Technologies for democratic society

CS-234

Instructor's notes - before lecture

This page is part of the content downloaded from Instructor's notes - before lecture on Wednesday, 25 December 2024, 17:25. Note that some content and any files larger than 50 MB are not downloaded.

Page content

  • The false identity or Sybil attack problem

    • Undesirable consequences

  • Sock puppetry in discussions

  • Ballot stuffing

  • Breaking algorithms, e.g., consensus

  • Injecting deliberate bias, e.g., political

  • Spreading FUD

  • Countermeasures:

  • IP addresses

  • CAPTCHAs

  • E-mail or phone number verification

  • ID verification, PKI, KYC

  • Social/trust networks

  • Biometric identity

  • Proof-of-Work

  • Other investment

  • Personhood parties or PoP



Post-lecture blackboard snapshot 2019:

InyHuvLWYRfhlAosfRB2tjrwzuK2sq0Wzkk5YiXdvjaqYEVPVvofs-Ww9N8T24rFJ0NaLkSR_yNkB0uL_cuoHTNYThXLHaCXP7gLM_9N3jKQb1OdMsm93bZgIZUXlv0Guf8fnP3X