Computing Power is Security

Most Cryptocurrency Cost Less Than $1 Million a Day to 51% Attack: Cornell Professor

1 Like

We need all hash power we can have pr. watt. Embrace ASIC is primary step. I hope leadership sees that before it is too late.

ASIC’s prevent GPU attacks but not other ASIC’s.


Also. ASIC results in control of PoW by one manufacture. Therefore they can control the network even if you own the hardware and pay for power.