Cut through the noise to see the essence of the attack on #Monero

There is a novel strategy of hashrate co-optation, in which networks compete to rent temporary computing power to destabilize others, hash-as-a-service, in this case with the Useful Proof of Work (UPoW) protocol.

Reply to this note

Please Login to reply.

Discussion

No replies yet.