Bitcoin Asked by jwinterm on February 18, 2021
I’m curious if there have been any technical evaluations of the vulnerabilities of cryptocurrencies that utilize more than one proof of work algorithm – for instance, myriadcoin or huntercoin.
Myriadcoin uses five different PoW algorithms, with different algorithms targeted towards different hardware, so that people are able to mine with ASICs, GPUs, and CPUs. The idea is that this will make it more difficult to centralize mining and harder gain control of 51% of the hashing power, while also making mining more accessible to as many people as possible.
I’m wondering if there are any potentially unintended consequences to this that maybe some folks have already identified.
I realize this is a dead thread, but I believe it is important to add some clarification; I mean I found this thread while looking for multi-algo info . . .
I can not give any insight on the OP's question, but I can state that:
Answered by HOLLiiWOOD on February 18, 2021
Chaining algorithms reduces security as if one part of the chain fails, the whole chain fails. And in this case fail doesn't just mean completely broken, it can also mean an ASIC-proof algorithm turning out to be not ASIC proof.
Answered by Jannes on February 18, 2021
Get help from others!
Recent Questions
Recent Answers
© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP