[go: nahoru, domu]

Sybil attack: Difference between revisions

Content deleted Content added
m cite repair;
Ej159 (talk | contribs)
Add sentence on inverse-Sybil attack
Line 11:
 
In the context of (human) [[online community|online communities]], such multiple identities are sometimes known as [[sockpuppet (internet)|sockpuppet]]s.
The less common term ''inverse-Sybil attack'' has been used to describe an attack in which many entities appear as a single identity<ref>{{cite book | last=Auerbach | first=Benedikt | last2=Chakraborty | first2=Suvradip | last3=Klein | first3=Karen | last4=Pascual-Perez | first4=Guillermo | last5=Pietrzak | first5=Krzysztof | last6=Walter | first6=Michael | last7=Yeo | first7=Michelle | title=Topics in Cryptology – CT-RSA 2021 | chapter=Inverse-Sybil Attacks in Automated Contact Tracing | publisher=Springer International Publishing | publication-place=Cham | year=2021 | isbn=978-3-030-75538-6 | issn=0302-9743 | doi=10.1007/978-3-030-75539-3_17 | page=399–421}}</ref>.
 
==Example==
 
A notable Sybil attack in conjunction with a traffic confirmation attack was launched against the [[Tor (anonymity network)|Tor anonymity network]] for several months in 2014.<ref> [https://blog.torproject.org/blog/tor-security-advisory-relay-early-traffic-confirmation-attack Tor security advisory: "relay early" traffic confirmation attack] Tor Project, 30 July 2014</ref><ref>Dan Goodin (31 July 2014). [https://arstechnica.com/security/2014/07/active-attack-on-tor-network-tried-to-decloak-users-for-five-months/ Active attack on Tor network tried to decloak users for five months].</ref>