当前位置:网站首页>How to prevent governance attacks in DAOs?
How to prevent governance attacks in DAOs?
2022-08-01 21:52:00 【Blockchain Interstellar Society】
Theoretically, DAOs built on the blockchain have high security.However, as a technology that has only been developed for more than ten years, blockchain still has defects in many places, which also makes the blockchain ecology in actual operation not achieve the ideal security.
Similarly, DAOs often face malicious attacks from the Internet.As a decentralized autonomous organization, sometimes, a malicious proposal may bring the DAO to collapse.
There are a large number of real cases of governance attacks against DAOs. For example, in a protocol called Beanstalk, an attacker used a loan to quickly obtain a large number of Beanstalk governance tokens, made a malicious proposal and passed it quickly, stealing $182 million in Beanstalk funds before other members of the protocol responded.
DAO's governance attack has two different ways: light and dark. The above example is a case that happened in a public place.Within a period of time, the accumulation of governance tokens through some anonymous accounts is basically the same as that of normal users. When the time is right, it will show its fangs and launch an attack on DAO.
How to prevent governance attacks in DAOs, the most effective solution is to identify malicious attackers.However, judging from the protocol adopted by the current DAO, the two groups of normal contributors in the DAO and the attackers who want to destroy the DAO for profit are indistinguishable.This has also led to the fact that the higher the autonomy DAO provides to members of the organization, the easier it is for attackers to do evil.However, decentralization is the core idea of DAO, and it is inevitable to provide members with a high degree of autonomy.Therefore, preventing DAO governance attacks requires other means before the technology fails to identify malicious attackers.
After the underlying technology could not be improved to prevent governance attacks, some people proposed a solution to the problem from the governance level. In short, there are three main types:
One, reduce the attack value.When the value of a thing is very low, it is natural that the attacker will not spend a lot of energy and cost to attack it.Although the development of a DAO will naturally lead to an increase in its value, the value of an attack can naturally be reduced by limiting the corresponding governance power when the DAO is initially designed.
Second, increase the cost of voting. Generally speaking, the governance of DAO requires the acquisition of tokens to obtain voting rights. When the cost of acquiring tokens becomes high, attackers are generally reluctant to spend high costs to launch governance attacks on DAO.The DAO community can establish some incentives to reduce the circulation of the token, thereby increasing its value.
Third, increase the attack cost.When the attacker obtains a large number of governance tokens, DAO can also make it difficult for the attacker to launch an attack by increasing the attack cost.For example, common KYC authentication or reputation authentication can make some anonymous attackers have to give up their attacks.In addition, some projects use time locks to prevent the acquired tokens from participating in governance for a period of time. This time lock gives members and the community time to reflect, and can be better dealt with when an attacker launches an attack after releasing the time lock.
边栏推荐
- 基于php湘西旅游网站管理系统获取(php毕业设计)
- 用户体验 | 如何度量用户体验?
- Homework 8.1 Orphans and Zombies
- LeetCode952三部曲之二:小幅度优化(137ms -> 122ms,超39% -> 超51%)
- Pagoda application experience
- 迁移学习——Discriminative Transfer Subspace Learning via Low-Rank and Sparse Representation
- 数据分析面试手册《指标篇》
- Upload markdown documents to blog garden
- 回收租凭系统100%开源无加密 商城+回收+租赁
- Appendix A printf, varargs and stdarg a. 2 use varargs. H to realize the variable argument list
猜你喜欢
基于php影视资讯网站管理系统获取(php毕业设计)
回收租凭系统100%开源无加密 商城+回收+租赁
游戏元宇宙发展趋势展望分析
[Niu Ke brush questions-SQL big factory interview questions] NO4. Travel scene (a taxi)
基于php湘西旅游网站管理系统获取(php毕业设计)
groupByKey和reduceBykey的区别
Raspberry Pi information display small screen, display time, IP address, CPU information, memory information (C language), four-wire i2c communication, 0.96-inch oled screen
SAP ABAP OData 服务如何支持删除(Delete)操作试读版
feel so stupid
scikit-learn no moudule named six
随机推荐
Small program -- subcontracting
_ _ determinant of a matrix is higher algebra eigenvalue of the product, the characteristic value of matrix trace is combined
Safe fifth after-school exercise
微软校园大使喊你来秋招啦!
ModuleNotFoundError: No module named 'yaml'
2022 edition of MySQL tutorial, top collection good, take your time
ImportError: `save_weights` requires h5py.问题解决
【C语言】猜数字小游戏
ARFoundation Getting Started Tutorial U2-AR Scene Screenshot Screenshot
365天挑战LeetCode1000题——Day 046 生成每种字符都是奇数个的字符串 + 两数相加 + 有效的括号
不卷了!入职字节跳动一周就果断跑了。
小程序--独立分包&分包预下载
第3讲:MySQL数据库中常见的几种表字段数据类型
365 days challenge LeetCode1000 questions - Day 046 Generate a string with odd number of each character + add two numbers + valid parentheses
Scala practice questions + answers
【Objective-C中的@synthesize】
WEB 渗透之文件类操作
网络水军第一课:手写自动弹幕
模拟数据之mockjs
groupByKey和reduceBykey的区别