Possibly linux@lemmy.zip to Privacy@lemmy.mlEnglish · 3 months agoIntroducing Proof-of-Work Defense for Onion Services | The Tor Projectblog.torproject.orgexternal-linkmessage-square23fedilinkarrow-up1120arrow-down11 cross-posted to: dark_web@links.hackliberty.orgcybersecurity@infosec.pubprivacyguides@lemmy.onehackernews@lemmy.smeargle.fansprivacy@lemmy.mltechnews@radiation.partyhackernews@derp.foo
arrow-up1119arrow-down1external-linkIntroducing Proof-of-Work Defense for Onion Services | The Tor Projectblog.torproject.orgPossibly linux@lemmy.zip to Privacy@lemmy.mlEnglish · 3 months agomessage-square23fedilink cross-posted to: dark_web@links.hackliberty.orgcybersecurity@infosec.pubprivacyguides@lemmy.onehackernews@lemmy.smeargle.fansprivacy@lemmy.mltechnews@radiation.partyhackernews@derp.foo
minus-squareMubelotix@jlai.lulinkfedilinkarrow-up1·edit-23 months agoThough if an attacker has an ASIC he can single-handedly dominate the whole pool of other users as ASICs are tremendously more efficient than CPUs
minus-squaredelirious_owl@discuss.onlinelinkfedilinkarrow-up5·3 months agoDepends on the hashing algorithm. Tor implements two, and neither are vulnerable to custom architectures like ASICs
Though if an attacker has an ASIC he can single-handedly dominate the whole pool of other users as ASICs are tremendously more efficient than CPUs
Depends on the hashing algorithm. Tor implements two, and neither are vulnerable to custom architectures like ASICs
Good