Who Watches the Watchmen? A Review of Subjective Approaches for Sybil-Resistance in Proof of Personhood Protocols

  title={Who Watches the Watchmen? A Review of Subjective Approaches for Sybil-Resistance in Proof of Personhood Protocols},
  author={Divya Siddarth and Sergey Ivliev and Santiago Siri and Paula Berman},
  booktitle={Frontiers in Blockchain},
Most self-sovereign identity systems consist of strictly objective claims, cryptographically signed by trusted third-party attestors. Lacking protocols in place to account for subjectivity, these systems do not form new sources of legitimacy that can address the central question concerning identity authentication: “Who verifies the verifier?” The legitimacy of claims is instead derived from traditional centralized institutions such as national ID issuers and KYC providers. This architecture has… 

Figures and Tables from this paper

Economic Principles of PoPCoin, a Democratic Time-based Cryptocurrency
Through preliminary economic analysis, it is found that these rules in combination yield a unique form of money with numerous intriguing and promising properties, such as a quantifiable and provable upper bound on monetary inequality, a natural "early adopter's reward" that could incentivize rapid growth while tapering off as participation saturates, resistance to the risk of deflationary spirals, and migration incentives opposite those created by conventional basic incomes.
Foundations for Grassroots Democratic Metaverse
While the physical lives of many of us are in democ-racies (one person, one vote — e.g., the EU and the US), our digital lives are mostly in autocracies (one person, all votes — e.g., Facebook).
Scalability of Encointer-a Proof-Of-Personhood Cryptocurrency
This thesis presents solutions to three major scalability problems of Encointer, evaluate them in terms of runtime and security and provide implementations that are ready to be merged into Encoiner’s production system.
SoK: Blockchain Governance
This work lays out a common foundation for assessing governance processes in blockchain systems and while it highlights shortcomings and deficiencies in currently deployed systems, it can also be a catalyst for improving these processes to the highest possible standard with appropriate trade-offs, something direly needed for blockchain platforms to operate effectively in the long term.
Humanode Whitepaper: You are [not] a bot
The Humanode network is described, a stable and just financial network that relies on the existence of human life that will tremendously increase resistance against Sybil attacks and overcome the challenges and limitations of modern biometric authentication and identification systems.
Trust and Governance in Collective Blockchain Treasuries
Blockchain treasuries are pools of collectively owned cryptocurrency earmarked for the purpose of funding ‘local public goods’ (e.g., protocol fixes, research, bridging infrastrastructure). Ecosystem
A Decentralized Review System for Data Marketplaces
This work proposes a novel decentralized crypto-economic system to ensure the credibility of reviews and analyzes the incentive mechanism through game theoretical modeling and shows how the staking mechanism in conjunction with high quality reviews incentivizes sellers to post higher-quality products.
Identity and Personhood in Digital Democracy: Evaluating Inclusion, Equality, Security, and Privacy in Pseudonym Parties and Other Proofs of Personhood
This work explores and analyzes alternative approaches to "proof of personhood" that may provide this missing foundation for digital personhood, and examines other proposed approaches to proof ofpersonhood some of which offer conveniences such as all-online participation.


Self-Sovereign Identity in a Globalized World: Credentials-Based Identity Systems as a Driver for Economic Inclusion
The use of blockchain technology and biometrics as a means to ensure the “unicity” and “singularity” of identities, and the associated challenges pertaining to the security and confidentiality of personal information are explored.
Pseudonym Parties : An Offline Foundation for Online Accountability ( PRELIMINARY DRAFT )
This paper proposes pseudonym parties, a decentralized scheme that combines technical tools (pseudonymous online accounts) with in-person social occasions (parties) to provide online accountability while preserving the ability of users to participate anonymously in online services.
Verifying Identity as a Social Intersection
This work exploits the redundancy created by intersectionality together with the fragmentation of identity suggested by self-sovereign schemes to minimize social collateral required for verification and exploit the probabilistic structure of Bloom filters to provide uniqueness proofs to prevent Sybil attacks while conveying minimal compromising information to verifiers.
From Pretty Good to Great: Enhancing PGP Using Bitcoin and the Blockchain
A new certificate format based on Bitcoin is provided which allows a user to verify a PGP certificate using Bitcoin identity-verification transactions - forming first degree trust relationships that are tied to actual values (i.e., number of Bitcoins transferred during transaction).
Blockchain Technology and Decentralized Governance: The Pitfalls of a Trustless Dream
If the authors can learn anything from the history of Internet governance, it is crucial that they start thinking today about how to shape the governance of blockchain-based networks in ways that ultimately preserve the distribution of powers of these infrastructures.
Preventing Sybil Attack in Blockchain using Distributed Behavior Monitoring of Miners
A solution directive is proposed, in which each node monitors the behavior of other nodes and checks for the nodes which are forwarding the blocks of only particular user, and thus the Sybil attack can be restricted.
Proof-of-Personhood: Redemocratizing Permissionless Cryptocurrencies
This work proposes proof-of-personhood (PoP), a mechanism that binds physical entities to virtual identities in a way that enables accountability while preserving anonymity, and introduces PoPCoin, a new cryptocurrency whose consensus mechanism leverages PoP to eliminate the dis-advantages of PoW and PoS while ensuring security.
Canal: scaling social network-based Sybil tolerance schemes
Canal is presented, a system that uses landmark routing-based techniques to efficiently approximate credit payments over large networks and provides up to a three-order-of-magnitude speedup while maintaining safety and accuracy, even when applied to social networks with millions of nodes and hundreds of millions of edges.
Airdrops and Privacy: A Case Study in Cross-Blockchain Analysis
It is shown that the sharing of addresses between the blockchains is a privacy risk, and address clustering is used to try to construct the one-to-many mappings from entities to addresses on the blockchain, individually and in combination.
Ethereum and the SEC: Why Most Distributed Autonomous Organizations are Subject to the Registration Requirements of the Securities Act of 1933 and a Proposal for New Regulation
In a world full of new technology, the risk of fraud is constantly increasing. In the securities industry, this risk existed long before the use of technology. Congress enacted the Securities Act of