ASIC Resistant
By CoinGecko | Updated on Mar 03, 2020
Typically used within the crypto world to describe the proof-of-work protocols that aim to prevent the use of ASICs for mining. Typically, this is achieved by making certain adjustments such that a ASIC will not have any competitive advantage over consumer hardware, or through inclusion of many various algorithm that makes it difficult for ASICs to have an edge against regular hardware.
The aim of ASIC resistant algorithms are usually to avoid the centralization of mining in that typically happens as ASIC machines.
Related Terms
Cloud Mining
Mining on blockchains through rented processing power rented from companies that host the physical equipment.
zkOracle
A zkOracle is an advanced concept in blockchain technology that combines the properties of oracles with the principles of zero-knowledge proofs.
Dusting Attack
A new form of malicious activity in which hackers and scammers attempt to undermine the privacy of cryptocurrency users by sending little amounts of money to their wallets.
Miners
Contributors to a blockchain taking part in the process of mining.
Hungry for more knowledge?
Back to Glossary or Subscribe to our newsletter.