With the new Pow function of TOR the network has gained a lot and we have tor for a long time.

At the time it looked like some token crap was going to be introduced, but in the end it wasn't and it's a very elegant solution.

How does it work?

When you query a service behind tor you have to solve a small puzzle (proof of work) of between 5 milliseconds and 30 milliseconds for slower hardware. If your traffic to that service increases (DDoS) the proof of work increases its difficulty up to one minute, making such attacks unfeasible.

Special mention to Adam back who created the proof-of-work concept with HashCash that Satoshi used for Bitcoin and now used in Tor.

Cypherpunks do more for the world than all the politicians in history combined.

Reply to this note

Please Login to reply.

Discussion

This is amazing! Well done!

Also a big shout out to @tevador who coded RandomX based on @hyc work for Monero and now coded the Tor PoW.

Indranet is working on this as well.

It is an Onion routed distributed virtual private network protocol with anonymised payments to create scaling incentives. It uses source routing.

https://github.com/indra-labs/indra/blob/master/docs/whitepaper.md