• Corpus ID: 18572967

Pseudonym Parties : An Offline Foundation for Online Accountability ( PRELIMINARY DRAFT )

  title={Pseudonym Parties : An Offline Foundation for Online Accountability ( PRELIMINARY DRAFT )},
  author={Bryan Ford},
Many unsolved Internet security vulnerabilities reduce to a lack ofuser accountability : any user who misbehaves— e.g., by spamming from a free E-mail account or stuffing an online ballot box—can simply open other anonymous accounts or connect from other IP addresses. The obvious solution of requiring all users to identify and authenticat e themselves to online services, through a universal publickey infrastructure (PKI) for example, is inconvenient and impractical to deploy universally, and… 
Who Watches the Watchmen? A Review of Subjective Approaches for Sybil-Resistance in Proof of Personhood Protocols
Inspired by the progress in cryptocurrencies and blockchain technology, there has recently been a surge in networked protocols that make use of subjective inputs such as voting, vouching, and interpreting to arrive at a decentralized and Sybil-resistant consensus for identity.
encointer - An Ecological, Egalitarian and Private Cryptocurrency and Self-Sovereign Identity System
encointer proposes a new blockchain based cryptocurrency with an ecological consensus mechanism using trusted execution environments and an egalitarian money supply policy that features private transactions and scalable, trustless off-chain smart contracts.
Sybil-Resilient Online Content Voting
SumUp is presented, a Sybilresilient vote aggregation system that leverages the trust network among users to defend against Sybil attacks and uses the technique of adaptive vote flow aggregation to limit the number of bogus votes cast by adversaries to no more than theNumber of attack edges in the Trust network.


Anonymous Communication Policies for the Internet: Results and Recommendations of the AAAS Conference
Findings were that online anonymous communication is morally neutral; that it should be considered a strong human and constitutional right; that online communities should be allowed to set their own policies on the use of anonymous communication; and that individuals should be informed about the extent to which their identity is disclosed online.
Peering Through the Shroud: The Effect of Edge Opacity on IP-Based Client Identification
A methodology is developed and implemented by which a server can make a more informed decision on whether to rely on IP addresses for client identification or to use more heavyweight forms of client authentication.
Hashcash - A Denial of Service Counter-Measure
This paper captures in one place the various applications, improvements suggested and related subsequent publications, and describes initial experience from experiments using hashcash.
The Sybil Attack
It is shown that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.
CAPTCHA: Using Hard AI Problems for Security
This work introduces captcha, an automated test that humans can pass, but current computer programs can't pass; any program that has high success over a captcha can be used to solve an unsolved Artificial Intelligence (AI) problem; and provides several novel constructions of captchas, which imply a win-win situation.
Queers Anonymous: Lesbians, Gay Men, Free Speech, and Cyber Space
In the past several years, the development and expansion of the Internet and other forms of cyberspace have created new forms of communication around which new communities have developed. Not
Computers beat Humans at Single Character Recognition in Reading based Human Interaction Proofs (HIPs)
Comparisons of human and computer single character recognition abilities through a sequence of human user studies and computer experiments using convolutional neural networks show that computers are as good as or better than humans at one character recognition under all commonly used distortion and clutter scenarios used in todays HIPs.
Sybil : The True Story of a Woman Possessed by Sixteen Separate Personalities
A controversial cult classic, Sybil by Flora Rheta Schreiber is the extraordinary story of a woman who suffered from multiple personality disorder. 'How are you today?' the doctor asked. 'I'm fine',
Personal spam statistics 1997-2004
  • http://www.xtdnet.nl/paul/spam/
  • 2005
SybilGuard: Defending Against Sybil Attacks via Social Networks
This paper presents SybilGuard, a novel protocol for limiting the corruptive influences of sybil attacks, based on the "social network "among user identities, where an edge between two identities indicates a human-established trust relationship.