ASIC Resistant
By CoinGecko | Updated on Mar 03, 2020
Typically used within the crypto world to describe the proof-of-work protocols that aim to prevent the use of ASICs for mining. Typically, this is achieved by making certain adjustments such that a ASIC will not have any competitive advantage over consumer hardware, or through inclusion of many various algorithm that makes it difficult for ASICs to have an edge against regular hardware.
The aim of ASIC resistant algorithms are usually to avoid the centralization of mining in that typically happens as ASIC machines.
Related Terms
Metaverse
The Metaverse is a virtual space where users are able to interact with each other in a computer generated environment.
Trustless
Entirely verifiable, without needing to trust or assume an action is done completely and in good faith.
Frontrun
To intercept a particularly large AMM buy order for the purpose of purchasing an reselling the assets back to the buyer before the order transaction is mind on the blockchain.
Bloodbath
In context of trading, the term bloodbath is commonly used to describe a market which is on a downtrend with many assets suffering from value depreciation.
Hungry for more knowledge?
Back to Glossary or Subscribe to our newsletter.