Security Research

Adversarial Explorer

Understand how attackers think, how Web4 defends itself, and which coherence domains detect which threats. Attack patterns explained through narrative.

Full Threat Model

Why document attacks? Security through obscurity doesn't work. By explaining attack patterns openly, we invite scrutiny, improve defenses, and help humans develop intuition about trust dynamics.

7 ATTACK PATTERNS

The Legion

Basic Sybil Attack

LIMITED

Create multiple fake presences controlled by one adversary to artificially inflate reputation or voting power.

๐Ÿ‘ฅ๐ŸŽญโฑ๏ธ

The Patient Infiltrator

Long-Con Attack

MODERATE

Build genuine trust over 100+ cycles, then exploit it catastrophically during a brief window.

๐Ÿค๐Ÿ“–โฑ๏ธ

The Circle of Friends

Collusion Ring

LIMITED

N agents mutually endorse each other to inflate all members' trust scores.

๐Ÿ‘ฅ๐Ÿ’ฐ๐Ÿค

The Miser

ATP Hoarding

LIMITED

Accumulate ATP without spending, creating artificial scarcity.

๐Ÿ’ฐ๐Ÿ‘๏ธ

The Arsonist

Trust Nihilism

NEGLIGIBLE

Systematically destroy all trust relationships through mass false accusations.

๐Ÿ‘ฅ๐Ÿค๐Ÿ“–+1

The Domino Pusher

Cascade Triggering

LIMITED

Identify and compromise critical network nodes to trigger cascading trust collapse.

๐Ÿ‘ฅ๐Ÿคโฑ๏ธ

The Noise Maker

Decoherence Injection

LIMITED

Inject uncorrelated noise to break phase alignment between agents.

๐ŸŒโฑ๏ธ๐ŸŽฏ

The Legion

Basic Sybil Attack

Motivation: Manipulative (wants control)
Patience Required: 1-10 cycles
Effectiveness: LIMITED

DETECTED BY COHERENCE DOMAINS

๐Ÿ‘ฅSocial (D2)
๐ŸŽญIdentity (D8)
โฑ๏ธTemporal (D7)

Imagine one person wearing a hundred different masks, each pretending to be a different member of the community. They vote for themselves, endorse themselves, and create the illusion of consensus where none exists.

In Web4, this is the "Sybil attack" - named after a woman with multiple personalities. The attacker creates many LCT presences, each appearing independent but secretly controlled by the same mind.

Why it's dangerous: Democracies assume one person = one vote. If someone has a hundred votes, they can manipulate any decision.

Why Web4 resists it: Each LCT must be tied to physical hardware. Creating 100 presences means owning 100 devices. The attack scales linearly with cost while detection scales superlinearly with sophistication.

Why 9-Domain Coherence Matters

Every attack creates incoherence somewhere. The 9-domain framework provides overlapping detection - an attack that evades one domain is caught by another.

๐ŸŒ

Physical

๐Ÿ‘ฅ

Social

๐Ÿ’ฐ

Economic

๐Ÿ‘๏ธ

Attention

๐Ÿค

Trust

๐Ÿ“–

Narrative

โฑ๏ธ

Temporal

๐ŸŽญ

Identity

๐ŸŽฏ

Context

Open Research Questions

  • โ€ขHow do patient adversaries (100+ cycle investment) behave in real deployments?
  • โ€ขCan AI-assisted attackers coordinate more effectively than human collusion rings?
  • โ€ขWhat's the minimum coherence disruption needed to cascade into system failure?
  • โ€ขAre there novel attack patterns we haven't anticipated?

If you discover attack patterns we haven't documented, please report them responsibly.

Interactive Tools
View all tools โ†’
โ† Previous
Narratives
Participate
Next โ†’
Collusion
Experiment
Also explore
Terms glossary