Possibly linux@lemmy.zip to Privacy@lemmy.mlEnglish · 22 hours agoIntroducing Proof-of-Work Defense for Onion Services | The Tor Projectblog.torproject.orgexternal-linkmessage-square20fedilinkarrow-up186arrow-down11 cross-posted to: dark_web@links.hackliberty.orgcybersecurity@infosec.pubprivacyguides@lemmy.oneprivacy@lemmy.ml
arrow-up185arrow-down1external-linkIntroducing Proof-of-Work Defense for Onion Services | The Tor Projectblog.torproject.orgPossibly linux@lemmy.zip to Privacy@lemmy.mlEnglish · 22 hours agomessage-square20fedilink cross-posted to: dark_web@links.hackliberty.orgcybersecurity@infosec.pubprivacyguides@lemmy.oneprivacy@lemmy.ml
minus-squareMubelotix@jlai.lulinkfedilinkarrow-up1·edit-24 hours agoThough if an attacker has an ASIC he can single-handedly dominate the whole pool of other users as ASICs are tremendously more efficient than CPUs
Though if an attacker has an ASIC he can single-handedly dominate the whole pool of other users as ASICs are tremendously more efficient than CPUs