Blog Archives

ASIC-Resistant

ASIC-resistance refers to a cryptocurrency that is “immune” to ASIC mining. ASICs are integrated circuits that are created to serve a specific use case–performing a particular computing task. In the world of cryptocurrencies, ASIC devices are designed to participate in the process of mining Bitcoin (or other cryptocurrencies). As such, Bitcoin is an example of a cryptocurrency that cannot be considered ASIC-resistant. In fact, any coin that utilizes BTC’s SHA256

What is Proof of Stake (PoS)?

Proof of Stake (PoS) is a consensus mechanism in which block validators are selected based on the number of coins they are staking. In this case, the term staking refers to the act of validators committing funds to the system. So validators can only participate in the process of producing new blocks if they lock their coins. The locked funds will then act as collateral, meaning that malicious validators will

51% Attack

A 51% attack (or majority attack) refers to a potential attack on the integrity of a blockchain system in which a single malicious actor or organization manages to control more than half of the total hashing power of the network, potentially causing network disruption. If a single bad user, or group of bad users acting together, control more than 50% of the total network hashing rate for a blockchain, they

Recent Comments

Archives

Categories

Meta