On the idea of network security: is it possible to link a particular ASIC (or group of ASICs) to a cooperating validating node, then present that link to a pool? If there was a solid way to prove network cooperation, then centralization would be more palatable. Is this a KYC nightmare?
Discussion
No replies yet.