It is evident major changes will come to the bitcoin ecosystem as we know it today. No one knows for sure what the future may bring, and different contingency plans are being drafted as we peak. One post on Bitcointalk talks about developing an alternative proof-of-work algorithm for bitcoin moving forward. An intriguing concept, although there is still a lot of work to be done.
Upgrading Bitcoin’s Proof-of-Work Algorithm
On paper, it sounds rather ridiculous to develop an upgraded Bitcoin proof-of-work algorithm. Considering how mining is the backbone of bitcoin, there is no real need to address the algorithm right now. Then again, researching the possibilities in this regard is never a wasted effort, even if there is no guarantee of seeing this upgraded algorithm go live on the main net anytime soon.
Some people feel bitcoin’s proof-of-work algorithm needs to be revamped in order to get rid of the people supporting Bitcoin Unlimited. That is a rather strong sentiment, to say the least, as there are many other reasons as to why such a switch can be considered in the future. For the time being, this project is nothing more than a concept looking for additional input from developers and bitcoin enthusiasts.
A prototype of how this proof-of-work algorithm can be implemented is already available on GitHub, developed by luke-jr. An official BIP is still in the works as we speak, although no official release date has been announced at this time. Having the support of a renowned Bitcoin Core developer is quite significant for this project, as it goes to show there is at least one person thinking about what changes might be needed to advance bitcoin.
One company in particular who showed equivocal opposition to this possible change is Bitfury. In a recent set of tweets, the mining group’s Vice Chairman George Kikvadze, fired some shots on twitter threatening to sue open source developers (Peter Todd) if they move forward with the proposal.
According to the Bitcointalk thread, the main reason for working on this project is to wrest control over the bitcoin network from Bitmain. The company is one of the largest mining manufacturers, and their mining pool represents 15% of all hashpower. However, the company plans to launch a new mining facility that is capable of housing enough mining equipment to control 45% of the bitcoin network. Although it is unclear if this is the company’s goal, a contingency plan is direly needed, just in case.
The proposal found on Github suggests using the Keccak algorithm for proof-of-work. Contrary to popular belief, Keccak is actually ASIC-friendly, meaning dedicated miners could still be used to mine the new algorithm. However, current ASICs mining SHA256 will not be useful in mining Keccak as new hardware will be needed to be built in order to mine it. Although it has not been confirmed an algorithm change will be necessary to ensure bitcoin is not in the hands of centralized [Chinese] entities, it would represent quite an intriguing change. Do keep in mind the team working on this project is looking for feedback and testers first and foremost.
It is quite interesting to think of a proof-of-work algorithm stage for bitcoin. In the early days, CPU mining was the way to go. Later on, CPU’s got replaced by GPU and FPGA’s, whereas ASIC mining hardware is king now Going back to a world where both CPU and GPU mining make economic sense would help decentralized bitcoin mining once again. Rest assured not everyone will look favorably upon this project, even though it will be interesting to keep an eye on.
If you liked this article, follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin, cryptocurrency, and technology news.
Article updated, what we meant was that current ASICs wouldn’t be able to mine the new algo. But you are correct, the algorithm isnt ASIC-proof as like your link shows people have built dedicated hardware to mine it.
Speaking of algos, do think Scrypt-N is ASIC-proof? As every few number of years the N changes which requires new hardware.
ASICs by definition can’t mine anything other than what they were designed for.
Scrypt-N is ASIC-proof for sufficiently large N but it is also completely unsuitable as a proof-of-work for sufficiently large N, since one of the defining features of proof-of-work is ease of verifiability. I discuss this in greater detail in http://cryptorials.io/beyond-hashcash-proof-work-theres-mining-hashing/
I did indeed mean “there is no consumer grade ASIC hardware available to mine Keccak”, thus i wrongfully said it was ASIC-proof. Ty for pointing it out π
So what algorithm would you say IS asic-proof. If scrypt-N isn’t viable at large Ns, is there any algo which can be asic-proof indefinitely by design?
One answer is in the article I link to in my response above: my own Cuckoo Cycle proof-of-work https://github.com/tromp/cuckoo
Alternatives are Equihash http://www.openwall.com/articles/Zcash-Equihash-Analysis and Merkle Tree Proof https://github.com/zcoinofficial/zcoin/wiki/What-is-MTP-(Merkle-Tree-Proof)-and-why-is-it-an-ideal-Proof-of-Work-algorithm%3F
All of these are instantly verifiable. In contrast, Ethereum’s ethash requires many MB of memory just to verify.
