January 15, 2019, 12:27PM EST
• 3 min read

Mapping out Sybil Resistance Mechanisms

Quick Take

  • In a Sybil attack, an attacker creates a large number of accounts to trick a network into thinking that several individual accounts are participating in the network, when in fact they are all controlled by the attacker
  • Sybil attackers can manipulate and abuse the resources of a network
  • Decentralized network are particularly prone to Sybil attacks due to their permissionless nature
  • The Block has mapped out some of the most popular Sybil resistance mechanisms employed by the top 50 cryptocurrencies by market capitalization

Join The Block Research for exclusive research like this

Gain access to this research piece and 100s of others, including ecosystem maps, company profiles, and topics spanning DeFi, CBDCs, banking and markets. Together with additional services, we help organizations understand what’s happening in the rapidly developing digital asset ecosystem.

Already a Research Member? Login Here