Socious Fund
  • What is Socious Fund
  • How to receive funding
    • Sign Up (Create Profile)
    • KYB (Verification)
    • Creating your project
  • Pilot Round
  • HOW TO SUPPORT PROJECTS
    • Sign Up (Create Profile)
    • Explore Projects
  • KYC (Verification)
  • Vote/ Donate
  • Comment
  • MISCELLANEOUS
    • Extended Quadratic Funding
    • Impact Score
    • Impact Score Calculation
    • Impact Evaluation
    • Contribution Multiplier
    • Connection-Oriented Cluster Matching (COCM)
    • Suspicion Score Adjustment
    • Voluntary Contribution
    • FAQ
Powered by GitBook
On this page
  • Suspicion Score Adjustment
  • Formula
  • Vote Weight Adjustment
  • Decay and Recovery
  • Why It Matters
  1. MISCELLANEOUS

Suspicion Score Adjustment

PreviousConnection-Oriented Cluster Matching (COCM)NextVoluntary Contribution

Last updated 21 days ago

Suspicion Score Adjustment

Suspicion Score Adjustment is a mechanism to reduce the influence of potentially colluding or sybil voters without requiring hard bans. It uses behavior and connection patterns to assign each voter a Suspicion Score SS∈[0,1]SS \in [0, 1]SS∈[0,1], where:

  • SS=0: Fully trusted voter

  • SS=1: Fully suspicious voter

Their vote weight is then scaled accordingly.


Formula

The suspicion score is calculated as:

SS(v)=α1​⋅O(v)+α2​⋅S(v)+α3​⋅R(v)SS(v)=α 1 ​ ⋅O(v)+α 2 ​ ⋅S(v)+α 3 ​ ⋅R(v)SS(v)=α1​⋅O(v)+α2​⋅S(v)+α3​⋅R(v)

Where:

  • O(v): Overlap — how often a voter appears in tightly connected voting clusters

  • S(v): Suspicious neighbors — average score of voters they are clustered with

  • R(v): Risky votes — how often they support suspicious proposals

Weights α1,α2,α3∈[0,1] sum to 1 and control how much each factor contributes.


Vote Weight Adjustment

Each voter’s effective vote is reduced by:

Or, optionally:

This adjustment is applied before quadratic funding calculations, ensuring that suspicious votes have lower influence.


Decay and Recovery

Suspicion scores naturally decay over time (e.g., each round):

Allowing honest behavior to restore full voting power over time.


Why It Matters

  • Discourages sybil attacks and vote manipulation

  • Preserves voter privacy and inclusion

  • Aligns with our principle of gradual trust, not binary judgments

W(v)=1−SS(v)W(v)=1−SS(v)W(v)=1−SS(v)
W(v)=e−β⋅SS(v)W(v)=e −β⋅SS(v)W(v)=e−β⋅SS(v)
SSnew​(v)=γ⋅SS(v)SS new ​ (v)=γ⋅SS(v)SSnew​(v)=γ⋅SS(v)