Sybil Attack - Reading Assignment

1 What is the general idea of a sybil attack?
2 What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?

1 To gain gain a disproportionately large influence, by creating fake users that trust you to prof that you are more credibility then others.

2 It´s easy to create more than one identity, because it´s mostly anonymously.

1 Like
  1. What is the general idea of a sybil attack?
    To create numerous fictitious identities in order to give the appearance of many distinct individuals for the purpose of gaining influence/control over a network/system.

  2. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?
    Not verifying identities, no algorithms that analyze an identity to verify authenticity/trustworthiness, and no barriers to entry such as financial costs/proof of work.

1 Like
  1. What is the general idea of a sybil attack?
    A sybil attack is concerned with creating a large number of fictitious identities and using them to gain a disproportionately large influence.

  2. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?
    Being anonymous, cheaply creating fictitious entities to influence the outcome.

1 Like
  1. A large amount of (fake) identities are created in order to gain influence on a network.

  2. Poor identity validation, and low thresholds for identity creation.

1 Like
  1. The general idea of a sybil attack is to overrun a network using multiple accounts/ alias.

  2. Lack of consensus mechanism or rules that govern how a network probuces blocks or loss in computing power.

1 Like
  1. What is the general idea of a sybil attack?
    A Sybil attack is a security threat where a single node on the Blockchain has the capability to create and operate multiple nodes actively at the same time.
    Using this deception, the main aim of this attack is to gain the majority of influence in the network to carry out illegal actions (with respect to rules and laws) in the system.
    To outside observers, these multiple fake identities appear to be real unique identities.

  2. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?
    Not validating identifies. anonymity of IP addresses, not having a Consensus algorithm.

1 Like
  1. What is the general idea of a sybil attack?
    the attacker creates a large amount of pseudonymous identities and gains large influence over a network.

  2. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?
    If many identities can be created cheaply and easily - the system generally wants to have a one account per person and would need to validate each entity.
    If there were no potential for economic loss as a result of the attack i.e. proof of work and proof of stake help prevent this attack as the attacker would lose their money.

1 Like

1.) to attack a peer to peer network with a lot of pseudonyms.

2.) the anonymity, the trust of the networ, how easy it is to generate identitys.

1 Like

Reading Assignment: Sybil Attacks.

  1. What is the general idea of a sybil attack?
    If one entity makes or creates many (“false”) identities, that will give this one entity more influence on a system or network.

  2. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?
    If it has weak consensus algorithm and it is cheep to make identities, it’s more vulnerable for Sybil Attack.
    With strong consensus algorithm network (or system), Sybil Attack may be to risky and expensive for the scammer, to execute.

1 Like
  • What is the general idea of a sybil attack?
    it is a type of attack wherein an attacker has many pseudonymous identities within a peer to peer network and uses them to gain a large amount of influence.

  • What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?
    a glitch in the network or a very weak security system

1 Like
  1. What is the general idea of a sybil attack?
    One entity gaining influence over a network by creation a large number of false identities

  2. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?
    Low cost of creating multiple identities for gaining voting rights in the network
    Lack of economic repercussions for dishonest participants

1 Like
  1. Sybil attack is the use of multiple identity’s to gain influence on a network.

  2. Cheap identity cost, anonymity, lack of consensus

1 Like
  1. In a Sybil (pseudospoofing) attack, the perpetrator creates enough online identities to begin to influence network phenomena, e.g. voting, traffic, etc.

  2. Things like insufficiently many members (or computing resources required for network interaction), lacking a KYC/AML or some kind of difficulty in creating an identity (e.g. personhood checks like biometrics), and having no use-case specific mitigation can all contribute to this vulnerability

1 Like
  1. What is the general idea of a sybil attack?
    Attacker’s ability of creating multiple identities on a network.

  2. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?
    Low cost for creating multiple identities.

1 Like
  1. The general idea of the sybil attack is to create multiple identities with the motive to gain large influence.
  2. Bitcoin trading suffers from illiquidity and manipulation(different identities) because of the existence of “whale wallets” (wallets holding disproportionately large amounts of bitcoins) which can allow sybil attack to occur.
1 Like

1. What is the general idea of a sybil attack?
A Sybil attack is where the system is compromised by creating numerous (easy to create) identities in order to gain access.

2. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?
If multiple identities are cheaply created then that could sway consensus algorithms.

1 Like
  1. One entity presents itself as multiple identities appearing as multiple distinct nodes in which leads to a disproportionate level of control over the network.

  2. Being able to create multiple identities easily and inexpensively which are responsible for securing the system through a form of consensus.

1 Like

:one: What is the general idea of a sybil attack?

A Sybil attack is made possible by some entity (or group of entities) creating many-to-one identities on a network in order to gain outsized influence.

This is often possible where there is low or no barrier to entry into a network.

In the case where a network provides participants with anonymity, a participant is easily able to anonymously pretend to be many act as many different people.

The benefits of having multiple identities on a network could be wide-ranging - however a popular example is that of some democratic vote.
If a decision occurs based on number of votes, someone can artificially inflate the number of votes to influence the decision in their favour.
This would be a garden variety Sybil Attack.

:two: What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?

Where participants of a system are anonymous or pseudo-anonymous, entities can join the network with low barrier-to-entry.
When there is low, or no barrier to entry, the can easily derive multiple private keys and have multiple identities.
As far as the network is concerned, the individual who holds 100 different private keys are 100 different people.

If there were to be some vote which takes into account the number of private key signatures voting on some option, a person could create many identities to influence the decision to their favour.

2 Likes
  1. What is the general idea of a sybil attack?
    A bunch of nodes controlled by a malicious actor attacks one node by preventing it from connecting to the network and therefor preventing you from seeing the true transactions on the blockchain.

  2. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?
    The network might be small enough that it might be cheap to perform the sybil attack.

  1. What is the general idea of a sybil attack?
    creating a large number of pseudonymous identities and using it to gain disproportionate influence.
  2. What deficiencies within a system (such as a cryptocurrency network) can allow a sybil attack to occur?
    consensus algorithm between nodes for confirmation