Advertisement
AD

Main navigation

Error message

  • Warning: Undefined array key 1 in Drupal\cryptocompare\TwigExtension\RemoveSpace::getcard() (line 3178 of modules/custom/cryptocompare/src/TwigExtension/RemoveSpace.php).
    Drupal\cryptocompare\TwigExtension\RemoveSpace::getcard('
                        Contents
                        <ul class="article__contents-list"><li class="article__contents-item"><a class="article__contents-link link-pseudo" href="#h261">A new way of preventing Sybil attacks</a></li><li class="article__contents-item"><a class="article__contents-link link-pseudo" href="#h337">A shadow of IOTA tokens</a></li></ul>
        Advertisement
        
            
        
        
            
                    
                
                                                
    
            
            
                    
                
                                                
    
            
        
    The name of Sybil attacks originates from the name of Sybil Dorsett, a US artist, who suffered from dissociative identity disorder and was known to have 16 different identities.
    
    A sort of a hackers’ attack when cyber criminals emulate multiple identities, therefore, is called a Sybil attack. Now <a href="https://u.today/iota-and-busd-become-latest-altcoins-to-get-listed-on-binanceus">the IOTA Foundation</a> has found a way of preventing them.
    
    <blockquote class="twitter-tweet">
    The action of emulating multiple identities is defined as a Sybil attack. Read how, in Coordicide, <a rel="nofollow" target="_blank" href="https://twitter.com/hashtag/IOTA?src=hash&amp;ref_src=twsrc%5Etfw">#IOTA</a> introduced mana as the main component of the protection mechanism against these attacks: <a rel="nofollow" target="_blank" href="https://t.co/YKHaQF0R52">https://t.co/YKHaQF0R52</a><a rel="nofollow" target="_blank" href="https://twitter.com/hashtag/Coordicide?src=hash&amp;ref_src=twsrc%5Etfw">#Coordicide</a>
    — IOTA (@iotatoken) <a rel="nofollow" target="_blank" href="https://twitter.com/iotatoken/status/1192759461942898688?ref_src=twsrc%5Etfw">November 8, 2019</a></blockquote>
    
    
    A new way of preventing Sybil attacks
    
    The term was introduces by John Douceur, a researcher from Microsoft as he suggested that the emulation of multiple identities can also happen in blockchain systems.
    
    On <a href="https://u.today/iota-wants-to-streamline-coordicide-implementation-by-offering-5-mln-in-grants-for-research">the IOTA chain</a>, a distributed computing environment consists of nodes. Identities on IOTA are assigned to those nodes to give them votes or allow access to the network. Thus, nodes on IOTA become vulnerable to Sybil attacks.
    
    Previously, IT engineers stood up to those using resource testing, which&nbsp;implied using either the proof-of-work consensus mechanism or the proof-of-stake one. Now, the Coordicide team has introduced a new tool – mana.
    
    <a rel="nofollow" target="_blank" href="#">card</a>
    
    A shadow of IOTA tokens
    
    The scheme shown in the <a rel="nofollow" target="_blank" href="https://blog.iota.org/identities-and-sybil-protection-in-iota-9c62916ff374">Medium article</a> shows that mana is a shadow of tokens which get moved between points A and B by a certain node. The node that transfers the tokens is liable to obtain an amount of mana equal to the number of tokens in the transaction.
    
    Mana cannot be traded and it is linked to the nodes, whose ‘shadow’ it is. It&nbsp;can be used in several ways: consensus protocol, auto peering and rate control.
    
    More details can be found in the <a rel="nofollow" target="_blank" href="files.iota.org/papers/Coordicide_WP.pdf">Mana whitepaper</a> provided by the Coordicide team.
    
