Hacker News new | past | comments | ask | show | jobs | submit login

This is not true for all crypto coins. A small proportion of mining hash functions are deliberately designed to thwart ASICs, e.g. https://github.com/tevador/RandomX. It's a cat-and-mouse game, though: CryptoNight was designed to fulfill the same role, but ultimately failed: https://monerodocs.org/proof-of-work/cryptonight/.



Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: