Questo sito web utilizza i cookie per ragioni tecniche, a fini di analisi e per scopi pubblicitari, come descritto nella nostra Politica sulla privacy. Se accetti l’uso dei cookie, continua a utilizzare il nostro sito.
Typically used within the crypto world to describe the proof-of-work protocols that aim to prevent the use of ASICs for mining. Typically, this is achieved by making certain adjustments such that a ASIC will not have any competitive advantage over consumer hardware, or through inclusion of many various algorithm that makes it difficult for ASICs to have an edge against regular hardware.
The aim of ASIC resistant algorithms are usually to avoid the centralization of mining in that typically happens as ASIC machines.