This Proof of Passport just seems a solution in search of a problem. And the solution does not even work.
Did you watch my talk? There are two types of sybil attack I discuss. One is the wifi attack, for which I propose Tor.
The other is for flooding the network with bogus peers in general. For that I propose proof of sacrifice, and proof of passport.
What you are talking about is relevant for the first case only, for which using Tor is sufficient.
I like tackling both problems with one stone. Here's a solution that, yes, will require an extension to our current P2P protocol, but kills many birds which you only begin to address here:
1> When nodes discover each other for the first time, they share public keys with each other, which becomes a form "node ID".
2> A node will collect the IDs of the nodes it talks to, along with certain meta data, such as average latency over the past 24 hours, 30 days, etc,...
3> When a wallet talks to nodes, it collects their public keys. When it transactions via them, it notes, it to. So, a node confirming a transaction can be proven over time to have participated in the Bitcoin network. We can decide what activities help to define honest participation, effectively building reputations for nodes.
4> A node can periodically ask its peers to share the meta data they have on it, which those nodes sign.
5> When your wallet to a node it's not sure it can trust, you can ask it for proof of network interaction. It then signs a copy of the signed testaments of other nodes it obtained in #4.
6> Your wallet can compare the node keys in #5 against those previously collected via #3. Based on this, it can create a "trust score" combining these factors.
To be sure, this "trust score" isn't 100% guaranteed. It only says that here are reasons to believe that the node you are thinking about trusting has given certain evidence of its reputation via peers you have used in the past. In the end, the human with the wallet still has to decide if this "score" meets their threshold before completing their transaction. But, like 6 confirmations, we can come up with a scoring system that, in the end, increases the expense of creating a fake wifi and bogus peers.
This system can be extended using a "bad transaction" blockchain, because if you complete the transaction with a descent score, and it turns out to be bad, you now have proof that the node owning that key lied. Because it took effort and time for that "node ID" to build a reputation, that reputation is thrown away. Node reputations become the cost in this model, which take time, at a minimum, to earn.
On top of that, we can include other meta data in the bad transaction chain, such as IP address. Over time, we can use it to analyze these threats better and create better counter measures.
Let's step out of our current problems and look at the possibilities. We're creating a chain, not for currency transactions, but for network health intelligence. Other types of network health indicators can go in there. This can help the network learn how to improve, to increase resilience, to be more healthy and protected from various types of threats, like the 51% attack.