ASIC Resistant
By CoinGecko | Updated on Mar 03, 2020
Typically used within the crypto world to describe the proof-of-work protocols that aim to prevent the use of ASICs for mining. Typically, this is achieved by making certain adjustments such that a ASIC will not have any competitive advantage over consumer hardware, or through inclusion of many various algorithm that makes it difficult for ASICs to have an edge against regular hardware.
The aim of ASIC resistant algorithms are usually to avoid the centralization of mining in that typically happens as ASIC machines.
Related Terms
Explain Like I'm Five (ELI5)
To explain in such simple terms that even a five-year-old would be able to understand it.
Pay-Per-Share (PPS)
You are compensated for each valid share that you contribute. Each share is worth a set amount of cryptocurrency that may be mined.
Second-Layer Solutions
Secondary network or framework built atop an existing blockchain to address transaction speed and scalability issues.
Sim Swapping
It is a tactic where hacker overtake the mobile phone to exploit the two-factor authentication and two-step verification.
Hungry for more knowledge?
Back to Glossary or Subscribe to our newsletter.