Cryptocurrency

0  •  0  •  2

Here are some distinctive features to make Ethash algorithm(https://www.cryptominerbros.com/blog...) different from other algorithms. It relies heavily on the operations that take place in RAM which has large bandwidth consumption. It provides prot...

(more)

Here are some distinctive features to make Ethash algorithm(https://www.cryptominerbros.com/blog...) different from other algorithms.

  1. It relies heavily on the operations that take place in RAM which has large bandwidth consumption. It provides protection against ASICs, and is essential to the functioning of Ethash. The operations required to build DAG DAG as well as Ethash’s working cache Ethash working cache rely heavily on these functions.

  2. It is an algorithm that is GPU-friendly. Of course, you’re aware that modern GPUs or graphics cards are incredibly powerful. In reality, the transfer of graphics, as seen in the latest games, requires huge amounts of memory as well as an unmatched parallel processing.This is a benefit if you mine with Ethash because you can use your GPU memory for storing the entire DAG in memory as well as the cache to perform all calculations within a speedy work area. So, you’ll are able to mine faster.

  3. It is a great way to verify transactions for clients with thin. With around 16 MB of RAM, it’s easy to create a thin client which can verify transactions quickly and in a brief amount of time. Additionally the thin client can be set up and operational and perform the verification process in just 30 minutes.

 0.7 q
Cryptocurrency

0  •  0  •  1

These are some of the cons of the Ethash Algorithm- The ASIC resistance was not a reality when Bitmain introduced their initial Ethash ASIC miner in 2018. There are a number of consensus mechanisms that are being explored to enhance the decentraliz...

(more)

These are some of the cons of the Ethash Algorithm-

  • The ASIC resistance was not a reality when Bitmain introduced their initial Ethash ASIC miner in 2018. There are a number of consensus mechanisms that are being explored to enhance the decentralization in mining for Ethereum. But, the creation of Ethereum 2.0 will see the gradual phase-out out of Proof of Work (PoW) and, in turn, Ethash as a mining algorithm to create an Proof of Participation (PoS).
  • The high memory requirements of your DAG makes it very difficult to mine even on less expensive hardware.
  • The method by which he increases his algorithm’s difficulty has brought Ethereum to be on the brink of the infamous “Ice Eras.” A level at which Ethash’s system for difficulty could render mining impractical for anyone to try. This poses a major risk in the protection and integrity of Ethash’s Ethereum blockchain.
 0.35 q
Cryptocurrency

0  •  0  •  1

Due to limitations with the Dagger/Hashimoto algorithm, the Ethereum development team came up with Ethash(https://www.cryptominerbros.com/blog...). Although the Ethash algorithm operates differently from Dagger-Hashimoto but the fundamental principle...

(more)

Due to limitations with the Dagger/Hashimoto algorithm, the Ethereum development team came up with Ethash(https://www.cryptominerbros.com/blog...). Although the Ethash algorithm operates differently from Dagger-Hashimoto but the fundamental principles remain the same. Let’s now understand how Ethash functions.

The block headers are used to calculate the seed.
This seed is then used to create a pseudorandom 16 MB cache.

The DAG is created by using this cache. This data set is semi permanent and updated every 30 000 blocks. The DAG is updated for each “mining season”.

Mining begins after the DAG is created. This operation involves merging random values taken from the DAG based on data provided by network and transactions to be verified.

 0.35 q
Cryptocurrency

0  •  0  •  1

The original intention was to make it memory-hard initially, the Ethash algorithm(https://www.cryptominerbros.com/blog...) needs a substantial amount of memory to run hashing processes. Its design was intended to be ASIC-resistant and to ensure a mor...

(more)

The original intention was to make it memory-hard initially, the Ethash algorithm(https://www.cryptominerbros.com/blog...) needs a substantial amount of memory to run hashing processes. Its design was intended to be ASIC-resistant and to ensure a more equitable distribution of mining profits. For example, ASICs have the excellent computing power to surpass general-purpose computers like CPUs and GPUs however, their memory access is similar to GPUs.

With the technological advancements throughout the years we have now advanced ASICs which are precisely optimized to work with use with the Ethash algorithm. These ASICs are equipped with high rate of hashing and efficiency in energy, allowing miners to tackle complex cryptographic problems successfully within the specified time frame and to mine Ethereum Classic (ETC) coins.

 0.35 q
Cryptocurrency

4  •  0  •  64

It’s alright to have the promise of projects through Cryptocurrrencies but what we need to see is real world applications.

(more)

It’s alright to have the promise of projects through Cryptocurrrencies but what we need to see is real world applications.

 110.18 q (claimed) View Top Answer
Cryptocurrency

2  •  0  •  26

What is so expensive in these ASIC excavators?

What is so expensive in these ASIC excavators?

 65.8 q (claimed) View Top Answer