136 entries in 0.689s
mp_en_viaje: so don't you try solving the grave problem of the user being entirely surrounded by a
sybil inside the secure code. let him worry about that outside the box.
jfw: er I mean, the absolute view point is interesting, which I guess is that ...the
sybil case is not interesting?
mp_en_viaje: yes, "if one is surrounded by a
sybil". do you know the story of the man who made a submarine so strong, it'd have withstood even falling off a cliff ?
jfw: adds tamper resistance, unless one is surrounded by a
sybil. This is interesting though, re absolute view
mod6: Your notion is correct on the former, 'more exposed to potentially misbehaving or
sybil peers'. As to the latter, I suspect you will be connected simply more prb nodes. It is possible that you'll also find, in a 'subgraph', nodes that are playing nicely, but seems less likely.
jfw: mod6: my notion of what that action entails, and please correct if I'm missing a major aspect, is that I'm more exposed to potentially misbehaving or
sybil peers, but also potentially better connected and more likely to bridge otherwise partitioned subgraphs of the network.
mircea_popescu: that is, to reconstruct some kind of
sybil cake. which is exactly the "ourdemocracy science" with all tis hatefax and toxictruths and whatnot. because once you give up the proper wot process for some mechanized ersatz you find yourself again in the primordial mist, unable to guess where the landmines are.
lobbes: Interesting to see the bits he gets 'right' , such as no anonymity, but then to see him see him turn around and say essentially "horde of sybils are okay, as long as each
sybil pays subscription fee of $100"
mircea_popescu: and generally, always expose the more convenient edge of the wot to the
sybil. "you" can buy stuff from there and "you" can pick it up here and so on and so forth.
mircea_popescu: looky here, and read this thrice and understand it thoroughly : the "no identity outside of wot" / "all
sybil heads are
sybil heads" works EVERYWHERE, not just where you realise it does. the circumstance that the
sybil is talking to ~you~ does not get to a) corroborate with the fact that you have a strong idea of the self and therefore b) result in any practical effect. as far as they are concerned, we're all exactly equal an
trinque: asciilifeform: works entirely within the system, new
sybil just never gets his +1, or if did, gets -10 later
a111: Logged on 2016-11-15 19:06 asciilifeform: Framedragger: note that this was the laughable piece, 'majority votes', i had nfi how to cut the knot of
sybil etc.
trinque: this along with the transparently obvious
sybil logs I posted the other day
a111: Logged on 2017-11-18 00:19 shinohai:
http://archive.is/07Oas <<< I guess no use going thru the trouble of shutting down the
sybil nodes or w/e
ben_vulpes: and if it's not important enough to push a valid key through the cracks of the
sybil wall, i guess it wasn't actually important enough.
mircea_popescu: (amusingly, this node-
sybil-pie entirely exists BECAUSE IT CAN exist. think in GT terms : at t1 it doesn't exist. at t2, player 1 figures out it could exist, whether it can or not, and takes defensive meansures. at t3, some bug in player1's implementation is exploited (consciously or accidentally) and now... it DOES exist.)
ben_vulpes: mouth now open, waiting for them to pour in; found a non
sybil i guess.
a111: Logged on 2017-07-18 18:23 mircea_popescu: asciilifeform understand this bit of GT : the knowledge of all the things you don't know thereby constructs a
sybil of you.
a111: Logged on 2017-07-18 18:23 mircea_popescu: asciilifeform understand this bit of GT : the knowledge of all the things you don't know thereby constructs a
sybil of you.
a111: Logged on 2017-07-18 18:23 mircea_popescu: asciilifeform understand this bit of GT : the knowledge of all the things you don't know thereby constructs a
sybil of you.
mircea_popescu: if he knows and you think he doesn't... guess what. now he'll
sybil you.
mircea_popescu: asciilifeform anyway, to continue upstream : education is an effort to resolve the unknowledge-
sybil problem. you take in the girl and know full well what she doesn't know, whip her, fuck her, not necessarily in this order, until she gets to the place where you don't know what she doesn't know, at which point she's an adult slave.
mircea_popescu: asciilifeform understand this bit of GT : the knowledge of all the things you don't know thereby constructs a
sybil of you.
☟︎☟︎☟︎ mircea_popescu: (as an aside, i don't expect any of these fucktards, gilmore, bernstein, whatever, even remotely give enough of a shit about anything not tittlating their anal orifices, BUT! it'd help me fucking immensely if they actually were in, because of
sybil considerations. but they dun wanna, becausew why should the world not stink.)
Framedragger: so there's no way to DoS peer B with "hi plox to send me an auth string, i'm totally legit non
sybil node"
a111: Logged on 2017-04-27 22:46 phf: it is not in fact phf who posted this nonsense but an adversary, a
sybil attack is in progress!
phf: it is not in fact phf who posted this nonsense but an adversary, a
sybil attack is in progress!
