search
Homeweb3.0From zkSync to LayerZero: Sybil attacks can erode projects, and no one wants to see a fake community

Author: Builders

Compiled by: Deep Tide TechFlow

Token issuance is a critical moment in the history of a project. If the token issuance is messed up, the project may end.

Nothing can destroy the credibility of a token offering faster than a witch attack. In this attack, a malicious actor creates multiple false identities in an attempt to gain disproportionate influence and token distribution in the network.

No one wants to see a fake community.

Next, we will explore how Sybil attacks affect token issuance through two recent airdrop cases: zkSync and LayerZero.

zkSync

从 zkSync 到 LayerZero:女巫攻击会侵蚀项目,没有人希望看到虚假的社区

zkSync is an Ethereum Layer 2 scaling solution using zero-knowledge proofs and was one of the most anticipated airdrops of 2024. However, it received its fair share of criticism due to its lack of witch precautions. For example, Mudit Gupta, chief information security officer at Polygon Labs, commented on X:

zkSync’s airdrop has been released.

This is probably the easiest to farm airdrop ever.

As far as I know, there is almost no Sybil filtering.

Easily available in large quantities to anyone who understands the standards.

This makes people understand more about LayerZero’s efforts in Sybil filtering.

从 zkSync 到 LayerZero:女巫攻击会侵蚀项目,没有人希望看到虚假的社区

Cinneamhain Ventures partner Adam Cochran also expressed similar concerns:

I like the zkSync team very much, but from a Sybil prevention perspective, this airdrop was really not well planned.

These standards are easy to miss for real users and easy to achieve for "farm" users without any anti-Sybil measures.

With projects so new on the chain and the number of projects limited, real users may only use 1-2 dapps or hold a small number of tokens.

If the project does not want those "speculators" who sell quickly, it needs to put more thought into this aspect.

从 zkSync 到 LayerZero:女巫攻击会侵蚀项目,没有人希望看到虚假的社区

Aktiviti Rangkaian zkSync

Pada bulan selepas zkSync diturunkan kepada pengguna pada 17 Jun 2024 (sehingga 17 Julai 2024), bilangan alamat aktif pada rangkaian berkurangan sebanyak lebih kurang 78.7%. Ini menunjukkan bahawa kebanyakan pengguna berada di sana untuk mendapatkan airdrop dan kemudian meninggalkan projek itu. . . . Pada masa ini, hanya 17.9% daripada penerima utama ini masih memegang token mereka.

Menurut @CryptusChrist, 746 penyerang Sybil yang dikenali menerima kira-kira $6.9 juta dalam bentuk token ZK dalam airdrop. Sumber: Nansen ken harga turun kira-kira 39.29% antara tarikh airdrop pengguna (17 Jun 2024) dan 23 Julai 2024.

从 zkSync 到 LayerZero:女巫攻击会侵蚀项目,没有人希望看到虚假的社区

Sumber: CoinGecko

Jadi, apa yang salah dengan zkSync? Pertama, kriteria kelayakan undian udara pasukan agak mudah untuk dieksploitasi oleh penyerang Sybil, dan terdapat kekurangan langkah pencegahan Sybil yang berkesan. Selain itu, zkSync mengecualikan pengguna sah tertentu, seperti projek yang membina zkSync ERA dan menyumbang secara langsung kepada ekosistemnya.

从 zkSync 到 LayerZero:女巫攻击会侵蚀项目,没有人希望看到虚假的社区Kini pasukan mereka perlu menggandakan usaha mereka untuk melibatkan semula spekulasi harga yang ketara yang didorong oleh aktiviti palsu penyerang Sybil.

LayerZeroLayerZero ialah protokol kebolehoperasian yang direka untuk memudahkan komunikasi lancar dan pemindahan aset antara rantaian blok yang berbeza, Berbeza dengan dua contoh di atas, LayerZero melaksanakan langkah pencegahan sihir yang kuat.

Menurut Bryan Pellegrino, Ketua Pegawai Eksekutif LayerZero Labs, pasukan akhirnya mengenal pasti 1.1 juta hingga 1.3 juta dompet sihir unik semasa fasa pelaporan diri dan analisis sybil, dan pasukan mereka terus melibatkan diri dan memberi ganjaran kepada komuniti kerana melaporkan serangan sybil Oleh .

Aktiviti Rangkaian LayerZero

Bilangan mesej pada LayerZero menurun sebanyak 91.5% antara 30 April 2024 (sehari sebelum tarikh syot kilat) dan 7 Julai 2024.

从 zkSync 到 LayerZero:女巫攻击会侵蚀项目,没有人希望看到虚假的社区

Sumber: LayerZero Scan

Begitu juga, bilangan transaksi harian juga menurun lebih daripada 92% antara tarikh syot kilat dan tarikh airdrop. . Walau bagaimanapun, pendekatan pasukan yang disebutkan di atas terhadap pencegahan Sybil mungkin juga telah memberi kesan kejatuhan ini, membolehkan mereka melakukan airdrop dengan lebih sedikit penyerang Sybil.

