Create account

replied 1334d
A malicious pool can pay to rent the POW by whoever has the general purpose HW and do what they want with it, there is no need to actually own any hardware, ASIC or otherwise to get-
replied 1334d
-Majority POW power, all it takes is paying above market rate to rent the hash in a pool. There is no way around that. However, there are non-51% attack reasons why ASICs are bad.
replied 1334d
And ASICs still has the rent problem + additional issues, so it is no better at some things and worse at other things.