☟︎ a111: Logged on 2017-02-27 20:03 asciilifeform: if you let ANYONE, under ANY circumstances, appropriate some of the value of a tx without the consent of its original author, you create a
sybil-feeder, where the last hop (i.e. the miner) can simply eat 100% by simulating the passage of the tx through 1,000,001 hops of fictional nodes.
a111: Logged on 2016-12-29 23:20 asciilifeform: type2 ( pete_dushenski's ) is the garden variety shitflood. which is sometimes solved by ip ban, but only in the case of 'shrapnel addressed to occupant', i.e. idiot prb nodes wildly spamming crapolade, and not in the 'bullet with your name on it' case, where somebody actually has a
sybil constellation drowning your trb node in liquishit, with no SINGLE ip misbehaving in any way
Framedragger: well, you mentioned
sybil. this may help avoid
sybil url submission spam. granted, the latter may be avoided by "only people currently voiced / currently in l2 / l1" filter, etc..
Framedragger: ben_vulpes: suresure, i agree that it'd be fine, but i expect someone could concoct a "
sybil account keeps draining pennies" argument.. but eh. yeah.
ben_vulpes: davout: this is the '
sybil' thread, yes?
Framedragger: iirc there *was* a buncha keys on silk road v1. but, not ruling out key re-use /
sybil identities.
trinque: it all flows directly from that they have the
sybil-tron, and the fakerng, and... and...
trinque: they're this grey goo you can
sybil up as much as you like
mircea_popescu: at least on appearances. but now model what someone trying to
sybil would be doing.
phf: come to think of it
sybil is not the right word in this case, on application level there's no psuedonymity and you only talk to people in wot. on transport level an attacker can construct a valid looking (struct layout wise) pgp packet, which in my naive spec implementation is handed over to gnupg. now you have a bunch of potential attack vectors here, but assuming there's no memory attacks in gnupg, race conditions in gpgme,
mircea_popescu: your idea with (indepoendent miners very threadbare +
sybil) is much higher latent heat than the (miner cartel) situation.
mircea_popescu: you understgand this "? yes
sybil problems will be incredible once that goes away
ben_vulpes: near as i can tell, mircea_popescu went to pop a mining cartel and only caught a
sybil.
mircea_popescu: asciilifeform even so, i don't think banning
sybil reduces to "unable to talk to white devils".
assbot: Logged on 07-03-2016 23:07:12; mircea_popescu: but, generally speaking,
sybil testing on purported bitcoin nodes are a good idea, especially if carried out in secret and uncoordinatedly.
mircea_popescu: but, generally speaking,
sybil testing on purported bitcoin nodes are a good idea, especially if carried out in secret and uncoordinatedly.
☟︎ adlai: "can read source and figure out wtf it does and why" is almost as
sybil-resistent as PoW
adlai: testingthisstuff: also fyi, even the tor developers admit to the ease (~$1M) with which a large-scale
sybil attack can be mounted against the network
thestringpuller: mats: in my perspective it seems the meatwot is more easily susceptible
sybil attacks than one enforced with the principle governing gpg contracts
mats: 'psycho pass' is about a japan where devices that can measure mental health are on every street corner, managed by an entity known as the '
sybil system' and enforced by public security. the focus of the story is a public security officer
mircea_popescu: also hanbot has it : idempotence IS fundamental to bitcoin. but unlike shit like
sybil attack, or pgp, which were scarcely used or thought about before we came around,
mircea_popescu: 2.
sybil. the purpose is irrelevant. all mitm is a degenberate case of
sybil.
mike_c: I'm sticking by it. Once you know what a
sybil attack is, this is a good venue to learn why what you know isn't quite right.
mike_c: Adlai: my point wasn't that we're a bunch of geniuses, more that there are better venues to learn something in depth like what is a
sybil attack.
decimation: ^ all biometrics fall to similar kinds of
sybil attacks
decimation: yes, but your
sybil objection applies to all of bitcoin
livegnik: You could put it that way, yes. But it can visualize
sybil swarms by showing the few 'real IDs' linking to it.
livegnik: asciilifeform: Mostly a whitelist. Whitelisting solves the
Sybil. The thing is, whitelisting hasn't been very user-friendly up till now, without the security trade-off.
livegnik: It's a protocol for identity management for both humans, entities, and machines. It gives the ability to create
Sybil-proof WoTs (to the extent that the least trustworthy node added, decides the strength of your security), for almost anything.
mike_c: mircea_popescu: maybe not. could be a much dumber reason. "It's all one node just with 600 addresses. This is what happens when you fucking pay people to
sybil attack the network."
Adlai: dev behind popular open-source-closed-dev spv wallet is also behind a
sybil attack to correlate transactions with jurisdictions... so that's why local trader is so cheap!
mircea_popescu: "The Bitcoin protocol, when implemented correctly, has a degree of
sybil resistance when it comes to partitioning and double-spend risk as an attacker must get _all_ your connections for those attacks, but this kind of activity can really violate user privacy since privacy attacks don't need to get all your connections; especially for SPV nodes which liberally broadcast their wallet addresses to nodes that they're usin