How easily can asics be ported over to other sha algorithms?

How easily can asics be ported over to other sha algorithms?

Let's say I want to rewrite the software behind the hardware of current asics. Would it still mine, for example, sha1 algorithms orders of magnitude faster than a normal cpu would?

https://ift.tt/2MBjwAB

Comments

Popular posts from this blog

New ccminer 2.3.1 from Tpruvot with Lyra2REv3 Support and More

Bitfinex & Market Synergy To Offer Institutional Calibre Cryptocurrency Connectivity

Bitcoin Gold (BTG) To Launch Mining on 12th November (7:00 UTC)