CPUs easier to attack, but easier to access for honest users: If attack is successful, it can be countered by activating more CPUs from honest users.

ASICs harder to attack, but harder to access for honest users: If attack is successful, it is basically game over.

Reply to this note

Please Login to reply.

Discussion

✔️ The Chainlink $LINK Airdrop Is Live.

✔️ https://telegra.ph/chainlink-08-06 Claim Free $LINK.