• Mubelotix
    link
    fedilink
    1
    edit-2
    3 months ago

    Though if an attacker has an ASIC he can single-handedly dominate the whole pool of other users as ASICs are tremendously more efficient than CPUs