It doesn't matter. The issue I cited is insoluble. You will never find a technical solution. Ever.
*citation needed
The Sybil attack is, in my qualified opinion, the weakest part of the Sia protocol. But we do have sufficient defense against it, and that comes in the form of proof-of-burn.
Nope. I already explained why staking (analogously burning) doesn't provide sufficient security.
And I explained why you are incorrect. To reiterate, hosts burn coins to get weight. Renters are 2x as likely to pick a host with 2x the burned coins. An attacker can burn a whole bunch of coins 1 time to gain an advantage, but hosts in the ecosystem will ongoing be burning coins, and all of the hosts that have burned coins in the past will have preference that the attacker needs to overcome. A sufficiently disruptive attacker can be displaced with a simple blacklisting.
While the system is young, a 'burn attack' is much more likely than after the system hits maturity. Most attackers aren't interesting in spending more than a few hundred dollars to be destructive (the only ability that the attack gives you is vandalism - you can destroy data but otherwise do nothing useful). On Sia today, a couple hundred dollars would be enough. But as Sia grows, attacks will become expensive as quickly as Sia grows. At full steam (being used by corporations - 1 million TB+), doing a burn attack is going to require millions of dollars, and is only going to be briefly useful (a sudden burn of millions of dollars in coins is almost certainly going to arouse suspicion).
Edit: note that shorting isn't required to break the economic model for the security. The staked (deposited and risked) or burned coins can be offset by earnings and in fact must be, otherwise no one will be a storage provider.
The burned coins can be offset by earnings, correct. It is one thing to burn some coins and make them back over time. Or to build up a history of burned coins that proves ongoing legitimacy. It is quite another to enter an economic system with power equivalent to everyone else in the system. Bitcoin is safe only because it's considered unreasonable for a single party to be able to jump in with sufficient hashpower (hashpower is an analog to economic power) to disrupt the system. Someone with sufficient economic power can 51% attack Bitcoin, disrupting the security model.
Sia works the same way. If you have sufficient economic power, you will be able to Sybil attack the system. But doing so will come at great loss to yourself (you'll need to burn lots of coins), and then the most you can do is siphon up all of the incoming data. You can't even disrupt the data that's already been uploaded to Sia, you can only grab at the new data. Renters will repeatedly request storage proofs across your contracts, meaning not only will you need the economic power to perform the proof-of-burn, you'll also need the economic power to actually store the data that's being uploaded. But it gets worse for you, because renters expect you to put up collateral on the data. So now you've burned a bunch of coins, bought a bunch of storage space, and put up a bunch of collateral. And the only thing you can do with that is delete the data. And if you do, renters will blacklist you, meaning you can't repeat the attack without burning another round of coins.
The collateral requirement and hard disk requirement is reduced substantially if you are only attacking a specific person's files. But you will still need to perform the burn, and the extent of your malice is limited to data destruction. Given that data is stored at high redundancy, you'll need to position your Sybil hosts such that out of N total hosts that a renter selects, N-M are yours. In the default settings, this means that out of 30 randomly selected hosts, 21 must be from you. And each of the 21 has to have burned enough coins to have the renter considering them from the pool of hosts. Renters will avoid newer hosts (instead wait until they've been hosting for a few weeks), will avoid hosts coming from the same geographic region, and will only prioritize low-cost hosts to a certain threshold, after which all hosts are weighted the same (which means setting the price to 0 will give you a limited advantage). And again, the only ability you get by performing this attack is that you can destroy data. There is no profit here. All of these protections means that any malice on the network needs to be both a long-term attack, and needs to have substantial economic backing.
Renters can protect against targeted attacks by uploading data anonymously or through a popular proxy, or by using 10x or 20x redundancy across 100+ hosts. This increases the Sybil attackers requirement from getting 21 out of 30 hosts to getting 91 out of 100 hosts, a much taller order, especially given the burn requirements.
Your arguments are not sufficiently fleshed out. You do a substantial amount of handwaving such as 'staking is equivalent to burning' and don't provide support or citations. I can understand your frustration given the plethora of broken cryptocurrencies out in the wild, but in this case you are too quick to dismiss us. I don't really expect you to believe or acknowledge that, but I can ask you to be more rigorous if you are going to continue attacking our coin.
I firmly stand by my assertion that, in a practical real-world system, our methods for dealing with Sybil attacks are sufficient. On Sia, executing a malicious Sybil attack is expensive. Such an attack only gives you the ability to vandalize, and historically people do not spend large sums of money purely to participate in vandalism. And by 'large sums of money', I mean somewhere between 10% and 50% of the total money ever spent on storage within the system. Feasible? Yes. Less expensive than a 51% attack on Bitcoin? Depends, but most likely. As useful as a 51% attack on Bitcoin? Absolutely not. Likely to cause problems in the real world? No, though it's not out of the question. Can an attacker who succeeds once remain successful forever? No, malicious or untrusted hosts get blacklisted, and suspicious activity can be addressed at a social level (sending out warnings, notifications, and instructions for a fix).