this post was submitted on 27 Sep 2024
118 points (99.2% liked)

Privacy

31390 readers
1005 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 4 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] PropaGandalf@lemmy.world -3 points 5 days ago (5 children)
[–] delirious_owl@discuss.online 17 points 4 days ago (1 children)

What do you think PoW was created for. This is exactly the use case of PoW -- to reduce malicious traffic. It works great!

[–] Mubelotix@jlai.lu 1 points 4 days ago* (last edited 4 days ago) (1 children)

Though if an attacker has an ASIC he can single-handedly dominate the whole pool of other users as ASICs are tremendously more efficient than CPUs

[–] delirious_owl@discuss.online 5 points 4 days ago (1 children)

Depends on the hashing algorithm. Tor implements two, and neither are vulnerable to custom architectures like ASICs

[–] magic_lobster_party@fedia.io 19 points 5 days ago (1 children)

It’s not like it’s going to consume electricity like Bitcoin.

PoW was first conceptualized as an anti spam method. It’s just a little overhead to make it expensive to make DOS attacks. This makes perfect sense.

[–] Mubelotix@jlai.lu 1 points 4 days ago

It will, but that's the point. Costing money

[–] BroBot9000@lemmy.world 9 points 5 days ago

Still a better use of the electricity than Ai.

[–] ziviz@lemmy.sdf.org 7 points 5 days ago* (last edited 5 days ago) (1 children)

At least it appears to be something that gets triggered. In theory, if a node is not under attack or heavy usage, this isn't a consideration. Doesn't seem to be a perfect solution as it still slows the traffic of legitimate users in the event of an attack. I don't know the full details, but in the worse case it makes it easier to semi-DoS, maybe not by fully making a node unresponsive, but by making the service so painfully slow that users may give up on it.

[–] shortwavesurfer@lemmy.zip 2 points 4 days ago

Only for those users who do not have proof of work capability, they get put at the back of the line, but anybody with proof of work capability, which was released last August, will do the work and be put higher priority. I know some people who run seed nodes for Haveno-reto and they had major DDOS issues until they got PoW enabled. It was taking like 5 or 10 minutes to get connected to the network. And now it takes about 30 seconds.

[–] possiblylinux127@lemmy.zip 4 points 5 days ago (1 children)
[–] sunzu2@thebrainbin.org 9 points 5 days ago (2 children)

I bet that commenter got triggered because cyrpto bad!!! There

Anyway, ain't pow like the only practical solution to fight bots?

Share Some conputer to enter... Seems fair if you are good faith single actor but very expensive if you are running a botnet campaign

[–] PropaGandalf@lemmy.world 1 points 2 days ago

No, in my eyes PoW is just a waste of resources. At least let them do some useful computation for the node.

[–] BakedCatboy@lemmy.ml 4 points 5 days ago

Either that or charging a micro transaction for loading the page. But yeah the goal is to make it cost a small amount that is insignificant to a regular user but adds up to a huge amount at the scale of a spam farm. And it's also the same rationale behind hashing passwords with multiple rounds. It adds a tiny lag when you log in correctly but adds an insane amount of work if you're checking every phrase in a password cracking dictionary using an offline attack because it adds up. (In the online scenario you just block them after a few attempts)