Fact-checked by Grok 2 weeks ago

Proof of work

Proof of work (PoW) is a cryptographic mechanism employed in technologies, such as blockchains, requiring network participants to perform computationally demanding tasks to validate transactions, prevent , and achieve agreement on the state of the ledger without centralized authority. In this system, miners compete to find a value that, when combined with transaction data and hashed using a like SHA-256, produces a meeting a difficulty target, typically starting with a specified number of leading zeros, thereby demonstrating expended computational effort that is verifiable by others at low cost. The concept was initially proposed by and Moni Naor in 1992 as a technique to combat and control access to shared resources by imposing a processing cost on requesters, making economically infeasible. PoW gained prominence through its implementation in , outlined in Nakamoto's 2008 whitepaper, where it underpins a decentralized system by linking economic incentives to proof of computational work, ensuring the longest chain—backed by the most aggregate work—represents and deterring attacks via the high cost of altering history. This mechanism has secured the network, which processes transactions with a total hashrate exceeding hundreds of exahashes per second, rendering majority attacks prohibitively expensive due to the need to outcompute the majority of participants. Notable achievements include enabling the first functional permissionless , fostering a multi-trillion-dollar asset class in cryptocurrencies, and demonstrating resilience against state-level threats over more than a decade of operation. Despite its strengths in providing robust and —advantages rooted in the probabilistic finality and to sybil attacks—PoW faces criticism for its energy intensity, as operations consume substantial to perform the required computations. Estimates indicate that U.S. mining, predominantly Bitcoin's PoW, accounts for 0.6% to 2.3% of national use annually, though much of this leverages otherwise stranded or sources in regions with excess capacity. This has spurred debates on environmental impact and scalability limitations, prompting alternatives like proof-of-stake, yet PoW's proven track record underscores its role as a foundational for trust-minimized systems.

Historical Development

Origins in Anti-Spam and Cryptography

The concept of proof of work originated as a mechanism to impose computational costs on users seeking access to shared digital resources, thereby deterring abuse such as without relying on centralized authorities. In 1992, and Moni Naor introduced this approach in their paper "Pricing via Processing or Combatting ," proposing puzzles that require senders to perform moderately hard computations—such as inverting a —proportional to the volume of messages, making mass emailing economically infeasible for spammers while remaining practical for legitimate users. Their system emphasized pricing through power, verifiable quickly by recipients, to low-value in distributed environments like networks. Building on these foundations, Adam Back formalized proof of work in 1997 with Hashcash, a denial-of-service countermeasure specifically tailored for email spam and anonymous remailer abuse. Hashcash requires email senders to solve a partial hash collision puzzle, finding a nonce that produces a hash with a specified number of leading zero bits, thus proving expended computational effort before message transmission. This puzzle's difficulty is adjustable by varying the required zero-bit prefix, allowing systems to scale costs dynamically based on threat levels, while verification remains efficient in constant time by simply re-hashing the provided solution. In 2004, Hal Finney advanced the concept with Reusable Proofs of Work (RPOW), adapting proof of work to create transferable digital tokens backed by computational effort, using the hash function to mint and redeem "POW tokens" that could be exchanged without recomputation. RPOW highlighted the unforgeable costliness of computation, enabling a prototype for where tokens represent verified work, resistant to easy parallelization due to the sequential nature of nonce trials despite theoretical scalability with hardware. These early systems established core properties of proof of work: puzzles that are computationally intensive to solve yet trivially verifiable, with tunable difficulty to balance usability and deterrence in decentralized settings.

