Global Feed Post Login
Replying to Avatar Colby Serpa

“…photonic hardware used in hash protocols can also be used for other applications, i.e., the hardware is not necessarily an application-specific device.”

The more I think about it, the more it seems this quote is an extreme security risk… not a desirable feature like it seems.

The inability to reuse ASICs for anything other than mining raises the cost of attacking the network, because the attacker will be left with a bunch of near-useless paper weights (the ASICs).

Avatar
Colby Serpa 2y ago

Rather than the attacker* being left with functional hardware they can resell or use for other purposes after the attack…

Reply to this note

Please Login to reply.

Discussion

Avatar
Colby Serpa 2y ago

I’d prefer a photonic ASIC machine if it were possible, to get the best of both worlds.

Thread collapsed