Quoted By:
Step 1 - Devise a method that is computationally intensive to crack
Step 2 - Devise efficient ways to compute said methods
Step 3 - Implement hardware to do it on mass market products
Step 4 - Return to step 1
Well, at least the mass market piece of the strategy will prevent a few entities to get their ASICs an out of proportion advantage. Would have been a good plan were it not for their massive storage capabilities with which they can just keep everything until cracking is feasible.