What Is a Sybil Attack and How Does Quadratic Voting Attempt to Mitigate It?

A Sybil attack occurs when a single entity creates multiple pseudonymous identities to gain a disproportionately large influence in a decentralized system. In governance, this means one whale could split their tokens across many wallets to vote multiple times, circumventing one-token-one-vote limits.

Quadratic voting (QV) makes this attack less cost-effective. Since the cost of votes increases quadratically, the attacker would have to spend significantly more to gain the same voting power by splitting tokens than by voting from a single large wallet.

Proof-of-personhood solutions are also explored to further mitigate Sybil attacks.

Does PoA Fully Eliminate the Risk of a Sybil Attack?
How Can an Oracle Be Leveraged to Improve the Security of Governance Proposals?
What Is the Concept of ‘Futarchy’ and How Does It Relate to Governance?
What Is a Common Technical Defense against a Sybil Attack in Token-Weighted Voting?
How Does a DON Mitigate the Risk of a Sybil Attack?
What Is a “Transaction Spam” Attack and How Do Fees Mitigate It?
What Is a Sybil Attack and How Does Quadratic Voting Mitigate It?
What Is the Difference between a 51% Attack and a Sybil Attack?

Glossar