Introduction in Bitcoin

Satoshi published the Bitcoin whitepaper, titled "Bitcoin: A System," on October 31, 2008, proposing proof of work as the core consensus mechanism for a decentralized . This approach addressed the problem by requiring network participants to perform computational work to validate transactions and append blocks to a public ledger, with nodes accepting the chain possessing the greatest cumulative proof-of-work as the valid history. The proof-of-work system incentivizes honest behavior by linking economic rewards—initially 50 BTC per block—to the successful completion of this work, rendering alterations to established blocks progressively more resource-intensive as the network's total computational power, or hash rate, expands. The network commenced operation with the of its on January 3, 2009, which incorporated the inaugural 50 BTC block subsidy and a transaction embedding the text "The Times 03/Jan/2009 Chancellor on brink of second bailout for banks," referencing contemporary financial instability. Proof-of-work in utilizes double SHA-256 hashing, where miners iteratively adjust a in the block header until the resulting hash value meets or falls below a dynamically adjusted difficulty target, ensuring an approximate 10-minute average block interval. This mechanism establishes a probabilistic timestamping of transactions, with chain forks resolved in favor of the longest valid chain, thereby minimizing the feasibility of double-spends by attackers lacking majority hash power. In Bitcoin's early phase, mining relied on central processing units (CPUs) accessible to ordinary computers, enabling initial participation by hobbyists and early adopters. By mid-2010, as awareness grew and hash rates increased, miners transitioned to graphics processing units (GPUs), which offered substantially higher hashing efficiency due to their capabilities, marking the onset of specialized optimization. This evolution underscored proof-of-work's role in scaling through escalating computational demands, tying the protocol's robustness to the voluntary of real-world resources in pursuit of block rewards.

Subsequent Adoptions and Evolutions

Following Bitcoin's introduction of proof-of-work (PoW) in 2009, adopted the mechanism in its launch on October 13, 2011, substituting Bitcoin's SHA-256 hash function with to emphasize memory-hard computations that initially deterred specialized application-specific integrated circuits () and favored general-purpose hardware like consumer GPUs. This design choice aimed to democratize mining participation while maintaining PoW's core security properties, influencing subsequent altcoins such as , which also employed for similar differentiation from Bitcoin's ASIC-dominated ecosystem. Ethereum implemented PoW upon its mainnet launch in July 2015, utilizing the algorithm—a memory-intensive variant derived from Dagger-Hashimoto—to support GPU-based and resist early ASIC centralization, aligning with its vision for programmable smart contracts secured by decentralized computation. The network operated under PoW until September 15, 2022, when it transitioned via The Merge to proof-of-stake, marking the end of its PoW era amid ongoing scalability challenges. During this period, community-driven proposals like ProgPoW emerged around 2018-2019 to refine further, incorporating programmable elements to amplify GPU advantages and mitigate ASIC efficiency gains, though never fully activated due to implementation hurdles and the impending shift to staking. Monero advanced PoW refinements in November 2019 with the adoption of in its v0.15 release, a CPU-optimized, ASIC-resistant emphasizing random code execution to preserve accessibility for ordinary users and counter centralization observed in prior CryptoNight variants. These evolutions across altcoins highlighted a recurring tension: balancing PoW's proven resistance to attacks through computational expense against the centralizing effects of specialization, prompting iterative tweaks for broader . Bitcoin's PoW network exemplified scaling resilience, with its global hash rate surpassing 100 EH/s by mid-2020 and reaching approximately 180 EH/s by December 2021, reflecting exponential growth in secured computational power driven by increasing miner participation and efficiency improvements. This expansion underscored PoW's capacity to enhance security proportionally with adoption, as higher hash rates elevated the economic cost of potential 51% attacks.

