ReadWhitepaper
Whitepapers
Stories ▾
All Stories →
Whitepaper Deep Dive Section-by-section whitepaper analysis Origin Story Project founding and publication context Technical Explainer Simplified technical deep dives Impact & Legacy Industry influence and lasting effects Comparison Cross-whitepaper analysis and contrasts
RSS Feed
Figures
Glossary ▾
All Terms →
Consensus Cryptography Mining Transactions Network Smart Contracts Tokenomics DeFi Scaling Governance Wallets & Keys Stablecoins
Graph Search
🇺🇸 English English 🇰🇷 한국어 Korean 🇯🇵 日本語 Japanese 🇨🇳 中文简体 Chinese (Simplified) 🇪🇸 Español Spanish 🇧🇷 Português Portuguese 🇮🇳 हिन्दी Hindi 🇸🇦 العربية Arabic 🇫🇷 Français French 🇷🇺 Русский Russian 🇩🇪 Deutsch German 🇹🇷 Türkçe Turkish 🇻🇳 Tiếng Việt Vietnamese 🇮🇩 Bahasa Indonesia Indonesian 🇹🇭 ไทย Thai
Whitepapers Stories Figures Glossary Graph Search
Glossary

Category

networking

Sybil Attack

Network & Protocol 1 references

An attack where one actor creates many identities to gain disproportionate influence in a network. Consensus systems use resource costs (work, stake, etc.) to limit Sybil attacks.

Appears in 1 whitepaper sections

XRP logo
$XRP XRP
Unique Node Lists
...as equal influence, an attacker could create thousands of pseudonymous nodes (a Sybil attack) and overwhelm the honest nodes with fraudulent votes. The UNL prevents this by...

Related Stories

Whitepaper Deep Dive

Avalanche Whitepaper: Snow Protocols and Sub-Second Finality

How the Snow family of consensus protocols achieves probabilistic finality in under a second through repeated random sa…

ReadWhitepaper

Read crypto whitepapers in 15+ languages with side-by-side translation.

Content

  • Whitepapers
  • Stories
  • Figures
  • Glossary
  • Graph
  • Search
  • About

Developers

  • API Docs
  • OpenAPI
  • llms.txt
  • llms-full.txt

Subscribe

  • RSS
  • Atom
  • Stories RSS
  • Sitemap
  • robots.txt

Legal

  • Terms
  • Privacy
© 2026 ReadWhitepaper Built for the crypto community.