kc1212 / sybil-survey

1 stars 0 forks source link

understanding Sybil attacks #1

Open synctext opened 7 years ago

synctext commented 7 years ago

This week feedback:

economics of the Sybil attack, using the back market insight it is possible to put a price tag and volume of market offerings for stolen websites, fake social network profiles, and fraudulent microblogging accounts.

synctext commented 7 years ago

TOC:

Plans: (compiler constructions as course-load)

kc1212 commented 7 years ago

@synctext A few questions:

kc1212 commented 7 years ago

Recent example of Sybil attack - Twitter bots http://www.theatlantic.com/technology/archive/2016/11/election-bots/506072/

from the article: "more than a third of pro-Trump tweets and nearly a fifth of pro-Clinton tweets between the first and second debates came from automated accounts, which produced more than 1 million tweets in total"

more articles: http://politicalbots.org

synctext commented 7 years ago

To get the raw data.. Please try to email the 8000 Twitter people and the people within the YCombinator discussion thread that did follow-up analysis.

synctext commented 7 years ago

Great case-study: http://sadbottrue.com/article/68/

synctext commented 7 years ago

Also mention oldies

4.2.3 and 4.3.3 are more generic and not restricted to reputations systems. Mike Hearn provides facinating insight into real-world context of spam fighting, reputation mechanisms, and Sybils. "Worse, competitors could interfere with each others mail streams by submitting false reports. We see this sort of thing with AdWords." (2014)