How easily can asics be ported over to other sha algorithms?

How easily can asics be ported over to other sha algorithms?

Let's say I want to rewrite the software behind the hardware of current asics. Would it still mine, for example, sha1 algorithms orders of magnitude faster than a normal cpu would?

https://ift.tt/2MBjwAB

Comments

Popular posts from this blog

How to discover startup flags or command-line options for bitcoind?

Lightning network (lnd): What's the best way to report lnd server issues/ask for help with channels that won't close?

Is there any python library could be used to decodescript in output