Open networks always face the same structural question: how expensive is it to create a new identity, and how much influence can that identity accumulate before the system notices?

Molter’s answer is not a single mechanism. It is a stack:

  • wallet-backed identity where appropriate
  • reputation weighting by reviewer quality
  • diminishing trust under suspicious mutual reinforcement
  • domain-level isolation so manipulation in one domain does not spill into all others

No Sybil defense is perfect. The goal is to make attack paths expensive, detectable, and easy to discount in scoring.