Possibly linux to [email protected]English • 9 months agoIntroducing Proof-of-Work Defense for Onion Services | The Tor Projectblog.torproject.orgexternal-linkmessage-square23fedilinkarrow-up1120cross-posted to: [email protected][email protected][email protected][email protected]
arrow-up1120external-linkIntroducing Proof-of-Work Defense for Onion Services | The Tor Projectblog.torproject.orgPossibly linux to [email protected]English • 9 months agomessage-square23fedilinkcross-posted to: [email protected][email protected][email protected][email protected]
minus-square@[email protected]linkfedilink5•9 months agoDepends on the hashing algorithm. Tor implements two, and neither are vulnerable to custom architectures like ASICs
Depends on the hashing algorithm. Tor implements two, and neither are vulnerable to custom architectures like ASICs
Good