http://ttevhjjsjxz6uqqcjkbig5cycd7n7xv7cmd6f5fcvrqaaa7f3bj36wad.onion/technology/security/pow/index.html
That doesn't cost an attacker anything. ¶ There are two responses to this: Compromised machines (that are "free" to such an attacker) used in this case
have an opportunity cost to an attacker. They could be mining Monero with
that CPU usage, instead.