Possibly linux@lemmy.zip to Privacy@lemmy.mlEnglish · 22 hours agoIntroducing Proof-of-Work Defense for Onion Services | The Tor Projectblog.torproject.orgexternal-linkmessage-square20fedilinkarrow-up187arrow-down11 cross-posted to: [email protected][email protected][email protected]
arrow-up186arrow-down1external-linkIntroducing Proof-of-Work Defense for Onion Services | The Tor Projectblog.torproject.orgPossibly linux@lemmy.zip to Privacy@lemmy.mlEnglish · 22 hours agomessage-square20fedilink cross-posted to: [email protected][email protected][email protected]
minus-squareMubelotix@jlai.lulinkfedilinkarrow-up1·edit-24 hours agoThough if an attacker has an ASIC he can single-handedly dominate the whole pool of other users as ASICs are tremendously more efficient than CPUs
Though if an attacker has an ASIC he can single-handedly dominate the whole pool of other users as ASICs are tremendously more efficient than CPUs