A type of security threat where a single entity creates multiple fake identities or nodes to gain disproportionate influence over a peer-to-peer network. By appearing as many different users, the attacker can manipulate governance votes, disrupt network consensus, or exploit reward systems like airdrops.