Chain analysis for clique identification #28
reisepass
started this conversation in
Stage 1: Ideation
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Both sybil attacks and collusion result in an on-chain signature of funds cycle between the same entities repeatedly.
Due to the abundant amount of work for sybil detection in the scope of airdrops tools to detect them already exist such as https://www.breadcrumbs.app/ https://github.com/TrustaLabs/Airdrop-Sybil-Identification or https://github.com/ArbitrumFoundation/sybil-detection .
Attackers could avoid chain analysis sybil detection by using a off and on ramping the funds but doing so would again significantly increase the cost of the attack and having chain analysis in place also means that the risk of getting slashed for the attack increases significantly since any small slip up in the wallet routing could mean detection.
Beta Was this translation helpful? Give feedback.
All reactions