ASIC Resistant

By CoinGecko | Updated on Mar 03, 2020
Typically used within the crypto world to describe the proof-of-work protocols that aim to prevent the use of ASICs for mining. Typically, this is achieved by making certain adjustments such that a ASIC will not have any competitive advantage over consumer hardware, or through inclusion of many various algorithm that makes it difficult for ASICs to have an edge against regular hardware. The aim of ASIC resistant algorithms are usually to avoid the centralization of mining in that typically happens as ASIC machines.

Share this with a friend!

Related Terms

Bear Market
Contrary to bull market, it indicates the direction of the market going for downward trend.
Ponzi Scheme
A Ponzi scheme is also referred to as pyramid scheme, and typically takes the form of an investment scheme which pays existing investors with funds collected from new investors.
Full node
Full Nodes are computers that verify the set of rules that are built into the protocols of a given cryptocurrency.
Trustless
Entirely verifiable, without needing to trust or assume an action is done completely and in good faith.
Hungry for more knowledge?
Back to Glossary or Subscribe to our newsletter.
coingecko (thumbnail mini)
CoinGecko for iOS
coingecko (thumbnail mini)
CoinGecko for Android