A process for securing STORE from Sybil attacks which all miners must go through in order to join the network.
What is a “Sybil attack”?
In a Sybil attack, an attacker manipulates the reputation system of a network or service by creating a large number of pseudonymous identities and uses them to gain a disproportionately large influence / control of the network.
How does TYN achieve Sybil resistance?
A possible solution to this problem is some form of Know-Your-Customer (KYC) process, but this leads to centralized decision making, forcing a decentralized democracy to start its life in a centralized manner.
STORE proposes a new model called Trust Your Network (TYN) whereby 2/3 of voters agree on something being the “truth” (the primary case being a miner’s identity). In other words, it is a quarterly process whereby other miners vote on the authenticity of the identity of other miners using a standard set of tools and documents.
This process is at the core of 1 entity 1 vote and is best illustrated in the following way: