Possibly linux@lemmy.zip to Privacy@lemmy.mlEnglish · 1 year agoIntroducing Proof-of-Work Defense for Onion Services | The Tor Projectblog.torproject.orgexternal-linkmessage-square22fedilinkarrow-up1120 cross-posted to: dark_web@links.hackliberty.orgcybersecurity@infosec.pubprivacyguidesprivacy@lemmy.mltechnews@radiation.partyhackernews@derp.foo
arrow-up1120external-linkIntroducing Proof-of-Work Defense for Onion Services | The Tor Projectblog.torproject.orgPossibly linux@lemmy.zip to Privacy@lemmy.mlEnglish · 1 year agomessage-square22fedilink cross-posted to: dark_web@links.hackliberty.orgcybersecurity@infosec.pubprivacyguidesprivacy@lemmy.mltechnews@radiation.partyhackernews@derp.foo
minus-squaredelirious_owl@discuss.onlinelinkfedilinkarrow-up5·1 year agoDepends on the hashing algorithm. Tor implements two, and neither are vulnerable to custom architectures like ASICs
Depends on the hashing algorithm. Tor implements two, and neither are vulnerable to custom architectures like ASICs
Good