ReadWhitepaper
白皮书
Stories ▾
All Stories →
Whitepaper Deep Dive Section-by-section whitepaper analysis Origin Story Project founding and publication context Technical Explainer Simplified technical deep dives Impact & Legacy Industry influence and lasting effects Comparison Cross-whitepaper analysis and contrasts
RSS Feed
图
术语表 ▾
All Terms →
Consensus Cryptography Mining Transactions Network Smart Contracts Tokenomics DeFi Scaling Governance Wallets & Keys Stablecoins
图形 搜索
🇺🇸 English English 🇰🇷 한국어 Korean 🇯🇵 日本語 Japanese 🇨🇳 中文简体 Chinese (Simplified) 🇪🇸 Español Spanish 🇧🇷 Português Portuguese 🇮🇳 हिन्दी Hindi 🇸🇦 العربية Arabic 🇫🇷 Français French 🇷🇺 Русский Russian 🇩🇪 Deutsch German 🇹🇷 Türkçe Turkish 🇻🇳 Tiếng Việt Vietnamese 🇮🇩 Bahasa Indonesia Indonesian 🇹🇭 ไทย Thai
白皮书 Stories 图 术语表 图形 搜索
术语表

类别

networking

Sybil Attack

女巫攻击

Network & Protocol 1 references

一种攻击者创建许多身份以在网络中获得不成比例的影响力。共识系统使用资源成本(工作、权益等)来限制女巫攻击。

出现在 1 个白皮书章节中

XRP logo
$XRP XRP
Unique Node Lists
...as equal influence, an attacker could create thousands of pseudonymous nodes (a Sybil attack) and overwhelm the honest nodes with fraudulent votes. The UNL prevents this by...

Related Stories

Whitepaper Deep Dive

Avalanche Whitepaper: Snow Protocols and Sub-Second Finality

How the Snow family of consensus protocols achieves probabilistic finality in under a second through repeated random ...

ReadWhitepaper

通过并排翻译阅读超过 15 种语言的加密货币白皮书。

内容

  • 白皮书
  • Stories
  • 图
  • 术语表
  • 图形
  • 搜索
  • 关于

开发商

  • API文档
  • OpenAPI
  • llms.txt
  • llms-full.txt

订阅

  • RSS
  • Atom
  • Stories RSS
  • Sitemap
  • robots.txt

合法的

  • 条款
  • 隐私
© 2026 ReadWhitepaper 专为加密社区而打造。