This is definitely a vast and fascinating area to get into. The tricky part is allowing this type of behavior in a secure way so that it can't be exploited by malicious nodes. Basically, if you're allowing people to take over your CPU, you have to really, really trust those people, which is a big challenge on a distributed network.
So, this would take a considerable amount of thought, but it would be a really, really amazing feature!
Thanks. |