Possibly linux@lemmy.zip to Privacy@lemmy.mlEnglish · 23 hours agoIntroducing Proof-of-Work Defense for Onion Services | The Tor Projectblog.torproject.orgexternal-linkmessage-square20fedilinkarrow-up190arrow-down11 cross-posted to: dark_web@links.hackliberty.orgcybersecurity@infosec.pubprivacyguides@lemmy.oneprivacy@lemmy.mltechnews@radiation.partyhackernews@derp.foo
arrow-up189arrow-down1external-linkIntroducing Proof-of-Work Defense for Onion Services | The Tor Projectblog.torproject.orgPossibly linux@lemmy.zip to Privacy@lemmy.mlEnglish · 23 hours agomessage-square20fedilink cross-posted to: dark_web@links.hackliberty.orgcybersecurity@infosec.pubprivacyguides@lemmy.oneprivacy@lemmy.mltechnews@radiation.partyhackernews@derp.foo
minus-squareMubelotix@jlai.lulinkfedilinkarrow-up1·edit-25 hours agoThough if an attacker has an ASIC he can single-handedly dominate the whole pool of other users as ASICs are tremendously more efficient than CPUs
Though if an attacker has an ASIC he can single-handedly dominate the whole pool of other users as ASICs are tremendously more efficient than CPUs