Possibly linux to Privacy@lemmy.mlEnglish • 1 day agoIntroducing Proof-of-Work Defense for Onion Services | The Tor Projectblog.torproject.orgexternal-linkmessage-square20fedilinkarrow-up194arrow-down11 cross-posted to: dark_web@links.hackliberty.orgprivacy@lemmy.ml
arrow-up193arrow-down1external-linkIntroducing Proof-of-Work Defense for Onion Services | The Tor Projectblog.torproject.orgPossibly linux to Privacy@lemmy.mlEnglish • 1 day agomessage-square20fedilink cross-posted to: dark_web@links.hackliberty.orgprivacy@lemmy.ml
minus-square@delirious_owl@discuss.onlinelinkfedilink12•19 hours agoWhat do you think PoW was created for. This is exactly the use case of PoW – to reduce malicious traffic. It works great!
minus-squareMubelotixlinkfedilink1•edit-26 hours agoThough if an attacker has an ASIC he can single-handedly dominate the whole pool of other users as ASICs are tremendously more efficient than CPUs
What do you think PoW was created for. This is exactly the use case of PoW – to reduce malicious traffic. It works great!
Though if an attacker has an ASIC he can single-handedly dominate the whole pool of other users as ASICs are tremendously more efficient than CPUs