Stumbled across this because it was close to a solution that we're seeking currently that would require clients in a high-threat environment (i.e., Tor Network) to complete some form of 'Proof of Work' before even being able to contact the server itself.
(Also, a round robin rotation for exit nodes possibly as well, with said nodes evaluating the request and its accuracy; this is incomplete, there's no incentive - but I guess there never was an incentive right?)
..Digression
Pay attentoin to #4 here (and #5)
>>Click here to continue<<
