In a system hosting shared mutable data, we may allow any participant to mutate data. However, there should be some limits to what participants can do.
In CRDTs, usually a machine is identified using some random identifier or one that is uniquely drawn from the system in some way. Conventional CRDTs are not byzantine fault tolerant in that any peer can use any identifier, including those of others.