Introducing Proof-of-Work Defense for Onion Services | The Tor Project - eviltoast
  • Mubelotix@jlai.lu
    link
    fedilink
    arrow-up
    1
    ·
    edit-2
    11 hours ago

    Though if an attacker has an ASIC he can single-handedly dominate the whole pool of other users as ASICs are tremendously more efficient than CPUs