This document discusses using distributed computing via browsers as a potential client-side attack. It outlines resources like CPU, GPU, RAM, and storage that are available to websites through browsers. While distributed computing in browsers is not new, it could be used maliciously for attacks like XSS, CSRF, or malware distribution. The document then examines ways this could be done using techniques like web workers, local storage, and Flash to bypass restrictions on CPU and storage usage. It provides examples of how fast hashing algorithms can run in JavaScript and Flash compared to dedicated hardware. In the end, it questions whether optimizations could further increase speeds for distributed attacks using browser resources.