Hi all,

I understand, after reading the paper, that the PoW is used to secure the 
blockchain which contains the usernames (mapped to their addresses) so that 
users can use usernames rather than the long unreadable addresses.

However I don't understand who's actually running the PoW. Is each peer 
running the PoW in the background? If yes, which algorithm? If it's a well 
known algorithm, wouldn't miners from cryptocurrencies (which have ASICs 
laying around) be able to fork the blockchain and replace certain blocks 
and obtain control of specific usernames?

Thanks for any clarification,
Luca

-- 
You received this message because you are subscribed to the Google Groups 
"twister-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to