Technical Mechanism

Core Principles and Requirements

Proof of work (PoW) fundamentally requires participants, known as miners, to solve a cryptographic puzzle by iteratively searching for a value such that the of a block header—including the , previous block hash, Merkle root, , and other —produces a value below a dynamically set target threshold. This process demands exhaustive , as each attempt is independent and unpredictable due to the one-way nature of the , with the expected number of trials required being inversely proportional to the target value, thereby scaling linearly with the network's difficulty parameter. The solution embeds verifiable evidence of expended computational effort without revealing the precise path taken, ensuring that the work correlates directly with real-world resource costs such as and depreciation. A core property of PoW is its : producing a valid proof is computationally intensive and requires significant trial-and-error , while merely involves recomputing a single and comparing it to the , which can be done rapidly by any . This progressive characteristic allows the cost of generation to be adjusted by altering the —lowering it increases difficulty and thus the average work needed—enabling networks to maintain consistent block production rates despite fluctuating total power. Success in solving the puzzle follows a probabilistic model, where each attempt has an equal, low probability of succeeding, resulting in block discovery times approximating an under a process for high-volume rates. By mandating this resource-bound computation, PoW provides sybil resistance in permissionless systems, as creating multiple pseudonymous identities to influence becomes prohibitively expensive without corresponding and investments, grounding abstract network participation in tangible physical costs. This design enforces a verifiable signal of commitment that cannot be cheaply replicated, distinguishing legitimate participation from adversarial flooding or duplication attempts.

Hash Functions and Difficulty Adjustment

Proof-of-work protocols depend on cryptographic hash functions exhibiting preimage resistance—rendering it computationally infeasible to derive an input from a given output—and , which prevents finding distinct inputs yielding the same output without exhaustive search. These properties compel miners to perform trial-and-error computations by appending a to block data and hashing the result until it satisfies a network-defined target, typically requiring the hash to begin with a specified number of leading zeros. In , the selected function is SHA-256, applied in double iteration (SHA-256(SHA-256(block header))), a 256-bit output standardized by NIST and proven secure against all known attacks except brute-force . Ethereum's pre-Merge proof-of-work implementation employed Ethash, a memory-hard engineered to demand substantial (up to several gigabytes per thread) during the computation of a (DAG) dataset, thereby elevating the resource barriers for application-specific integrated circuits () that excel in sequential compute but falter on high-bandwidth memory access patterns. Memory-hard variants, such as Ethash or (used in ), seek to democratize by favoring general-purpose hardware like GPUs over ASIC dominance, which could otherwise concentrate hash power among few manufacturers; however, sustained ASIC development has progressively eroded these defenses in practice. Difficulty adjustment mechanisms dynamically calibrate the to counteract variations in total , preserving intervals despite changes in participation or hardware efficiency. retargets difficulty every 2016 blocks (roughly biweekly), deriving the new by dividing the prior difficulty by the ratio of actual elapsed time for those blocks to the expected 20,160 minutes (10 minutes per block), with upward adjustments capped at a factor of four to avert overcorrections from manipulations. Following China's May 2021 ban on cryptocurrency , which accounted for over 50% of global hash rate beforehand, the network experienced a sharp hash rate decline of nearly 50% within weeks as operations migrated to regions like the and , prompting a 28% difficulty reduction in July 2021—the steepest drop to date—and extended times exceeding 15 minutes temporarily, until hash rate rebounded to prior levels by late 2021 through geographic redistribution. This episode underscored the adjustment's responsiveness to exogenous shocks, restoring equilibrium without protocol alterations, though it highlighted risks of temporary centralization during transitions.

Verification Process

In proof-of-work systems, verifying a proposed requires nodes to compute the of the block header—incorporating , previous , Merkle of transactions, , and difficulty —and determine if the output is below the specified threshold. This entails executing only a single call, rendering the process far less resource-intensive than the exhaustive search needed to discover a valid , with average work scaling exponentially in required leading zero bits. Such asymmetry ensures that even low-powered devices can independently confirm solutions, upholding a trustless validation paradigm central to decentralized networks like . Chain validation extends this by sequentially checking each block's linkage via the previous field, ensuring validity (including no double-spends via rules), and confirming proof-of-work compliance against the adjusted difficulty. Nodes adhere to the longest chain rule, selecting the with the highest cumulative proof-of-work—quantified as the sum of difficulties—as the history, a formalized in Bitcoin's design to achieve amid asynchronous propagation and potential partitions. This probabilistic convergence favors chains extended by honest majorities, enabling fork resolution without arbitration. Block timestamps, constrained to exceed the median of the prior 11 blocks and not surpass network-adjusted time by more than two hours, integrate with the proof-of-work chain to impose a partial causal order on transactions, embedding events in an append-only structure resistant to ex post facto revision. Altering a historical block demands recomputing work for all descendants, an effort that grows linearly with chain length but exponentially improbable under majority honest hashing power, thereby anchoring a verifiable timeline that underpins causal realism in distributed ledgers. Verification per block remains constant-time, independent of global hashrate, thus permitting efficient, permissionless scrutiny by arbitrary participants.

