Anti-Sybil & Integrity

  • Wallet heuristics: age, activity patterns, bridging/DEX patterns, clustering signals.

  • Device and session checks: rate limits, abnormal latency/fingerprint alerts.

  • Answer uniqueness: semantic similarity detectors to filter collusion/copying.

  • Multiple-wallet suppression: probabilistic linkage flags; violations lead to disqualification.

  • Randomized scenario variants: reduces leakability and pre-sharing.

We will publish a short integrity report after Stage 2.

Last updated