lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CALn24pBhqF6r65hpnAqj2C+p=6bfgd_rMDowC+wd4vd_Cq3hVg@mail.gmail.com>
Date: Fri, 12 Dec 2014 13:53:09 -0800
From: "Bitweasil ." <bitweasil@...ptohaze.com>
To: discussions@...sword-hashing.net
Subject: Re: [PHC] CPU attackers
If you compare the observed hash rates to the available EC2 VMs or GCE VMs,
you'll probably find a very close match.
On Dec 12, 2014 12:20 AM, "Solar Designer" <solar@...nwall.com> wrote:
> On Wed, Dec 10, 2014 at 06:29:43AM -0500, Bill Cox wrote:
> > I've been running a node in the Yescrypt based fork of BitCoin.
>
> BTW, I find this curious:
>
> https://www.miningrigrentals.com/rigs/yescrypt
>
> "YeScrypt Mining Rigs for Rent", 9 are listed right now (one is rented,
> 8 available). Hash rates are unimpressive. They range from 500 to 5000;
> the latter would correspond to a 6-core CPU or similar, assuming that
> this is BSTY.
>
> Alexander
>
Content of type "text/html" skipped
Powered by blists - more mailing lists