This isn't the article I was thinking of but it is worth looking at. Attacker has a lot of computing power.