What Is a “Sybil Attack” and Why Is It Less Effective on a Consortium Chain?

A Sybil attack is a security threat where a single entity attempts to gain a disproportionately large influence over a decentralized network by creating and operating multiple false identities (nodes). It is less effective on a consortium chain because the network is permissioned.

New nodes cannot join without the explicit approval and vetting of the governing consortium. This pre-approval process prevents an attacker from creating multiple pseudonymous identities to gain a majority stake.

What Is a ‘Sybil Attack’ in the Context of DAOs?
What Is the Difference between a 51% Attack and a Sybil Attack?
What Is a ‘Permissioned’ Blockchain?
What Is a Sybil Attack and How Does Quadratic Voting Mitigate It?
How Does a ‘Sybil Attack’ Threaten a Decentralized Cryptocurrency Network?
What Is the Difference between a 51 Percent Attack and a Sybil Attack?
What Is a “Sybil Attack” in the Context of Decentralized Oracles?
How Does a Decentralized Autonomous Organization (DAO) Differ from a Permissioned Blockchain’s Governance Model?

Glossar