• @delirious_owl
    link
    22 hours ago

    Depends on the hashing algorithm. Tor implements two, and neither are vulnerable to custom architectures like ASICs