ASIC Resistant

Bởi CoinGecko | Cập nhật vào Mar 03, 2020
Typically used within the crypto world to describe the proof-of-work protocols that aim to prevent the use of ASICs for mining. Typically, this is achieved by making certain adjustments such that a ASIC will not have any competitive advantage over consumer hardware, or through inclusion of many various algorithm that makes it difficult for ASICs to have an edge against regular hardware. The aim of ASIC resistant algorithms are usually to avoid the centralization of mining in that typically happens as ASIC machines.

Chia sẻ trang này với bạn bè!

Điều khoản liên quan

Token Burn
An event in which tokens are verifiably removed permanently removed from circulation.
ERC-20
ERC-20 is one of the most widely used token standards in Ethereum to create fungible, exchangeable tokens.
Sim Swapping
It is a tactic where hacker overtake the mobile phone to exploit the two-factor authentication and two-step verification.
Wash Trade
Meaningless back and forth trading between a single party with the aim of inflating trade volume.
Khao khát hiểu biết thêm?
Quay lại Bảng chú giải thuật ngữ hoặc Đăng ký nhận bản tin của chúng tôi.
coingecko (thumbnail mini)
CoinGecko cho iOS
coingecko (thumbnail mini)
CoinGecko cho Android