• A Sybil attack is a type of attack on a computer network service in which an attacker subverts the service's reputation system by creating a large number...
    22 KB (2,492 words) - 20:57, 21 October 2024
  • Thumbnail for Tor (network)
    visitor or owner of the onion service). The attacking nodes joined the network on 30 January, using a Sybil attack to comprise 6.4% of guard relay capacity...
    168 KB (13,999 words) - 23:55, 24 May 2025
  • Sybil is a 1973 book by Flora Rheta Schreiber about the treatment of Sybil Dorsett (a pseudonym for Shirley Ardell Mason) for dissociative identity disorder...
    12 KB (1,330 words) - 04:05, 8 April 2025
  • the attacks may have ceased after Kim Dotcom offered Lizard Squad 3000 accounts on his upload service MEGA. On December 26, 2014, a Sybil attack involving...
    29 KB (2,448 words) - 07:11, 13 May 2025
  • Spamdexing (redirect from SEO attack)
    link text can help rank a webpage higher for matching that phrase. A Sybil attack is the forging of multiple identities for malicious intent, named after...
    29 KB (3,427 words) - 16:40, 11 April 2025
  • malicious attacks on peer to peer networks, particularly, attacks that utilize multiple fake identities, otherwise known as a Sybil attack. Decentralized...
    14 KB (1,611 words) - 15:24, 25 May 2025
  • attempt to solve the proof-of-work problem, a Sybil attack is infeasible in principle unless the attacker has over 50% of the computational resources of...
    43 KB (4,770 words) - 20:45, 1 April 2025
  • group decision, prevention of sybil attacks is an important priority in ensuring the security of voting. Sybil attacks are a common issue with implementations...
    89 KB (9,372 words) - 06:14, 13 May 2025
  • Thumbnail for Distributed hash table
    weakness, known as the Sybil attack, which affects most current DHT designs. Whanau is a DHT designed to be resistant to Sybil attacks. Petar Maymounkov,...
    36 KB (4,182 words) - 03:10, 12 April 2025
  • Sibyl (disambiguation) (redirect from Sybil)
    powers in ancient Greece. Sybil or Sibyl may also refer to: Sybil (1921 film) Sybil (1976 film), a film starring Sally Field Sybil (2007 film), a remake of...
    4 KB (480 words) - 04:47, 21 April 2024
  • Thumbnail for Reputation system
    of the attacker. Self-promoting Attack. The attacker falsely increases their own reputation. A typical example is the so-called Sybil attack where an...
    22 KB (2,537 words) - 01:28, 19 March 2025
  • high-bandwidth connections can improve the performance of large data transfers. Sybil attacks are of much concern when designing peer-to-peer protocols. NC systems...
    19 KB (2,218 words) - 05:47, 23 May 2025
  • identities are called sock puppets. Whitewashing is one specific form of a Sybil attack on distributed systems. The social cost of cheaply discarded pseudonyms...
    55 KB (6,134 words) - 20:31, 11 May 2025
  • Thumbnail for Sock puppet account
    theory of social networks and reputation systems, this is known as a Sybil attack. A sockpuppet-like use of deceptive fake identities is used in stealth...
    31 KB (2,874 words) - 08:10, 31 May 2025
  • nominators support validators by staking DOT tokens on their behalf. Sybil attack Proof of stake List of cryptocurrencies List of blockchains Vigna, Paul...
    14 KB (1,278 words) - 15:06, 9 February 2025
  • Moderator Social spam – Spam on social networking services Sybil attack – Network service attack performed by multiple fake identities Twitter bomb – Posting...
    31 KB (3,495 words) - 14:46, 30 May 2025
  • Thumbnail for Metasearch engine
    Hidden Links – Placing hyperlinks where visitors won't or can't see them Sybil Attack – Forging of multiple identities for malicious intent Spam Blogs – Blogs...
    20 KB (2,394 words) - 04:31, 30 May 2025
  • even the creator. The Vanish approach was found to be vulnerable to a Sybil attack and thus insecure by a team called Unvanish from the University of Texas...
    4 KB (519 words) - 16:00, 21 January 2025
  • Kademlia is modified to mitigate Kademlia's vulnerabilities, such as Sybil attacks. Peer-to-peer networks are made of nodes, by design. The protocols that...
    28 KB (4,223 words) - 13:03, 20 January 2025
  • secret to eventually vanish. However, the network is vulnerable to a Sybil attack, thus making Vanish insecure. Any shareholder who ever has enough information...
    28 KB (3,790 words) - 01:56, 1 May 2025
  • Thumbnail for Alice and Bob
    that desire non-repudiation. Sybil A pseudonymous attacker, who usually uses a large number of identities. For example, Sybil may attempt to subvert a reputation...
    24 KB (2,023 words) - 06:57, 3 May 2025
  • Thumbnail for Operation Onymous
    traffic to route over the attacking nodes, an attacker could perform traffic confirmation attacks aided by a Sybil attack. Logs released by the administrator...
    17 KB (1,604 words) - 18:05, 1 June 2025
  • network, some kind of proof is required to prevent Sybil attacks, i.e., the event in which an attacker gains control over the transactions of the network...
    20 KB (2,059 words) - 01:25, 12 March 2025
  • getting them confused. Online astroturfing using sockpuppets is a form of Sybil attack against distributed systems. Pharmaceutical companies may sponsor patient...
    97 KB (10,079 words) - 01:56, 28 May 2025
  • Thumbnail for Zooko's triangle
    consensus of domain name ownership. These systems remain vulnerable to Sybil attack, but are secure under Byzantine assumptions. Theoretician Curtis Yarvin...
    5 KB (444 words) - 06:59, 19 September 2024
  • Thumbnail for Bitcoin
    against double-spending, while b-money and bit gold were not resistant to Sybil attacks. The domain name bitcoin.org was registered on 18 August 2008. On 31...
    111 KB (9,214 words) - 19:52, 25 May 2025
  • Criticism of Google Deregulation Hijacked journal Misinformation Passing off Sybil attack Typosquatting Star, Shelley Shelton Arizona Daily (30 September 2007)...
    22 KB (1,707 words) - 05:36, 27 March 2025
  • Thumbnail for Attack of the 50 Foot Woman
    In the mid-1980s, filmmaker Jim Wynorski considered doing a remake with Sybil Danning in the title role. Wynorski made it as far as shooting a photo session...
    16 KB (1,868 words) - 05:48, 26 May 2025
  • Phishing Eavesdropping Brute-force attacks Selective forwarding Sinkhole threats Sybil attacks Location threats Internal attacks From 2005 to 2019, the total...
    22 KB (2,752 words) - 04:27, 26 May 2025
  • Sam Vimes (redirect from Lady Sybil Ramkin)
    Terrier" (or his hammer, depending upon the occasion). According to his wife, Sybil, Vimes is recognised by many as Lord Vetinari's right-hand man. He first...
    38 KB (5,628 words) - 02:45, 26 April 2025