Questions tagged [sybil-attack]
25 questions
21
votes
1 answer
Have any SPV users lost money because they accepted forged bitcoins?
I'm making a list of real-life examples of occasions where bitcoins were lost to various known attacks. One of these known attacks is that lightweight (SPV) wallets can't verify whether a transaction only spends UTXOs (a requirement full nodes…
David A. Harding
- 11,626
- 2
- 44
- 71
17
votes
2 answers
What's a Sybil attack?
Can anyone please provide a clear definition for what a Sybil attack is?
I was asked how the cryptocurrency I am developing would prevent Sybil attacks.
JoelHovell
- 173
- 1
- 1
- 5
13
votes
2 answers
Eclipse attack vs. Sybil attack
I came across this paper Eclipse Attacks on Bitcoin’s Peer-to-Peer Network ∗ that sounds very similar to the Sybil attack.
Can someone point out the difference between both attacks.
user123
- 131
- 1
- 4
10
votes
1 answer
Can I trust the peers I am connected to?
From my understanding of Bitcoin, it operates on a P2P network. Having just downloaded a wallet app, I see it is connected to 6 peers. Does the Bitcoin protocol rely on trusting these peers? What does it mean if these 6 peers turn out to be fake,…
Brendon
- 203
- 2
- 6
6
votes
2 answers
Can a full node provide a bogus block bloomfilter to a Neutrino node?
When a thin client using BIP157/BIP158 (Neutrino) requests the block filter for the latest block, would it be possible for the full node serving this request to attack the Neutrino node by providing a fake block filter that omits certain…
Murch
- 71,155
- 33
- 180
- 600
4
votes
1 answer
Sybil attack countermeasure
In Bitcoin Wiki Weaknesses: Sybil attack they mention that:
"Bitcoin makes these attacks more difficult by only making an outbound connection to one IP address per /16 (x.y.0.0)".
Why would this make a Sybil attack more difficult? Is there a reason…
user1
- 41
- 3
3
votes
1 answer
How can someone prevent a sybil attack when connecting through TOR?
As I understand it, running sybil BTC nodes through an anonymous network like TOR is much less expensive than in clearnet. This makes it possible that one could be connected to a majority of nodes controlled by the same entity, right?
Is there any…
Papa Lazzarou
- 331
- 1
- 5
3
votes
1 answer
Is Lightning Network vulnerable to sybil attacks?
A dialogue partner of mine claimed that Lightning Network is vulnerable to sybil attacks. He stated that LN needed explicit identities in order to support the "routing" which would cause ending up with whitelists.
Is Lightning Network vulnerable to…
Murch
- 71,155
- 33
- 180
- 600
2
votes
0 answers
Sybil attack with IOTA?
IOTA is one of the DLTs uses DAG (Directed Acyclic Graph) as data structure.
The solutions to attacks proposed by IOTA white paper seems unconvincing, in particular, in case of double-spending, it remains unclear what stops a computationally…
Questioner
- 1,151
- 8
- 22
2
votes
2 answers
Preventing sybil attacks : How does bitcoin get to know the computing power of a node?
I know that bitcoin prevents sybil attacks through proof of work - which takes into account the computing power of each participating node . So how does bitcoin get this information ?
zacurry
- 121
- 2
2
votes
2 answers
How proof-of-work detects Sybil attack in Bitcoin?
I read in several paper that PoW deters Sybil attack in Bitcoin. However, there is no enough explanation about how proof-of-work detects Sybil attack in Bitcoin?
Questioner
- 1,151
- 8
- 22
2
votes
1 answer
Can we make Sybil attacks virtually impossible?
I suspect that we CAN make them virtually impossible, but that we have not yet done so. We operate on the assumption that computing a private key from the public key is virtually impossible. We also operate on the assumption that computing a…
Dave Scotese
- 793
- 5
- 19
2
votes
2 answers
How probable is a sybil attack?
I'd like to know what's the probability of a sybil attack and if there are mechanisms built in to prevent this kind of attack?
Aliakbar Ahmadi
- 1,625
- 1
- 11
- 22
1
vote
1 answer
What if all the 8 peers of the node are malicious?
I looked at the question on how transactions are broadcast to the rest of the network in the blockchain network.
In this stack exchange post, the author @morsecoder in the accepted answer mentions that :
Think of it like how gossip would spread.…
Ruchit Patel
- 113
- 3
1
vote
1 answer
How does Bitcoin currently mitigate Sybil and Eclipse attacks?
What countermeasures does Bitcoin currently have in place to limit Sybil attacks (ie of full nodes [not miners]) and eclipse attacks?
In particular, it seems like an important countermeasure would be to attempt to give your connections only about…
B T
- 1,569
- 13
- 27