Questions on: asic

What follows is an educated guess, not certain statements, and is based on Electrum's brainwallet phrases (just figured it'd be a good example), not other schemes or human-generated ones. No, a miner can't easily be tricked into doing it (e. g
The best Bitcoin mining hardware has evolved dramatically since 2009At first, miners used their central processing unit (CPU) to mine, but soon this wasn't fast enough and it bogged down the system resources of the host computer. Miners quickly moved
ANYONE can contract board work, if he can do the layout himself. There are several board layout programs that will let you do this. There are plenty of board manufacturers that produce your boards, if you do the layout and send it to them
«The bigger pick-axe has finally arrived. « It has taken over 6 months to arrive since the date I placed the order, which is approximately 4 months longer than I’d anticipated based on Butterfly Labs’ predictions, but it is finally here. Their 5GH/s
When creating a new crypto-currency, a compromise must be made regarding the proof-of-work algorithm. Should the algorithm selected be CPU-only, or the opposite? Both options have their pro's and con's. Should the creators use an algorithm that's eas
Every so often Apple will release a list of Macs that are now considered “vintage” or “obsolete”. You’ll probably find yourself wondering what exactly Apple means by “vintage” and “obsolete”. Here is how Apple defines the terms: Vintage: Products tha
At the current exchange rate, GPU mining can still be profitable if electricity is below twenty cents per kWh. In less than three weeks, the daily mining revenues will drop by half in an instant (the block reward subsidy "halving" event, around Novem
The hardware you are referring to are called Application Specific Integrated Circuits (ASICs), and they are named that for a reason. It's because they are not general purpose computers like desktops, tablets, and mobile phones. Instead, they are comp
No. ASIC designs are all proprietary. This is controlled to the point where gaining information about the use for packaged chips is subject to a highly restrictive NDA