Implementations and Variants

Bitcoin-Type PoW

Bitcoin's proof-of-work mechanism requires miners to compute a double SHA-256 hash of the block header until the resulting 256-bit value falls below a dynamically adjusted target threshold, determined by the network's difficulty parameter. The block header, serialized to 80 bytes, incorporates six fields: a 4-byte version number, the 32-byte hash of the previous block, a 32-byte Merkle root summarizing the transactions via pairwise hashing, a 4-byte , a 4-byte representation of the current target (bits field), and a 4-byte that miners iteratively vary to attempt satisfying the proof-of-work condition. This design enforces computational effort through the preimage resistance of SHA-256, where finding a valid nonce demands on average 2^{target exponent} trials, with no efficient shortcut beyond . The structure integrates this header with a list of transactions, forming a whose root embeds a compact to the full transaction set in the header. Inclusion of the previous 's in the current header creates a cryptographic chain, rendering alterations to any prior computationally infeasible without re-mining all subsequent blocks, thus securing the ledger's immutability against revisions. by nodes involves recomputing the double —which takes negligible time—and checking against the , enabling rapid without re-executing all work. This fixed, unadorned protocol has demonstrated empirical resilience since Bitcoin's launch on January 3, 2009, with no successful ever executed on the main chain despite numerous attempts on testnets and smaller networks. The network's total hash rate serves as a direct for cost, as overpowering it would require commandeering over half the distributed computational power to orphan blocks or enable double-spends; as of October 2025, this exceeds 600 exahashes per second, rendering such dominance economically prohibitive under current hardware efficiencies. Halving events, which programmatically halve the block reward every 210,000 blocks to control issuance, have tested the protocol's incentive structure without compromising . The third halving occurred on May 11, 2020, reducing rewards from 12.5 to 6.25 BTC per , followed by the fourth on April 19, 2024, to 3.125 BTC; in both cases, hash rate not only recovered but surged to new highs within months, indicating miners' alignment persisted amid subsidy reductions, bolstered by rising volumes and fees. This progression underscores the system's simplicity—relying solely on ASIC-optimized SHA-256 without algorithmic pivots—as a strength, having withstood over 15 years of adversarial scrutiny and scaling to global participation.

Other PoW Cryptocurrencies

, launched on October 13, 2011, by Charlie Lee, adopted the hashing algorithm as its PoW mechanism to prioritize memory-intensive computations, initially enabling with consumer-grade CPUs and GPUs rather than specialized . This design aimed to democratize participation compared to Bitcoin's SHA-256, though later emerged for . Dogecoin, originating as a 2013 meme-inspired currency, also employs and implemented merged mining with starting in block 371,337 on September 11, 2014, allowing miners to validate blocks on both networks simultaneously using the same computational effort, thereby bolstering Dogecoin's security via Litecoin's hashrate. This auxiliary proof-of-work approach has sustained Dogecoin's network without requiring independent mining infrastructure. Monero, a privacy-centric launched in 2014, transitioned to the RandomX PoW algorithm via a hard fork on November 30, 2019, emphasizing random code execution and high memory demands to favor general-purpose CPUs over , thereby aiming to preserve mining by reducing barriers for individual participants. RandomX's structure mitigates centralized hardware dominance observed in other PoW systems. Ravencoin, introduced in January 2018 for tokenized asset creation, upgraded to the KAWPOW algorithm—a ProgPOW —in May 2019 to enforce GPU-optimized mining while resisting through dynamic computations that leverage full GPU capabilities, supporting its focus on fair-launch asset issuance. This adaptation counters ASIC centralization risks specific to prior algorithms like X16R. By 2023, over 100 PoW-based cryptocurrencies operated alongside these examples, adapting algorithms for specialized objectives such as or asset transfer. However, commanded over 90% of the aggregate PoW hashrate, underscoring its outsized security footprint relative to alternatives.

