I may be guilty of presenting my train of thought in reverse, so let me see if I can correct that.
Believing that there is a "solution" to this waiting to be found is somewhat of a problem in itself, it's simply a constraint of the system that a majority of mining power is assumed to be honest.
I think you are throwing the baby out with the bathwater.
Sybil attacks on decentralized distributed systems like bitcoin can be thought of as a disease. Some diseases are easily cured. Other disease, like diabetes, are not easily cured, but nevertheless need to be
managed. Sybil attacks (of the type being discussed in this thread) belong to the camp of problems that have no known cure,
but still need to be managed if and when they strike.
If you take cryptocurrency seriously, and I assume you do, then you have to envision a time when bitcoin (or some variation) plays an integral role in our economic system. You have to envision the possibility that someday, as unlikely as it may seem, a well funded malicious actor might actually try to pull off a 51% attack. So before The Powers That Be allow bitcoin to grow beyond the baby stages, they are going to ask the bitcoin community what will happen if a serious attack (launched by an enemy in a time of war, for instance) occurs. And I see two ways to answer:
1) Sorry guys, we'd be fucked. We never actually planned for this. We told you from the start: "it's simply a constraint of the system that a majority of mining power is assumed to be honest."
-- OR --
2) We do not have a cure, but we do have a plan to manage this scenario, and here it is.
So the
first step in my train of thought is that we need a plan to
manage (not
cure) the doomsday-scenario 51% attack, and my ambition in this thread is to discuss what that plan might entail. Nothing more. I think if you read this thread carefully, you'll find I have been careful not to overstate what I think can reasonably be accomplished. (IOW I have not said: "and here's the miracle cure for 51% attacks!")
It is hard for me to imagine a management strategy for dealing with a 51% attack that does not involve some element of attaching
somebody's real world identities to hashing power, so that we can begin the process of separating friend from foe. Does every miner need to reveal their real-world identities? No, I don't think so. I certainly hope not. So the
second step in my train of thought is that
some degree of real-world identification must play a role in our management strategy. If any other tractable starting point exists, I would like to hear it.
The
third step in my train of thought is that, if this management strategy is going to involve separating friendly nodes from enemy nodes, then to start out, the bitcoin network needs a way to label nodes. That was pretty much my entry point in the OP. I have tentatively suggested that nodes be tracked pseudonymously by labeling them using bitcoin public addresses. I know that this is a long thread and it is understandable if someone skimming may have assumed me to be proposing:
a registration system and oversight which is incompatible with decentralization
But if you read closely, at no point have I suggested a registration system with centralized oversight. At no point have I suggested abandoning the core tenets of decentralization. At no point have I said that
all, or even a majority, of would-be miners must reveal their real-world identification.
The prospect of labeling individual nodes involves problems that must be addressed, notably that:
it's cheap or entirely costless for an entity to appear to be one or more people.
And I have mentioned two ways to address this problem, but that would be the
fourth step in my train of thought. Perhaps we should go in order, starting with step 1. Does anyone vote for telling TPTB that we'd be fucked in the face of a 51% attack and there's nothing to be done? (If no, go on to step 2 ...)