Possibly linux@lemmy.zip to Privacy@lemmy.mlEnglish · 6 个月前Introducing Proof-of-Work Defense for Onion Services | The Tor Projectblog.torproject.orgexternal-linkmessage-square23fedilinkarrow-up1119arrow-down11 cross-posted to: [email protected][email protected][email protected][email protected][email protected][email protected]
arrow-up1118arrow-down1external-linkIntroducing Proof-of-Work Defense for Onion Services | The Tor Projectblog.torproject.orgPossibly linux@lemmy.zip to Privacy@lemmy.mlEnglish · 6 个月前message-square23fedilink cross-posted to: [email protected][email protected][email protected][email protected][email protected][email protected]
minus-squaredelirious_owl@discuss.onlinelinkfedilinkarrow-up17·6 个月前What do you think PoW was created for. This is exactly the use case of PoW – to reduce malicious traffic. It works great!
minus-squareMubelotix@jlai.lulinkfedilinkarrow-up1·edit-26 个月前Though if an attacker has an ASIC he can single-handedly dominate the whole pool of other users as ASICs are tremendously more efficient than CPUs
minus-squaredelirious_owl@discuss.onlinelinkfedilinkarrow-up5·6 个月前Depends on the hashing algorithm. Tor implements two, and neither are vulnerable to custom architectures like ASICs
What do you think PoW was created for. This is exactly the use case of PoW – to reduce malicious traffic. It works great!
Though if an attacker has an ASIC he can single-handedly dominate the whole pool of other users as ASICs are tremendously more efficient than CPUs
Depends on the hashing algorithm. Tor implements two, and neither are vulnerable to custom architectures like ASICs
Good