Technologies for democratic society
CS-234
Instructor's notes - before lecture
This page is part of the content downloaded from Instructor's notes - before lecture on Wednesday, 25 December 2024, 17:25. Note that some content and any files larger than 50 MB are not downloaded.
Page content
The false identity or Sybil attack problem
Undesirable consequences
Sock puppetry in discussions
Ballot stuffing
Breaking algorithms, e.g., consensus
Injecting deliberate bias, e.g., political
Spreading FUD
Countermeasures:
IP addresses
CAPTCHAs
E-mail or phone number verification
ID verification, PKI, KYC
Social/trust networks
Biometric identity
Proof-of-Work
Other investment
Personhood parties or PoP
Post-lecture blackboard snapshot 2019: