 6, 2016 · - Proof of burn - the same as proof of stake, but the member must actually prove that they destroyed the Bitcoin in question. In other words ...
-
[57]
Quantifying Resistance to the Sybil Attack - ACM Digital LibraryWe show that for many applications, successful Sybil attacks may be expensive even when the Sybil attack cannot be prevented. ... Memory-Bound Functions.
-
[58]
Impact of Proof of Work (PoW)-Based Blockchain Applications on the ...Mar 31, 2023 · This paper analyses blockchain's dominant consensus method, Proof-of-Work (PoW), which consumes more energy than Malaysia and Sweden and further deteriorates ...
-
[59]
Tech Deep-Dive: How Cypherium's Hybrid Consensus WorksMay 12, 2025 · In essence, Cypherium uses Proof-of-Work to maintain decentralization and Sybil resistance, while using HotStuff BFT to achieve high throughput ...
-
[60]
Proof of Personhood Protocols - Identity Management Institute®Apr 17, 2025 · PoP systems are implemented to prevent Sybil attacks, whereby a single attacker creates numerous pseudonymous identities to manipulate networks ...
-
[61]
What is a Sybil Attack | Examples & Prevention - ImpervaThe name of this attack was inspired by a 1973 book called Sybil, a woman diagnosed with a dissociative identity disorder. In the context of attacks, the term ...
-
[62]
Why Proof of Humanity Is More Important Than Ever - Identity.comProof of Humanity (PoH) is a system designed to verify that participants in a digital system are actual people, not automated bots or fake accounts.<|control11|><|separator|>
-
[63]
World Whitepaper - WorldcoinWithin the context of a H protocol those claims are related to proving uniqueness and personhood. Credential: A collection of data that serves as proof for ...
-
[64]
Worldcoin - Blockchain.comThe project creates a global proof-of-personhood system using iris scans to ... Worldcoin officially launched on July 24, 2023, introducing both the ...
-
[65]
Introducing reCAPTCHA v3: the new way to stop botsToday, we're excited to introduce reCAPTCHA v3, our newest API that helps you detect abusive traffic on your website without user interaction.Missing: mouse | Show results with:mouse
-
[66]
Google's reCaptcha v3 analyzes signals across pages to detect ...Oct 29, 2018 · Google's reCaptcha v3 API ingests and analyzes signals from multiple webpages to generate a score discriminating a human from a bot, ...<|separator|>
-
[67]
4 Ways Gitcoin Passport Can Help DAOsAug 29, 2022 · Passport is a toolkit to build Proof of Personhood algorithms. With Gitcoin Passport, DAOs can seamlessly implement a system for establishing ...
-
[68]
Social media's age verification crisis: Can platforms solve the ...Jul 1, 2025 · Many age verification technologies use sensitive data, such as facial scans, government-issued IDs, or biometrics, which presents major privacy ...
-
[69]
Biometric Age Verification: A Modern Solution to Protect Minors from ...May 2, 2025 · Biometric age verification has emerged as a powerful tool to enforce digital safety regulations and ensure age-appropriate access to online platforms.<|separator|>
-
[70]
Sam Altman Wants Your Eyeball - Privacy GuidesMay 10, 2025 · The scan is then filtered and hashed to create a unique identifier that is stored as a so-called "proof of personhood" on the World Network, a ...<|separator|>
-
[71]
How deepfakes threaten biometric security controls - TechTargetJun 17, 2024 · Biometric security controls are under attack by deepfakes -- convincing images, videos and audio created by generative AI. But all is not lost.
-
[72]
Latest Silicon Valley craze is eyeball-scanning orb from WorldcoinAug 13, 2023 · The iris-scanning orbs are part of a project called Worldcoin ... proof of personhood" problem. In plain English: being able to prove ...
-
[73]
Trust Stamp Unveils Zero-Knowledge Proofs for Remote HumanSep 23, 2025 · Trust Stamp Unveils Zero-Knowledge Proofs for Remote Human Presence, Advancing KYC and Age Assurance ... Atlanta, GA, Sept. 23, 2025 (GLOBE ...Missing: personhood | Show results with:personhood
-
[74]
'Cross-platform reputation' comes to Humanity Protocol with zkTLSAug 12, 2025 · Related Posts ; Humanity Protocol prepares to launch palm biometrics for proof of personhood. May 8, 2025 ; Humanity Protocol partners with ...Missing: advancements | Show results with:advancements
-
[75]
Fostering AI alignment through blockchain, proof of personhood and ...Oct 9, 2025 · The proposed AI alignment system is formally described to capture human and AI agents, verification, authentication, and Sybil resistance. The ...Missing: attestation | Show results with:attestation
-
[76]
MAC-Layer Spoofing Detection and Prevention in IoT SystemsPrevention of spoofing attacks is a hard problem. We propose a method of preventing the MAC Address spoofing attack. Here we will use an intermediate or ...
-
[77]
[PDF] Detecting Sybil Attacks using Proofs of Work and Location in VANETsApr 11, 2019 · Extensive experiments and simulations demonstrate that our scheme achieves high detection rate to Sybil attacks with low false negative and ...
-
[78]
Keynote: Provable Slashing Guarantees - ACM Digital LibraryJun 17, 2024 · With respect to Ethereum, our work formalizes the potential security benefits of proof-of-stake sybil-resistance coupled with slashing and the ...
-
[79]
EdenDID: an edge computing and blockchain-based decentralized ...Oct 17, 2025 · In this paper, we proposed EdenDID, a novel identity management system that leverages edge computing to mitigate Sybil attacks in diverse Web3 ...
-
[80]
A Survey of Defense Mechanisms Against Sybil Attacks on IoT with ...Several defense mechanisms have been proposed for Sybil attacks on WANET, which are mostly based on cryptography, location/position, network behavior, resource ...
-
[81]
Sybil-Resistant Distributed Identities for the Internet of Things and ...Jul 29, 2020 · In this paper, we present Rechained, a scheme that monetarily disincentivizes the creation of Sybil identities for networks that can operate ...