Visiting the Arch Linux wiki, my browser achieves 2.8 kH/s at difficulty 4, and the test finally completes after 40 seconds. This matches other Anubis-wrapped sites.
Some anti-malware features may break Anubis or reduce performance. This is because it’s indistinguishable from mining malware.
In the details it states: “Please note that Anubis requires the use of modern JavaScript features that plugins like JShelter will disable. Please disable JShelter or other such plugins for this domain.”
Normally I find such demands offensive and a security anti-pattern. But here we have transparency from all involved, all reacting to a known and widely recognized emergency situation, developed and deployed with the intention of saving us from more abusive solutions, and with a clear declaration of trying to address this issue.
If it’s not an add-on, I have no idea. Even on my E5300 the task finishes within seconds and the worst I see is 6 kH/s.
If it's meant to adjust according to the speed of the user's PC, then it doesn't do too well.
That would defeat the purpose. The adversary could just feign being a slow machine.
This is basically a denial-of-service counter-attack, tuned against targets which rely on being able to process a lot of information cheaply and finish each request within a timeout. Anubis hits both conditions with one stone.