    Mana will soon be introduced on GoShimmer.
    ') (Line: 1145)
    Drupal\cryptocompare\TwigExtension\RemoveSpace->formatbody(Array) (Line: 54)
    __TwigTemplate_75845256f703f5319a38e035b4af7dd9->doDisplay(Array, Array) (Line: 394)
    Twig\Template->displayWithErrorHandling(Array, Array) (Line: 367)
    Twig\Template->display(Array) (Line: 379)
    Twig\Template->render(Array, Array) (Line: 40)
    Twig\TemplateWrapper->render(Array) (Line: 53)
    twig_render_template('themes/cryptod/templates/field--body.html.twig', Array) (Line: 372)
    Drupal\Core\Theme\ThemeManager->render('field', Array) (Line: 436)
    Drupal\Core\Render\Renderer->doRender(Array, ) (Line: 204)
    Drupal\Core\Render\Renderer->render(Array) (Line: 474)
    Drupal\Core\Template\TwigExtension->escapeFilter(Object, Array, 'html', NULL, 1) (Line: 1002)
    __TwigTemplate_625426e732c5f7a66fde6d628d98a6b2->doDisplay(Array, Array) (Line: 394)
    Twig\Template->displayWithErrorHandling(Array, Array) (Line: 367)
    Twig\Template->display(Array) (Line: 62)
    __TwigTemplate_e934e56c1e459c359b150360c7169113->doDisplay(Array, Array) (Line: 394)
    Twig\Template->displayWithErrorHandling(Array, Array) (Line: 367)
    Twig\Template->display(Array) (Line: 379)
    Twig\Template->render(Array, Array) (Line: 40)
    Twig\TemplateWrapper->render(Array) (Line: 53)
    twig_render_template('themes/cryptod/templates/node.html.twig', Array) (Line: 372)
    Drupal\Core\Theme\ThemeManager->render('node', Array) (Line: 436)
    Drupal\Core\Render\Renderer->doRender(Array, ) (Line: 204)
    Drupal\Core\Render\Renderer->render(Array, ) (Line: 238)
    Drupal\Core\Render\MainContent\HtmlRenderer->Drupal\Core\Render\MainContent\{closure}() (Line: 583)
    Drupal\Core\Render\Renderer->executeInRenderContext(Object, Object) (Line: 239)
    Drupal\Core\Render\MainContent\HtmlRenderer->prepare(Array, Object, Object) (Line: 128)
    Drupal\Core\Render\MainContent\HtmlRenderer->renderResponse(Array, Object, Object) (Line: 90)
    Drupal\Core\EventSubscriber\MainContentViewSubscriber->onViewRenderArray(Object, 'kernel.view', Object)
    call_user_func(Array, Object, 'kernel.view', Object) (Line: 111)
    Drupal\Component\EventDispatcher\ContainerAwareEventDispatcher->dispatch(Object, 'kernel.view') (Line: 187)
    Symfony\Component\HttpKernel\HttpKernel->handleRaw(Object, 1) (Line: 76)
    Symfony\Component\HttpKernel\HttpKernel->handle(Object, 1, 1) (Line: 58)
    Drupal\Core\StackMiddleware\Session->handle(Object, 1, 1) (Line: 48)
    Drupal\Core\StackMiddleware\KernelPreHandle->handle(Object, 1, 1) (Line: 191)
    Drupal\page_cache\StackMiddleware\PageCache->fetch(Object, 1, 1) (Line: 128)
    Drupal\page_cache\StackMiddleware\PageCache->lookup(Object, 1, 1) (Line: 82)
    Drupal\page_cache\StackMiddleware\PageCache->handle(Object, 1, 1) (Line: 48)
    Drupal\Core\StackMiddleware\ReverseProxyMiddleware->handle(Object, 1, 1) (Line: 51)
    Drupal\Core\StackMiddleware\NegotiationMiddleware->handle(Object, 1, 1) (Line: 51)
    Drupal\Core\StackMiddleware\StackedHttpKernel->handle(Object, 1, 1) (Line: 704)
    Drupal\Core\DrupalKernel->handle(Object) (Line: 18)
    
  • Warning: Undefined array key 1 in Drupal\cryptocompare\TwigExtension\RemoveSpace::getcard() (line 3181 of modules/custom/cryptocompare/src/TwigExtension/RemoveSpace.php).
    Drupal\cryptocompare\TwigExtension\RemoveSpace::getcard('
                        Contents
                        <ul class="article__contents-list"><li class="article__contents-item"><a class="article__contents-link link-pseudo" href="#h261">A new way of preventing Sybil attacks</a></li><li class="article__contents-item"><a class="article__contents-link link-pseudo" href="#h337">A shadow of IOTA tokens</a></li></ul>
        Advertisement
        
            
        
        
            
                    
                
                                                
    
            
            
                    
                
                                                
    
            
        
    The name of Sybil attacks originates from the name of Sybil Dorsett, a US artist, who suffered from dissociative identity disorder and was known to have 16 different identities.
    
