id author title date pages extension mime words sentences flesch summary cache txt hackingdistributed-com-8350 On-Chain Vote Buying and the Rise of Dark DAOs .html text/html 6375 324 60 This directly implies that all on-chain voting schemes where users can generate their own keys outside of a trusted environment inherently degrade to plutocracy, a paradigm considered widely inferior to democratic models that such protocols attempt to approximate on-chain. This work defined a new security definition for voting schemes called "coercion resistance", providing a protocol where no malicious party could successfully coerce a user in a manner that could alter election results. Despite any identity or second-layer based mitigation attempts, all permissionless voting systems (or schemes that allow users to generate their own key in an untrusted environment) are vulnerable to the same style of vote buying and coercion attacks. Inherent in any of these schemes is the ability to minimize trust when pooling assets across multiple vote buyers; bribery smart contracts could simply allow anyone to pay into the BRIBEPOOL, and SGX networks can be architected similarly for open participation. ./cache/hackingdistributed-com-8350.html ./txt/hackingdistributed-com-8350.txt