Just a plebeian noob here, but can't a bit a proof of work be added to any protocol in order to solve DDOS attack ? Is it difficult to implement and what are the downsides ?
A lot of times these are botnets. Think your grandma’s old Dell with a ton of malware - times 100. Proof of Work helps if you’re the one on the hook for bill, but if you’re a malicious actor you don’t care about power costs for me-ma.
reply