How easily can asics be ported over to other sha algorithms?
How easily can asics be ported over to other sha algorithms?
Let's say I want to rewrite the software behind the hardware of current asics. Would it still mine, for example, sha1 algorithms orders of magnitude faster than a normal cpu would?
https://ift.tt/2MBjwAB
Comments
Post a Comment