Comment by z3c0
2 hours ago
Well, this list of known PoUW might be of interest: https://www.sciencedirect.com/science/article/pii/S209672092...
While they don't have that many in the wild, the number of implementations it lists is still more than I expected. There's also the Monero 51% takeover, which was purportedly done using a PoUW technique to garner more hashing power.
https://qubic.org/blog-detail/historic-takeover-complete-qub...
No comments yet
Contribute on Hacker News ↗