Open nathan-at-least opened 1 year ago
Consider these distinct PoS Attack Capabilities:
These different capabilities have different implications:
More on preventing votes:
An adversary may control a signing key exclusively, e.g. it just runs a malicious notary with its own identity.
vs
An adversary controls a signing key of a victim node, so both nodes are racing to emit messages.
Consider the distinct impacts of these cases, ex: in the first case, if the adversary is the epoch leader, there's no race, whereas in the latter case, there is a race.
In practice, it's likely an attacker will always want exclusive control of a notary, so that in some cases they won't have races (such as when their node is an epoch leader). This does require some minimum cost: enough to control at least one "legitimate" notary roster entry.
Suggested Improvement
Issue #39 is titled for a specific attack capability, then in comments we start fleshing out an attack capability table.
This ticket is about defining that table but leaving most of the cells as "tbd", just to provide the structure.
The table could have capability rows and impact columns:
Attack capabilities are the cartesian product of a few categories:
Attack impact categories include:
Close this ticket by putting that table into the book with
tbd
columns.