- Low cost - Account creation is inexpensive
- No identity verification - No KYC or identity checks required
- Unlimited accounts - No restrictions on number of accounts per person
- Full functionality - Each account has full capabilities.
Attack Scenario: DAO Voting
Vulnerable Voting System
Imagine you create a DAO (Decentralized Autonomous Organization) with the following design:- Open voting - Anyone in the community can vote
- One vote per account - Each NEAR account gets one vote
- Simple majority - Decisions made by majority vote
- No identity verification - No checks to ensure one person = one account.
The Attack
Scenario:- DAO proposal requires community vote
- Malicious actor wants proposal to pass (or fail)
- Attacker creates 100 NEAR accounts
- Attacker votes with all 100 accounts in favor of their preferred outcome
- Attacker’s 100 votes outweigh legitimate community votes
- Attacker controls the outcome.
Real-World Impact
Sybil attacks are particularly dangerous for:1. DAO Governance
- Voting manipulation - Single person controls multiple votes
- Proposal outcomes - Attackers can force proposals to pass/fail
- Treasury control - Attackers can influence fund allocation
- Protocol changes - Attackers can push harmful protocol updates.
2. Airdrops and Token Distribution
- Unfair allocation - Attackers claim multiple airdrops
- Resource drain - Legitimate users get less
- Economic manipulation - Attackers accumulate disproportionate tokens.
3. Reputation Systems
- Fake reviews - Multiple accounts create fake positive/negative reviews
- Rating manipulation - Attackers boost or damage reputation scores
- Trust systems - Attackers game trust mechanisms.
4. Resource Allocation
- Fair distribution - Attackers claim multiple shares
- Quota systems - Attackers bypass per-account limits
- Reward programs - Attackers claim multiple rewards.
Prevention Strategies
1. Proof of Humanity / Identity Verification
How it works:- Require users to prove they are unique humans
- Use services that provide identity verification
- Verify identity before allowing participation.
- Strong protection against Sybil attacks
- Ensures one person = one vote/account.
- Requires external services
- May reduce accessibility
- Privacy concerns.
2. Token-Weighted Voting
How it works:- Votes weighted by token holdings
- More tokens = more voting power
- Still vulnerable but requires economic stake.
- Attackers must acquire tokens (costly)
- Aligns incentives with economic stake
- Reduces casual Sybil attacks.
- Wealthy actors still have more influence
- Doesn’t prevent wealthy Sybil attacks
- May not be suitable for all use cases.
3. Reputation-Based Systems
How it works:- Build reputation over time
- Require minimum reputation to vote
- Reputation earned through legitimate activity.
- Makes Sybil attacks time-consuming
- Requires sustained legitimate activity
- Reduces impact of new fake accounts.
- Doesn’t prevent long-term Sybil attacks
- May exclude legitimate new users
- Complex to implement.
4. Economic Barriers
How it works:- Require deposits or fees to participate
- Make account creation expensive
- Slash deposits for malicious behavior.
- Increases cost of Sybil attacks
- Deters casual attackers
- Economic disincentive.
- May exclude legitimate users
- Wealthy attackers can still afford it
- Doesn’t solve the fundamental problem.
5. Time-Locked Participation
How it works:- Require accounts to exist for minimum time
- Delay voting rights for new accounts
- Prevent immediate Sybil attacks.
- Simple to implement
- Reduces impact of mass account creation
- Gives time to detect patterns.
- Doesn’t prevent long-term attacks
- May delay legitimate participation
- Attackers can plan ahead.
6. Activity-Based Requirements
How it works:- Require minimum activity before voting
- Must interact with protocol multiple times
- Prove engagement before participation.
- Makes Sybil attacks more expensive
- Requires sustained effort
- Filters out casual fake accounts.
- Doesn’t prevent determined attackers
- May be gamed with automated activity
- Complex to define “legitimate activity”.
Best Practices
- Never use simple one-account-one-vote for important decisions
- Combine multiple strategies - Use layered defenses
- Monitor for patterns - Detect unusual account creation
- Require economic stake - Make attacks costly
- Use identity verification for critical governance
- Implement reputation systems for long-term protection
- Document Sybil risks - Inform users of limitations.
DAO-Specific Recommendations
For DAO governance systems:- Use token-weighted voting with minimum thresholds
- Require identity verification for major decisions
- Implement reputation systems for ongoing participation
- Monitor voting patterns for suspicious activity
- Use multi-sig or time delays for critical proposals
- Combine on-chain and off-chain governance mechanisms.