• Mubelotix@jlai.lu
      link
      fedilink
      arrow-up
      1
      ·
      edit-2
      12 hours ago

      Though if an attacker has an ASIC he can single-handedly dominate the whole pool of other users as ASICs are tremendously more efficient than CPUs