Answer the question
In order to leave comments, you need to log in
Answer the question
In order to leave comments, you need to log in
No.
If we are talking about a hardware ASIC miner, then its task is very stupid, click SHA2 (SHA2 ()) and compare the result with some target. Satisfies - we send to the output, no - we twist the counter and hash further.
If we are talking about a software miner, then it is easier to write a brute-forcer from scratch than to remake the source code of a miner that is not intended for this.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question