A control attack for a Peer to Peer network in which a large number of pseudo-identities occupy the network. Countermeasures Proof of Work Proof of Stake Proof of Elapsed Time