Visiting the Arch Linux wiki, my browser achieves 2.8 kH/s at
difficulty 4, and the test finally completes after 40 seconds.
This matches other Anubis-wrapped sites.

Some anti-malware features may break Anubis or reduce performance. This is because it’s indistinguishable from mining malware.

In the details it states: “Please note that Anubis requires the use of modern JavaScript features that plugins like JShelter will disable. Please disable JShelter or other such plugins for this domain.”

Normally I find such demands offensive and a security anti-pattern. But here we have transparency from all involved, all reacting to a known and widely recognized emergency situation, developed and deployed with the intention of saving us from more abusive solutions, and with a clear declaration of trying to address this issue.

If it’s not an add-on, I have no idea. Even on my E5300 the task finishes within seconds and the worst I see is 6 kH/s.

If it's meant to adjust according to the speed of the user's PC,
then it doesn't do too well.

That would defeat the purpose. The adversary could just feign being a slow machine.

This is basically a denial-of-service counter-attack, tuned against targets which rely on being able to process a lot of information cheaply and finish each request within a timeout. Anubis hits both conditions with one stone.

Reply via email to