#P2P #peer2peer #peertopeer

I ask anyone who wants to give me suggestions:

If I wanted to build a simple p2p network that is not immediately vulnerable to Sybil Attack could building a small ProofOfWork mechanism for creating new nodes or accessing it be sufficient?

Ways:

1. I build a mechanism for which a computation time of several hours is required for the construction of a valid ID in the said network

2. I construct a mechanism for which X amount of time is needed after the first connection to exchange data

Best Fix?

Reply to this note

Please Login to reply.

Discussion

No replies yet.