Executive Summary
- PageRank separates phishing from legitimate addresses with 96% accuracy on 3 million Ethereum accounts
- Only 3 of 33 tested parameters matter — the system is radically simpler than expected
- The system resists 5 of 6 attack types algorithmically; the 6th requires identity verification
- Adding time decay, citation dampening, or a 4th parameter all made things worse — we tested and rejected them
- The biggest threat isn't algorithmic — it's bribery of trusted nodes. Defense: make it economically irrational
- Production readiness score: 80% (24/30). Gaps: cross-chain validation, defense cross-testing
The Discovery (33 → 3)
1,000-trial ablation study reduced a 33-parameter search space to just 3 values that matter.
Dataset Validations
Six real-world datasets across two blockchains. Every result independently reproducible.
Bitcoin Alpha
PASSBitcoin OTC
PASSEX-Graph Wash Trading
PASSXBlock Phishing (Subgraph)
PASSXBlock Phishing (Full Graph)
FLAGSHIP RESULTDAO Governance
EXPECTED WEAKAlpha Re-Tuning
Re-tuning alpha from 0.60 to 0.85 yielded significant improvements on both Bitcoin trust networks.
Red Team — 6 Attack Strategies
Six optimized attack strategies tested against vanilla PageRank vs. 3-parameter defended system.
| Attack | Sybils | Vanilla %ile | 3-Param %ile | Defense Δ |
|---|---|---|---|---|
| Naive Sybil Ring | 10 | 78.9 | 65.1 | +13.8 |
| One-Way Citation | 20 | 95.3 | 89.6 | +5.7 |
| Diverse Sybil Army | 30 | 86.7 | 87.5 | -0.8 |
| Piggyback | 15 | 73.6 | 54.6 | +19.0 |
| Gradual Infiltration | 20 | 68.5 | 45.9 | +22.7 |
| Compromised Nodes | 3 | 88.0 | 88.0 | +0.0 |
Defense Mechanisms — 5 Tested
Ranked by effectiveness. Two stand above the rest.
Citation Freshness Discount
Economic Deterrence (KYC)
Anomaly Detection
Rate Limiting
Multi-Path Requirement
Personalized PageRank
Trust anchors personalize reputation to a viewer's perspective — bridging Layer 2 (reputation) and Layer 3 (identity).
Temporal Analysis
Does reputation change over time? Should we add a time component? We tested exhaustively.
What We Ruled Out
Three promising ideas that failed empirical testing. Reporting what doesn't work is as valuable as what does.
Temporal Decay
Discounting older citations seemed logical but consistently reduced accuracy. Reputation earned fairly shouldn't expire.
Intra-Anchor Dampening
Penalizing citations between trust anchors paradoxically helped attackers by weakening the legitimate trust backbone.
4th Parameter (Any)
Exhaustive search for a beneficial 4th parameter found none. Every candidate either degraded accuracy or added no signal beyond the existing three.
Device Liveness Research
Proof of real human on real device. On-device AI + zero-knowledge proofs. Nothing leaves your phone.
What's Possible Today
On-Device Behavioral Biometrics
98%+ accuracy using keystroke dynamics, gait analysis, and touch patterns. All inference runs locally.
ZK Proof of ML Inference
2.3 seconds on mobile via Bionetta/Rarimo. Proves a model ran on-device without revealing inputs.
On-Chain Proof Verification
~230K gas per verification — less than a Uniswap trade. Groth16 proofs on any EVM chain.
TEE-Signed Device Attestation
Apple Secure Enclave and Android StrongBox provide hardware-rooted trust anchors.
What Needs Research
ML Inside TEE
ARM CCA Realms would eliminate side-channel attacks. Estimated 12-18 months out.
Continuous Re-Proving
Battery management for periodic ZK proof generation without draining the device.
Cross-Device Enrollment
Migrating biometric models between devices without compromising privacy.
Anti-Replay Guarantees
Ensuring proofs can't be recorded and replayed by an automated system.
Technology Stack
- Model: Lightweight CNN/LSTM (<1M params) on keystroke + gait + accelerometer
- Inference: CoreML (iOS) / LiteRT (Android)
- ZK Proving: Bionetta (Rarimo) — mobile-native, EVM-native
- Attestation: TikTok's open-source ZK attestation circuits
- On-chain: Solidity Groth16 verifier
Competitive Landscape
| Our Approach | World ID | Humanode | |
|---|---|---|---|
| Hardware | Commodity phone | Custom Orb ($) | Phone camera |
| Method | Continuous behavioral | One-time iris | Periodic face |
| UX Friction | Zero (passive) | High (visit location) | Medium (scan) |
| Privacy | ZK proof, no data leaves | ZK proof, no image | Homomorphic |
Timeline
Path to Production — Testnet Deployment
Everything needed to go from code-complete to live on a testnet.