Security flaws in the safecoin model

You are, in short, asking what countermeasures exist for ‘sybil attacks’.
Well, read these: http://systemdocs.maidsafe.net/content/en/attacks/birthday_paradoxsybil_attack.html

And regarding the Proof of Resource, spoofing it would be impossible as it is based on actual usage of the stored data and lost packets. The only way to proof resources is by offering resources.

And read this:

9 Likes