Possibly linux@lemmy.zip to PrivacyEnglish · 3 months agoIntroducing Proof-of-Work Defense for Onion Services | The Tor Projectblog.torproject.orgexternal-linkmessage-square23fedilinkarrow-up1122arrow-down11 cross-posted to: dark_web@links.hackliberty.orgcybersecurity@infosec.pubprivacyguides@lemmy.onehackernews@lemmy.smeargle.fansprivacyhackernews@derp.foo
arrow-up1121arrow-down1external-linkIntroducing Proof-of-Work Defense for Onion Services | The Tor Projectblog.torproject.orgPossibly linux@lemmy.zip to PrivacyEnglish · 3 months agomessage-square23fedilink cross-posted to: dark_web@links.hackliberty.orgcybersecurity@infosec.pubprivacyguides@lemmy.onehackernews@lemmy.smeargle.fansprivacyhackernews@derp.foo
minus-squarePropaGandalf@lemmy.worldlinkfedilinkarrow-up1·3 months agoNo, in my eyes PoW is just a waste of resources. At least let them do some useful computation for the node.
No, in my eyes PoW is just a waste of resources. At least let them do some useful computation for the node.