Possibly linux@lemmy.zip to Privacy@lemmy.mlEnglish · 20 hours agoIntroducing Proof-of-Work Defense for Onion Services | The Tor Projectblog.torproject.orgexternal-linkmessage-square19fedilinkarrow-up183arrow-down11 cross-posted to: dark_web@links.hackliberty.orgcybersecurity@infosec.pubprivacyguides@lemmy.oneprivacy@lemmy.ml
arrow-up182arrow-down1external-linkIntroducing Proof-of-Work Defense for Onion Services | The Tor Projectblog.torproject.orgPossibly linux@lemmy.zip to Privacy@lemmy.mlEnglish · 20 hours agomessage-square19fedilink cross-posted to: dark_web@links.hackliberty.orgcybersecurity@infosec.pubprivacyguides@lemmy.oneprivacy@lemmy.ml
minus-squareMubelotixlinkfedilinkarrow-up1·edit-22 hours agoThough if an attacker has an ASIC he can single-handedly dominate the whole pool of other users as ASICs are tremendously more efficient than CPUs
Though if an attacker has an ASIC he can single-handedly dominate the whole pool of other users as ASICs are tremendously more efficient than CPUs