从 zkSync 到 LayerZero:女巫攻击会侵蚀项目,没有人希望看到虚假的社区ZRO Trend Harga

Dari 20 Jun 2024 (tarikh airdrop) hingga 18 Julai 2024, harga ZRO token asli LayerZero turun daripada $4.79 kepada $4, penurunan lebih kurang 16%. Penurunan ini jauh lebih rendah daripada penurunan 39% ZK dalam tempoh masa yang sama. Terutama, harga ZRO akhirnya melebihi harga penyenaraian awalnya, walaupun terdapat penurunan dalam aktiviti rangkaian LayerZero.

Sumber: CoinGecko

Walaupun sukar untuk menentukan semua faktor yang menyumbang kepada teknologi LayerZero yang mempunyai kestabilan harga relatif.

从 zkSync 到 LayerZero:女巫攻击会侵蚀项目,没有人希望看到虚假的社区Mengapa pembina perlu mengambil berat tentang pencegahan ahli sihir?

Dalam jangka pendek, serangan Sybil mungkin kelihatan memberi manfaat kepada projek, kerana ia boleh meningkatkan data secara buatan dan menjana keuntungan segera. Walau bagaimanapun, seperti yang ditunjukkan oleh contoh di atas, pengenalan serangan Sybil boleh menyebabkan penjualan token dan penurunan dalam aktiviti rangkaian – kedua-duanya boleh menghakis kemampanan jangka panjang sesuatu projek.

Apabila penyerang Sybil dialih keluar, peserta yang sah mempunyai lebih banyak peluang untuk mengambil bahagian dan menyumbang, kerana penyingkiran entiti penipuan membebaskan slot berharga.

Kebanyakan pasukan yang melancarkan melalui titisan udara perlu menggandakan usaha mereka untuk melibatkan semula spekulasi harga yang ketara dan aktiviti rangkaian yang didorong oleh aktiviti palsu. Tiada siapa yang mahu melihat komuniti palsu.

The above is the detailed content of From zkSync to LayerZero: Sybil attacks can erode projects, and no one wants to see a fake community. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
As Fear Drives Selling, BlockDAG (BDAG) Stands Out from the CrowdAs Fear Drives Selling, BlockDAG (BDAG) Stands Out from the CrowdApr 13, 2025 am 11:48 AM

As fear drives selling in the crypto market, major coins like Cardano and Solana face tough times.

The general crypto market has recovered as digital assets shake off bearish sentimentsThe general crypto market has recovered as digital assets shake off bearish sentimentsApr 13, 2025 am 11:46 AM

In the past 24 hours, the general crypto market has recovered as digital assets shake off bearish sentiments. Within this time frame

Bitcoin's Current Cycle Shows Strong Similarities to the Structural Resets Seen in Both 2017 and 2021.Bitcoin's Current Cycle Shows Strong Similarities to the Structural Resets Seen in Both 2017 and 2021.Apr 13, 2025 am 11:44 AM

Key market indicators, like the relationship between Bitcoin and market volatility (BTC/VIX ratio) and the total crypto market capitalization on weekly charts

New Meme Coins to Watch Now: Cheems Token, Siren, and PeiPeiNew Meme Coins to Watch Now: Cheems Token, Siren, and PeiPeiApr 13, 2025 am 11:42 AM

As meme coins continue to take the crypto world by storm, savvy investors are constantly looking for the next big opportunity.

The Crypto Market Has Witnessed a Rebound Following the Recent Sheer DownturnThe Crypto Market Has Witnessed a Rebound Following the Recent Sheer DownturnApr 13, 2025 am 11:40 AM

The crypto market has witnessed a rebound following the recent sheer downturn. As per the exclusive market data, the total crypto market capitalization has reached $2.71Ts

He got rich off pixelated punks — and punked the Internal Revenue Service in the processHe got rich off pixelated punks — and punked the Internal Revenue Service in the processApr 13, 2025 am 11:38 AM

A Pennsylvania man faces federal prison after pleading guilty to flipping more than $13 million worth of digital art from the infamous CryptoPunks NFT collection — and reporting none of it to the IRS, prosecutors said Friday.

Trending Meme Coins To Buy NowTrending Meme Coins To Buy NowApr 13, 2025 am 11:36 AM

In recent times, meme coins have emerged as a unique and exciting investment opportunity, drawing both seasoned investors and newcomers alike.

Toncoin (TON) Appears to Be Positioning Itself for a Short-term ReboundToncoin (TON) Appears to Be Positioning Itself for a Short-term ReboundApr 13, 2025 am 11:34 AM

Toncoin appears to be positioning itself for a short-term rebound after enduring a week of market-wide losses that affected most cryptocurrencies.

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
3 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
3 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
3 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
WWE 2K25: How To Unlock Everything In MyRise
4 weeks agoBy尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

MantisBT

MantisBT

Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

MinGW - Minimalist GNU for Windows

MinGW - Minimalist GNU for Windows

This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.