Paul @futurepaul
@KeatonTech @ferreynd @uvas23 @heavilyarmedc If the computers are doing general purpose computation then any computer in the world can be usefully recruited to attack the network. "Proof that somebody did something" is what PoW solves. If you try to use the PoW machines to do something "useful" now you have 2 problems. — PolitiTweet.org