Possibly linux@lemmy.zip to Privacy@lemmy.mlEnglish · 1 month agoIntroducing Proof-of-Work Defense for Onion Services | The Tor Projectblog.torproject.orgexternal-linkmessage-square19fedilinkarrow-up11arrow-down10 cross-posted to: [email protected]
arrow-up11arrow-down1external-linkIntroducing Proof-of-Work Defense for Onion Services | The Tor Projectblog.torproject.orgPossibly linux@lemmy.zip to Privacy@lemmy.mlEnglish · 1 month agomessage-square19fedilink cross-posted to: [email protected]
minus-squaredelirious_owl@discuss.onlinelinkfedilinkarrow-up0·1 month agoDepends on the hashing algorithm. Tor implements two, and neither are vulnerable to custom architectures like ASICs
Depends on the hashing algorithm. Tor implements two, and neither are vulnerable to custom architectures like ASICs