Possibly linux@lemmy.zip to Privacy@lemmy.mlEnglish · 6 months agoIntroducing Proof-of-Work Defense for Onion Services | The Tor Projectblog.torproject.orgexternal-linkmessage-square23fedilinkarrow-up1122arrow-down11cross-posted to: dark_web@links.hackliberty.orgcybersecurity@infosec.pubprivacyguides@lemmy.oneprivacy@lemmy.mltechnews@radiation.party
arrow-up1121arrow-down1external-linkIntroducing Proof-of-Work Defense for Onion Services | The Tor Projectblog.torproject.orgPossibly linux@lemmy.zip to Privacy@lemmy.mlEnglish · 6 months agomessage-square23fedilinkcross-posted to: dark_web@links.hackliberty.orgcybersecurity@infosec.pubprivacyguides@lemmy.oneprivacy@lemmy.mltechnews@radiation.party
minus-squaredelirious_owl@discuss.onlinelinkfedilinkarrow-up5·6 months agoDepends on the hashing algorithm. Tor implements two, and neither are vulnerable to custom architectures like ASICs
Depends on the hashing algorithm. Tor implements two, and neither are vulnerable to custom architectures like ASICs
Good