Why are Sybil attacks difficult to prevent in DAOs? Learn how attackers exploit token-based voting, the risks of pseudonymity ...