Cut through the noise to see the essence of the attack on #Monero
There is a novel strategy of hashrate co-optation, in which networks compete to rent temporary computing power to destabilize others, hash-as-a-service, in this case with the Useful Proof of Work (UPoW) protocol.
