DEV Community

Cover image for Physical Proof of Proximity (PoPI): Making Sybil Attacks Physically Expensive
Altug Tatlisu
Altug Tatlisu

Posted on

Physical Proof of Proximity (PoPI): Making Sybil Attacks Physically Expensive

Sybil attacks are not a cryptographic problem.

They are an economic problem.

If a single machine can cheaply generate thousands of identities,

any distributed system that relies purely on digital identity will eventually be gamed.

Physical Proof of Proximity (PoPI) is an attempt to change that equation by introducing
real-world physical constraints into decentralized systems.

This post explains what PoPI is, what it is not, and where it actually makes sense.


The Core Problem: Digital Identity Is Too Cheap

In most distributed systems:

  • Creating a new identity costs almost nothing
  • Spinning up thousands of nodes is trivial in the cloud
  • Identity has no physical anchor

This enables:

  • Sybil attacks
  • Fake participation
  • Artificial consensus influence

The issue is not weak cryptography.
It’s that software scales faster than reality.


Why Existing Approaches Don’t Fully Solve This

Proof of Work

  • Makes attacks expensive via energy
  • Wastes resources
  • Centralizes around specialized hardware

Proof of Stake

  • Ties influence to capital
  • Concentrates power
  • Assumes fair initial distribution

Both approaches assume attackers are remote and abstract.

They do not consider physical presence as a constraint.


What Is Physical Proof of Proximity?

Physical Proof of Proximity (PoPI) is a constraint-based mechanism.

Instead of asking:

“Who are you?”

PoPI asks:

“Can you physically react within real-world limits?”

It relies on the fact that physical signals obey physics:

  • They propagate at finite speed
  • They weaken with distance
  • They require hardware to measure

PoPI does not replace cryptography.
It adds a physical cost layer on top of it.


High-Level PoPI Flow


1. A node emits a short-lived physical challenge
2. Nearby nodes measure the challenge in real time
3. Nodes respond with time-bounded measurements
4. Responses are verified against physical constraints
5. Invalid or delayed responses are rejected

Enter fullscreen mode Exit fullscreen mode

The key property:
You cannot fake proximity without being physically present.


What Counts as a Physical Signal?

PoPI is intentionally multi-modal. Examples include:

  • Radio signal strength (WiFi / BLE RSSI)
  • Time-of-flight constraints
  • Acoustic or ultrasonic signals
  • Synchronized sensor challenges (motion, orientation)

No single signal is trusted alone.
The system relies on combined constraints.


Threat Model

PoPI assumes:

  • Attackers can automate software
  • Attackers can rent cloud infrastructure
  • Attackers cannot cheaply scale physical presence

PoPI does not protect against:

  • Well-funded local attackers
  • Nation-state adversaries
  • Physical device theft

This is a cost-increase mechanism, not a silver bullet.


Why This Helps Against Sybil Attacks

To fake N identities under PoPI, an attacker must provide:

  • N physically present devices
  • N real-time responses
  • N independent signal measurements

This shifts attacks from:

“Write more code”

to:

“Deploy more hardware in physical space”

The attack surface becomes logistics, not computation.


Where PoPI Makes Sense

PoPI is not for global permissionless blockchains.

It works best in environments where physical locality already exists:

  • Local mesh networks
  • Emergency communication systems
  • Research labs
  • Community networks
  • IoT clusters
  • Offline-first systems

In these contexts, physical presence is already a given.
PoPI simply formalizes it.


Limitations and Open Problems

PoPI introduces new challenges:

  • Coordination overhead
  • Hardware variability
  • Calibration and false positives
  • Scalability beyond local regions

Global-scale PoPI remains an open research problem.

Any implementation must be honest about these trade-offs.


Final Thoughts

PoPI is not about replacing cryptography.

It is about reintroducing physical reality into systems that have ignored it for too long.

Sometimes the strongest defense is not perfect security,
but making attacks physically inconvenient.


This post describes an ongoing research direction.
Critical feedback and alternative approaches are welcome.

Top comments (0)