Deleted No
Hibernated No
Last Checked June 10, 2021

Created

Fri May 14 15:36:11 +0000 2021

Likes

1

Retweets

0

Source

Twitter Web App

View Raw Data

JSON Data

View on Twitter

Likely Available
Profile Image

Paul @futurepaul

@KeatonTech @ferreynd @uvas23 @heavilyarmedc If the computers are doing general purpose computation then any computer in the world can be usefully recruited to attack the network. "Proof that somebody did something" is what PoW solves. If you try to use the PoW machines to do something "useful" now you have 2 problems. — PolitiTweet.org

Posted May 14, 2021