Hello, I wish for to subscribe for this blog to take hottest updates, therefore where can i do it please help.
Whatβs Happening i’m new to this, I stumbled upon this I’ve found It absolutely helpful and it has aided me out loads. I hope to contribute & assist other users like its aided me. Good job. You can try Bitcoin mining for free. Try CryptoTab: https://inorangepie.biz/16590141
No matter if some one searches for his necessary thing, thus
he/she needs to be available that in detail, thus that thing is maintained over here.
Can I install a different WordPress theme to a WordPress hosted blog?
Hey there! This post couldn’t be written any better! Reading this
post reminds me of my previous room mate! He always kept chatting about this.
I will forward this write-up to him. Fairly certain he
will have a good read. Thank you for sharing!
ΠΠ»Ρ ΡΠ°ΠΉΡΠ΅ ΠΏΡΠ΅Π΄ΠΎΡΡΠ°Π²Π»Π΅Π½ ΡΠ΅ΠΉΡΠΈΠ½Π³ ΠΎΠ½Π»Π°ΠΉΠ½ ΠΏΠΎΠΊΠ΅Ρ ΡΠ°ΠΉΡΠΎΠ² ΠΈ ΠΊΠ°Π·ΠΈΠ½ΠΎ Π΄Π»Ρ ΡΡΡΡΠΊΠΎΠΌ ΡΠ·ΡΠΊΠ΅, ΡΡΠΎΠ±Ρ
ΠΈΠ³ΡΡ Π±Π΅Π· Π·Π°Π³ΡΡΠ·ΠΊΠΈ Π² Π±ΡΠ°ΡΠ·Π΅ΡΠ΅. ΠΠΎΠΊΠ΅Ρ ΡΡΠΌΡ, ΠΊΠΎΡΠΎΡΡΠ΅ ΠΏΡΠΈΠ½ΠΈΠΌΠ°ΡΡ webmoney, ΠΌΠΎΠ½Π΅ΡΠ°.ΡΡ, Π²Π΅Π±ΠΌΠ°Π½ΠΈ.
ΠΠ΅Π΄Π°Π²Π½ΠΎ, ΡΠ΅ΠΉΡΠΈΠ½Π³ ΠΏΠΎΠΏΠΎΠ»Π½ΠΈΠ»ΡΡ ΠΎΠ±Π·ΠΎΡΠΎΠΌ Π΄Π»Ρ ΠΊΠ°Π·ΠΈΠ½ΠΎ Π΄ΠΆΠΎΠΊΠ΅Ρ,
ΠΊΠΎΡΠΎΡΠΎΠ΅ ΠΏΠΎΠ»ΡΠ±ΠΈΠ»ΠΎΡΡ ΠΌΠ½ΠΎΠ³ΠΈΠΌ ΠΈΠ³ΡΠΎΠΊΠ°ΠΌ.
Π ΡΡΠ°ΡΡΠ΅ Π΄ΠΎΠ·Π²ΠΎΠ»Π΅Π½ΠΎ ΡΠ·Π½Π°ΡΡ ΡΠ΅Π³ΠΎ ΡΡΠΎΠΈΡ ΡΠΎΠΌΠ½Π΅Π²Π°ΡΡΡΡ ΡΠ΅ΡΠ΅Π· ΠΊΠ°Π·ΠΈΠ½ΠΎ Π² Π±ΡΠ΄ΡΡΠ΅ΠΌ ΠΈ ΠΎΡΠ½ΠΎΡΠΈΡΠ΅Π»ΡΠ½ΡΠΉ Π½Π΅ΠΎΡΠΈΠ²ΠΈΠ΄Π½ΡΡ ΠΏΡΠ΅ΠΈΠΌΡΡΠ΅ΡΡΠ²Π°Ρ .
Π’Π°ΠΊΠΆΠ΅, Π½Π΅Π΄Π°Π²Π½Π΅Π΅ ΠΎΠ±ΡΡΠΆΠ΄Π΅Π½ΠΈΠ΅ Π±ΠΎΡ ΠΡΡΠ°Π½Π΄ΠΈΠ°ΡΠΈ
ΠΏΡΠΎΡΠΈΠ² ΠΠ΅Π²ΠΈΠ½Π° Π₯Π°ΡΡΠ° ΠΈ Π΄ΡΡΠ³ΠΈΡ Π½ΠΎΠ²ΠΎΡΡΡΡ
ΠΈΠ· ΠΌΠΈΡΠ° ΠΏΠΎΠΊΠ΅ΡΠ°.
f38dy crvon 2a5k