Bitcoin

HOW ARE SUCH SMALL MINERS SOLVING BITCOIN BLOCKS?

Not one, nor two, but three small bitcoin miners were able to find valid block hashes and add new blocks to the Bitcoin blockchain while mining solo in a two-week span last month, a string of events with such small odds of happening that many in the Bitcoin community were left wondering how it could even be possible.

Bitcoin Magazine talked with Con Kolivas, the creator and administrator of Solo CK Pool, a bitcoin mining pool software project geared toward workers interested in mining solo rather than contributing their hash rate into a pool, which all three of the lucky miners were using. Despite widespread belief that Solo CK Pool must be special to have been a central part of such a phenomenon, the reactions to these successful mining events have shown that there are clearly still some misconceptions about bitcoin mining.

“People think that this small miner should not have solved the block,” Kolivas told Bitcoin Magazine. “People think that was impossible, that there’s something wrong with Bitcoin, or that proof of work is broken or there’s a back door. And this is completely, utterly wrong. There isn’t something wrong with Bitcoin when it happens.

Read more

Veille-cyber

Share
Published by
Veille-cyber

Recent Posts

Sécurité des mots de passe : bonnes pratiques pour éviter les failles

Sécurité des mots de passe : bonnes pratiques pour éviter les failles La sécurité des…

4 jours ago

Ransomware : comment prévenir et réagir face à une attaque

Ransomware : comment prévenir et réagir face à une attaque Le ransomware est l’une des…

5 jours ago

Cybersécurité et e-commerce : protéger vos clients et vos ventes

Cybersécurité et e-commerce : protéger vos clients et vos ventes En 2025, les sites e-commerce…

1 semaine ago

Les ransomwares : comprendre et se défendre contre cette menace

Les ransomwares : comprendre et se défendre contre cette menace En 2025, les ransomwares représentent…

1 semaine ago

RGPD et cybersécurité : comment rester conforme en 2025

RGPD et cybersécurité : comment rester conforme en 2025 Depuis sa mise en application en…

1 semaine ago

VPN : un outil indispensable pour protéger vos données

VPN : un outil indispensable pour protéger vos données Le VPN, ou « Virtual Private…

2 semaines ago

This website uses cookies.