Hi all, I understand, after reading the paper, that the PoW is used to secure the blockchain which contains the usernames (mapped to their addresses) so that users can use usernames rather than the long unreadable addresses.
However I don't understand who's actually running the PoW. Is each peer running the PoW in the background? If yes, which algorithm? If it's a well known algorithm, wouldn't miners from cryptocurrencies (which have ASICs laying around) be able to fork the blockchain and replace certain blocks and obtain control of specific usernames? Thanks for any clarification, Luca -- You received this message because you are subscribed to the Google Groups "twister-dev" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To post to this group, send email to [email protected]. For more options, visit https://groups.google.com/d/optout.
