Lee Duna@lemmy.nz to Linux@programming.devEnglish · edit-23 days agoFOSS infrastructure is under attack by AI companiesthelibre.newsexternal-linkmessage-square28fedilinkarrow-up11arrow-down10file-textcross-posted to: opensource@lemmy.mltechnology@lemmy.worldtechnology@lemmy.worldtechnology@lemmy.world
arrow-up11arrow-down1external-linkFOSS infrastructure is under attack by AI companiesthelibre.newsLee Duna@lemmy.nz to Linux@programming.devEnglish · edit-23 days agomessage-square28fedilinkfile-textcross-posted to: opensource@lemmy.mltechnology@lemmy.worldtechnology@lemmy.worldtechnology@lemmy.world
minus-squaremarauding_gibberish142@lemmy.dbzer0.comlinkfedilinkEnglisharrow-up0·2 days agoI’m perfectly fine with Anubis but I think we need a better algorithm for PoW
minus-squarePossibly linux@lemmy.ziplinkfedilinkEnglisharrow-up0·edit-22 days agoTor has one now Maybe it can be reused for the clearnet. I believe it uses the hashx POW.
minus-squaremarauding_gibberish142@lemmy.dbzer0.comlinkfedilinkEnglisharrow-up0·2 days agoYou mean the TOR project?
minus-squarePossibly linux@lemmy.ziplinkfedilinkEnglisharrow-up0·edit-22 days agoAnd Tor itself It is part of the denial of service protection
I’m perfectly fine with Anubis but I think we need a better algorithm for PoW
Tor has one now
Maybe it can be reused for the clearnet. I believe it uses the hashx POW.
You mean the TOR project?
And Tor itself
It is part of the denial of service protection