-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Limit rewards per IPv4 /24 subnet #29
Comments
The grouping algorithm must allow us to identify participants from U.S- or E.U.- sanctioned countries to implement geofencing and ensure we don't pay them. |
Cloudflare using IPV6 which is slowing things down a bit. |
We decided to implement a different solution: we put Cloudflare's WAF (web application firewall) in front of SPARK API and configured it to reject requests coming from the sanctioned countries. |
Visualisations:
|
When calculating SPARK rewards, we can see many nodes completing the same task. To make sybil attacks more expensive, we should reward only one checker in each IPv4 /24 subnet.
Tasks
The text was updated successfully, but these errors were encountered: