Technically it is, but usually does attacks take over other people's resources and coordinate. POW by stealing essentially others resources, typically without them knowing.

Much like mining BTC from an Airbnb. POW, by stealing.

Reply to this note

Please Login to reply.

Discussion

No replies yet.