Possibly linux@lemmy.zip to Privacy@lemmy.mlEnglish · 1年前Introducing Proof-of-Work Defense for Onion Services | The Tor Projectblog.torproject.orgexternal-linkmessage-square23linkfedilinkarrow-up1122arrow-down11 cross-posted to: privacy@lemmy.ml
arrow-up1121arrow-down1external-linkIntroducing Proof-of-Work Defense for Onion Services | The Tor Projectblog.torproject.orgPossibly linux@lemmy.zip to Privacy@lemmy.mlEnglish · 1年前message-square23linkfedilink cross-posted to: privacy@lemmy.ml
minus-squaredelirious_owl@discuss.onlinelinkfedilinkarrow-up5·1年前Depends on the hashing algorithm. Tor implements two, and neither are vulnerable to custom architectures like ASICs
Depends on the hashing algorithm. Tor implements two, and neither are vulnerable to custom architectures like ASICs
Good