Once it’s been ascertained that the hash rate is growing, often the best way to compare the relative security of cryptoassets is through a calculation of the equipment securing the network. Using a dollar value is helpful because it gives us an idea of how much a bad actor would have to spend to re-create the network,