Proof of Useful Work

Proof of useful work (PoUW) modifies traditional proof-of-work (PoW) by requiring miners to perform computations that yield extrinsic value, such as advancing scientific research or solving optimization problems, rather than solely generating values for puzzles. This approach aims to repurpose the energy-intensive process to produce outputs beneficial beyond consensus, potentially offsetting criticisms of PoW's resource inefficiency. However, PoUW demands that the useful task remains computationally asymmetric—hard to solve but verifiable in constant time—while preserving PoW's core security guarantees like resistance to precomputation and adjustable difficulty. One early implementation is Primecoin, launched in July 2013, which directs mining toward discovering chains of prime numbers (probable primes connected by specific probabilistic tests). These chains contribute to research, as longer sequences inform conjectures on prime distribution, though their practical utility remains primarily academic rather than immediately applicable. Primecoin's design integrates prime searches into block validation, where miners submit chain proofs verifiable via efficient primality tests like Miller-Rabin, achieving a hash rate-dependent difficulty adjustment similar to but tied to chain length. Despite this, Primecoin's adoption has been limited, with its network hash rate peaking modestly in 2013 and declining thereafter due to competition from more efficient hash-based PoW coins. More recent proposals include adaptations for domain-specific applications, such as a framework in that repurposes PoW for multi-stakeholder , where solves distribution routing problems to minimize logistics costs across nodes. Other concepts, like Ofelimos (proposed in 2022), target verifiable tasks or combinatorial optimizations, aiming to align with real-world computational demands. These examples illustrate PoUW's potential for efficiency gains, as the same computational output secures the chain while generating salable results, but empirical deployment remains scarce, with fewer than a handful of live networks versus thousands of pure PoW variants. PoUW introduces trade-offs, including heightened complexity, as useful proofs may require additional checks beyond simple confirmation, potentially slowing propagation and increasing centralization risks if verification favors specialized . Security analyses highlight vulnerabilities, such as easier grinding attacks if partial solutions from useful work can be reused across blocks, undermining the essential to PoW's probabilistic model. Coordination challenges further limit : useful tasks demand predefined, verifiable problems with consistent difficulty, yet real-world problems like or training often involve non-deterministic progress or require massive parallelization incompatible with solo mining incentives. Consequently, most networks persist with -based PoW for its simplicity and proven resilience, viewing PoUW as theoretically appealing but practically constrained by these engineering hurdles.

