I believe that there is mounting evidence to suggest that the IC node provider community has been infiltrated by actor(s) actioning a drawn out sybil attack, to extract value while putting the IC at risk.
Sybil attacks are where multiple fake identifies are used to progressively gain more and more control over a network. Node providers are incentivised to onboard nodes under fake identifies in order maximise the number of nodes they can control and therefore maximise the rewards that they can receive. In addition, there are incentives to make nodes appear as though theyāre located in desirable countries for improving network topology. This improves the chances of fake NPs being onboarded to the IC.
I believe @tina23, @geeta23, @paul23, @GAbassad and @GeoNodes are all very likely to be the same person, masquerading as the Geeta Kalwani NP, the Bianca-Martina Rohner NP, the GeoNodes LLC NP, and the George Bassadone NP (at least). These are just the cases that stand out. More info here (be sure to also check out and cross-reference the formal documentation for @tina23 and @GeoNodes).
Given that there hasnāt been much attention to covering oneās tracks, I donāt think itās unlikely that theyāre operating more accounts and NPs (and these are just the ones that slipped through the cracks / the tip of the iceberg).
The IC is in need of mechanisms for:
- Reliably establishing the true location of nodes (to at least country precision)
- Making NP sybil attacks too risky for the NP to see it as a cost-effective strategy
The NNS also needs to step up its game when it comes to evaluating and onboarding new node providers. @timk11, @quint, are there any measures that are currently used to combat this problem during the process of onboarding new nodes (ones that would have caught the cases above)? Iām keen to get involved with this NNS topic at the next opportunity.
@SvenF are you able to share any information about the triangulation-based geolocation approach that is being worked on? How far away is a proof of concept? Presumably this solution would be based on node response latency?
@katiep have you had any more thoughts about our proof of stake discussion? For the node machines themselves to act as the stake you have described them to be, the NNS would need to be capable of confiscating the nodes and reallocating ownership in response to significant offenses (such as above).
@sat given that thereās a smoking gun in the formal documentation for onboarding @tina23 and @GeoNodes, and ātinaā has clearly been operating the @GeoNodes account (at times), do you agree that the DRE decentralisation tooling should be updated to keep track of outed sybiling NPs (such that no more than 1 of a sybiling group of NPs should reside in the same subnet)? This would be similar to how the various DFINITY NPs are a special case, with special business rules.
Everybody, what are your thoughts on this? Are you concerned? What do you think should be done to address these problems, and what do you think should be done to handle offenders?
This is a problem that affects all of us - the safety and sanctity of the IC, its potential to succeed, and the security of our stake, now and in the future. We should all have an opinion on this.