    A sort of a hackers’ attack when cyber criminals emulate multiple identities, therefore, is called a Sybil attack. Now <a href="https://u.today/iota-and-busd-become-latest-altcoins-to-get-listed-on-binanceus">the IOTA Foundation</a> has found a way of preventing them.
    
    <blockquote class="twitter-tweet">
    The action of emulating multiple identities is defined as a Sybil attack. Read how, in Coordicide, <a rel="nofollow" target="_blank" href="https://twitter.com/hashtag/IOTA?src=hash&amp;ref_src=twsrc%5Etfw">#IOTA</a> introduced mana as the main component of the protection mechanism against these attacks: <a rel="nofollow" target="_blank" href="https://t.co/YKHaQF0R52">https://t.co/YKHaQF0R52</a><a rel="nofollow" target="_blank" href="https://twitter.com/hashtag/Coordicide?src=hash&amp;ref_src=twsrc%5Etfw">#Coordicide</a>
    — IOTA (@iotatoken) <a rel="nofollow" target="_blank" href="https://twitter.com/iotatoken/status/1192759461942898688?ref_src=twsrc%5Etfw">November 8, 2019</a></blockquote>
    
    
    A new way of preventing Sybil attacks
    
    The term was introduces by John Douceur, a researcher from Microsoft as he suggested that the emulation of multiple identities can also happen in blockchain systems.
    
    On <a href="https://u.today/iota-wants-to-streamline-coordicide-implementation-by-offering-5-mln-in-grants-for-research">the IOTA chain</a>, a distributed computing environment consists of nodes. Identities on IOTA are assigned to those nodes to give them votes or allow access to the network. Thus, nodes on IOTA become vulnerable to Sybil attacks.
    
    Previously, IT engineers stood up to those using resource testing, which&nbsp;implied using either the proof-of-work consensus mechanism or the proof-of-stake one. Now, the Coordicide team has introduced a new tool – mana.
    
    <a rel="nofollow" target="_blank" href="#">card</a>
    
    A shadow of IOTA tokens
    
    The scheme shown in the <a rel="nofollow" target="_blank" href="https://blog.iota.org/identities-and-sybil-protection-in-iota-9c62916ff374">Medium article</a> shows that mana is a shadow of tokens which get moved between points A and B by a certain node. The node that transfers the tokens is liable to obtain an amount of mana equal to the number of tokens in the transaction.
    
    Mana cannot be traded and it is linked to the nodes, whose ‘shadow’ it is. It&nbsp;can be used in several ways: consensus protocol, auto peering and rate control.
    
    More details can be found in the <a rel="nofollow" target="_blank" href="files.iota.org/papers/Coordicide_WP.pdf">Mana whitepaper</a> provided by the Coordicide team.
    
