web3 with a16z crypto cover image

PoS Blockchains - Designs, Consensus, Attacks

web3 with a16z crypto

CHAPTER

Is It a Sibil Attack?

The risk of not knowing who is doing what in this kind of decentralized system is much higher. You don't want the set of ientities that you rely on to be inflated by bots without any real entities of humans. So there are two approaches to sibile resistance, or two main ones. Civil resistance is essentially just production against machines that adversarial. Andthe other approach to cible resistanceis stake based. In proof of stake bdockcane designs, you ask them to lock the stake and make it subject to slashing,. They will not get the stake back unless they behave honestly. The idea being that you don't know if there's one identity or multiple identities.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner