SYBILing nodes! 😱 Exploiting IC Network... Community Attention Required!

Hi @borovan !
IMHO Henrique suggested that rushing this process wouldn’t lead to good outcomes, like jumping to hard quests unprepared. Here’s an approach I think would work better:

  1. Clearly define which Node Provider behaviors or situations constitute a breach of trust.
  2. Discuss and ideally draft a motion proposal for the community to vote on.
  3. After the motion is approved, present evidence demonstrating that provider X exhibits these trust-breaking behaviors.
  4. Submit formal motion proposals to remove the provider based on this evidence.

And BTW, the Foundation started working on 1. See Enhancing Network Decentralization - Proposals for Identity Verification and Subnet Allocation and what’s to come.

1 Like