    Mana will soon be introduced on GoShimmer.
    ') (Line: 1145)
    Drupal\cryptocompare\TwigExtension\RemoveSpace->formatbody(Array) (Line: 54)
    __TwigTemplate_75845256f703f5319a38e035b4af7dd9->doDisplay(Array, Array) (Line: 394)
    Twig\Template->displayWithErrorHandling(Array, Array) (Line: 367)
    Twig\Template->display(Array) (Line: 379)
    Twig\Template->render(Array, Array) (Line: 40)
    Twig\TemplateWrapper->render(Array) (Line: 53)
    twig_render_template('themes/cryptod/templates/field--body.html.twig', Array) (Line: 372)
    Drupal\Core\Theme\ThemeManager->render('field', Array) (Line: 436)
    Drupal\Core\Render\Renderer->doRender(Array, ) (Line: 204)
    Drupal\Core\Render\Renderer->render(Array) (Line: 474)
    Drupal\Core\Template\TwigExtension->escapeFilter(Object, Array, 'html', NULL, 1) (Line: 1002)
    __TwigTemplate_625426e732c5f7a66fde6d628d98a6b2->doDisplay(Array, Array) (Line: 394)
    Twig\Template->displayWithErrorHandling(Array, Array) (Line: 367)
    Twig\Template->display(Array) (Line: 62)
    __TwigTemplate_e934e56c1e459c359b150360c7169113->doDisplay(Array, Array) (Line: 394)
    Twig\Template->displayWithErrorHandling(Array, Array) (Line: 367)
    Twig\Template->display(Array) (Line: 379)
    Twig\Template->render(Array, Array) (Line: 40)
    Twig\TemplateWrapper->render(Array) (Line: 53)
    twig_render_template('themes/cryptod/templates/node.html.twig', Array) (Line: 372)
    Drupal\Core\Theme\ThemeManager->render('node', Array) (Line: 436)
    Drupal\Core\Render\Renderer->doRender(Array, ) (Line: 204)
    Drupal\Core\Render\Renderer->render(Array, ) (Line: 238)
    Drupal\Core\Render\MainContent\HtmlRenderer->Drupal\Core\Render\MainContent\{closure}() (Line: 583)
    Drupal\Core\Render\Renderer->executeInRenderContext(Object, Object) (Line: 239)
    Drupal\Core\Render\MainContent\HtmlRenderer->prepare(Array, Object, Object) (Line: 128)
    Drupal\Core\Render\MainContent\HtmlRenderer->renderResponse(Array, Object, Object) (Line: 90)
    Drupal\Core\EventSubscriber\MainContentViewSubscriber->onViewRenderArray(Object, 'kernel.view', Object)
    call_user_func(Array, Object, 'kernel.view', Object) (Line: 111)
    Drupal\Component\EventDispatcher\ContainerAwareEventDispatcher->dispatch(Object, 'kernel.view') (Line: 187)
    Symfony\Component\HttpKernel\HttpKernel->handleRaw(Object, 1) (Line: 76)
    Symfony\Component\HttpKernel\HttpKernel->handle(Object, 1, 1) (Line: 58)
    Drupal\Core\StackMiddleware\Session->handle(Object, 1, 1) (Line: 48)
    Drupal\Core\StackMiddleware\KernelPreHandle->handle(Object, 1, 1) (Line: 191)
    Drupal\page_cache\StackMiddleware\PageCache->fetch(Object, 1, 1) (Line: 128)
    Drupal\page_cache\StackMiddleware\PageCache->lookup(Object, 1, 1) (Line: 82)
    Drupal\page_cache\StackMiddleware\PageCache->handle(Object, 1, 1) (Line: 48)
    Drupal\Core\StackMiddleware\ReverseProxyMiddleware->handle(Object, 1, 1) (Line: 51)
    Drupal\Core\StackMiddleware\NegotiationMiddleware->handle(Object, 1, 1) (Line: 51)
    Drupal\Core\StackMiddleware\StackedHttpKernel->handle(Object, 1, 1) (Line: 704)
    Drupal\Core\DrupalKernel->handle(Object) (Line: 18)
    

IOTA to Prevent Sybil Attacks on Its Chain Using Mana-Based System

Advertisement
Fri, 8/11/2019 - 12:44
IOTA to Prevent Sybil Attacks on Its Chain Using Mana-Based System
Cover image via www.123rf.com
Read U.TODAY on
Google News
Contents
Advertisement

The name of Sybil attacks originates from the name of Sybil Dorsett, a US artist, who suffered from dissociative identity disorder and was known to have 16 different identities.

A sort of a hackers’ attack when cyber criminals emulate multiple identities, therefore, is called a Sybil attack. Now the IOTA Foundation has found a way of preventing them.

A new way of preventing Sybil attacks

The term was introduces by John Douceur, a researcher from Microsoft as he suggested that the emulation of multiple identities can also happen in blockchain systems.

On the IOTA chain, a distributed computing environment consists of nodes. Identities on IOTA are assigned to those nodes to give them votes or allow access to the network. Thus, nodes on IOTA become vulnerable to Sybil attacks.

Previously, IT engineers stood up to those using resource testing, which implied using either the proof-of-work consensus mechanism or the proof-of-stake one. Now, the Coordicide team has introduced a new tool – mana.

card

A shadow of IOTA tokens

The scheme shown in the Medium article shows that mana is a shadow of tokens which get moved between points A and B by a certain node. The node that transfers the tokens is liable to obtain an amount of mana equal to the number of tokens in the transaction.

Mana cannot be traded and it is linked to the nodes, whose ‘shadow’ it is. It can be used in several ways: consensus protocol, auto peering and rate control.

More details can be found in the Mana whitepaper provided by the Coordicide team.

Mana will soon be introduced on GoShimmer.

Advertisement
TopCryptoNewsinYourMailbox
TopCryptoNewsinYourMailbox
Advertisement

Latest Press Releases

Our social media
There's a lot to see there, too

Popular articles

Advertisement
AD