ASIC Resistant

CoinGecko által | Frissítve ekkor: Mar 03, 2020
Typically used within the crypto world to describe the proof-of-work protocols that aim to prevent the use of ASICs for mining. Typically, this is achieved by making certain adjustments such that a ASIC will not have any competitive advantage over consumer hardware, or through inclusion of many various algorithm that makes it difficult for ASICs to have an edge against regular hardware. The aim of ASIC resistant algorithms are usually to avoid the centralization of mining in that typically happens as ASIC machines.

Ossza meg ezt egy ismerősével!

Kapcsolódó kifejezések

Trustless
Entirely verifiable, without needing to trust or assume an action is done completely and in good faith.
Sell wall
Anomalously large sell order(s) at a single price point that reflects as a "wall" in the order book.
Proof-of-Authority (PoA)
A consensus algorithm that asigns block validation queue based on identity and reputation.
Privacy Coins
Cryptocurrencies that are designed with transaction anonimity and user privacy in mind.
Még több tudásra szomjazik?
Vissza a glosszáriumhoz vagy iratkozzon fel hírlevelünkre.
coingecko (thumbnail mini)
CoinGecko iOS-ra
coingecko (thumbnail mini)
CoinGecko Androidra