Anti-Sybil rules
1. Dynamic Mining Threshold Adjustment
Preconditions for Mining: To participate in mining, users must meet certain preconditions, such as staking a WIFI-Scanner-NFT or staking WDID tokens. These measures help to regulate access and ensure commitment to the network.
2. Sliding Confirmation Window
UPD Confirmation Process: Once a UPD (Unit Pair Data) is initially uploaded to the server, it requires confirmation from at least 20 different users within a 14-day window. These users must have proximate GPS locations and consistent MAC addresses.
Crowdspread Effect: This sliding window confirmation also creates a crowdsourcing effect, leveraging economic incentives to encourage users to recruit others into the system for data confirmation support.
3. Utilization of Clustering Algorithms
Cheating Detection: Clustering algorithms are employed in the background to detect fraudulent activities. The focus is on identifying fake automatic data submissions and group submissions from multiple phones that are interconnected, confirming each other's data.
4. Measures Against Suspicious Submitters
KYC and Facial Recognition: For data submitters who are flagged as problematic, measures such as Know Your Customer (KYC) procedures and facial recognition are implemented to reduce their mining efficiency. These steps add a layer of security and authenticity to the data submission process.
5. Accelerated Confirmation with Hexgon Hardware
Hardware-Assisted Confirmation: If users purchase Hexgon hardware to facilitate the confirmation process, the requirement for cross-confirmation is reduced to only 10 users. This hardware accelerates the verification process, thereby enhancing the overall efficiency of the mining operation.
Last updated