Computing Power is Security

Most Cryptocurrency Cost Less Than $1 Million a Day to 51% Attack: Cornell Professor

1 Like

We need all hash power we can have pr. watt. Embrace ASIC is primary step. I hope leadership sees that before it is too late.

ASIC’s prevent GPU attacks but not other ASIC’s.

2 Likes

Also. ASIC results in control of PoW by one manufacture. Therefore they can control the network even if you own the hardware and pay for power.

2 Likes