This story was originally published on HackerNoon at: https://hackernoon.com/educational-byte-what-is-a-sybil-attack-in-crypto-networks.
One attacker, many fake identities. Discover how Sybil attacks may bend decentralization and how crypto networks push back against the illusion.
Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity.
You can also check exclusive content about #crypto-security, #sybil-resistance, #sybil-attack, #crypto-networks, #distributed-systems, #crypto-transaction-fees, #obyte, #good-company, and more.
This story was written by: @obyte. Learn more about this writer by checking @obyte's about page,
and for more stories, please visit hackernoon.com.
Unlike banks, crypto networks run without a central boss and without access requirements. Anyone with a device and Internet can create their own wallet in minutes. They can also participate as “block producers” (miner, “validator,” or equivalent) without sharing their identity. Crypto is pseudonymous and open… and that, without proper protection, could cause bad things like a Sybil attack.