Proof of Scarcity and Sybil attacks
In this article, we’ll examine proof of scarcity, using the electromagnetic spectrum as a method to protect against Sybil attacks.
Identities on P2P Networks
Since distributed ledgers were invented, different systems have been brought to…