Security Features and Vulnerabilities

Decentralized Consensus and Attack Resistance

Proof of work (PoW) facilitates decentralized consensus by enabling permissionless participation, where nodes independently validate and extend the blockchain by solving computationally intensive puzzles, converging on the chain with the greatest accumulated proof-of-work as the canonical ledger. This process ensures that no central authority dictates the network state; instead, consensus emerges from the distributed competition among miners, who must invest real resources to influence block production probabilistically proportional to their hash rate contribution. The mechanism's permissionless entry barrier allows global participation without prior approval, fostering a robust, self-organizing system resistant to exclusionary control. A core strength of PoW lies in its Sybil resistance, achieved by tying voting power (block proposal rights) to verifiable computational expenditure rather than easily replicable identities like IP addresses or accounts. Fabricating influence through numerous pseudonymous nodes incurs escalating economic costs in , , and time, rendering large-scale impersonation impractical without corresponding resource commitment. This design deters adversarial dominance, as acquiring a controlling stake in hash rate demands sustained, verifiable investments that scale linearly with influence sought, aligning with tangible real-world expenditure. From a game-theoretic perspective, PoW establishes through incentives that favor honest behavior under the majority-honest-hash-power assumption: rational miners, seeking to maximize rewards, extend the longest valid chain, forming a Nash equilibrium where deviation (e.g., withholding blocks) yields lower expected returns than cooperation. This equilibrium holds empirically in , where miners have consistently prioritized chain extension over disruptive strategies, as deviations risk orphaning their efforts without altering the majority-secured history. The protocol's rules enforce this by rewarding only contributions to the dominant chain, making sustained attacks economically suboptimal for minority participants. PoW's structure resists by empowering individual miners to include any valid in blocks, of external directives, as long as it meets rules; coordinated exclusion requires ongoing majority power to dissenting blocks, a threshold rarely achievable without detection and economic penalty. This miner autonomy prioritizes adherence over centralized , enabling the network to propagate even amid localized pressures, as evidenced by Bitcoin's sustained operation without systemic suppression since . The absence of points or trusted intermediaries further bolsters , with reverting to verifiable work over subjective interventions. Bitcoin's implementation exemplifies these properties, achieving 99.99% uptime since its genesis block on January 3, 2009, with no reliance on central infrastructure and only isolated, self-resolving disruptions attributable to voluntary node actions rather than systemic failures. This track record underscores PoW's efficacy in maintaining across a globally distributed set of participants, deterring control by any single entity through the immutable barrier of cumulative work.

51% Attacks and Mitigation

A 51% attack in proof-of-work (PoW) systems occurs when an entity or colluding group acquires control of more than 50% of the network's total hash rate, enabling the potential reversal of recent blocks to double-spend or transactions. This dominance allows the attacker to construct a longer alternative chain, orphaning the honest chain's blocks, but the economic cost escalates nonlinearly with the depth of reversal, as the attacker must recompute all proof-of-work for the targeted blocks while outpacing the honest network's ongoing production. Such attacks have materialized primarily on smaller PoW networks with low hash rates, where renting hash power from pools proves feasible. (), for instance, endured a 51% attack on January 7, 2019, involving a chain reorganization that facilitated a double-spend of approximately $1.1 million in ETC. In 2020, ETC faced three additional attacks in August alone, including one on that double-spent about 800,000 ETC (valued at roughly $5.8 million at the time) via a 399-block reorg, and another enabling a $1.68 million double-spend through a 4,236-block reorganization. These incidents, confined to networks with hash rates orders of magnitude below Bitcoin's, highlight how attackers exploit temporary majority control via rented resources, but the assaults remained short-lived, typically lasting hours, due to detection and response by exchanges delisting or freezing ETC. For dominant networks like , with a rate surpassing 1 zetta per second (/s) as of late 2024, a sustained 51% remains economically unviable. Estimates indicate that acquiring and operating sufficient ASIC hardware, coupled with electricity costs, could exceed $6 billion for a week-long , representing a fraction of 's multi-trillion-dollar yet deterring rational actors due to the risk of devaluing the asset being ed. Empirical evidence underscores PoW's resilience: no successful 51% has compromised a major chain like , with vulnerabilities manifesting only in undersecured altcoins where low barriers enable opportunistic, non-persistent exploits rather than systemic failures. Mitigations in PoW protocols emphasize probabilistic finality and detection over absolute prevention, leveraging the system's design where deeper confirmations amplify reversal costs. Networks recommend waiting for multiple confirmations—typically six for transactions—to reduce double-spend risks, as each additional exponentially increases the attacker's required power advantage. Some implementations, post-attack, incorporate checkpoints—hardcoded references to specific —to cap feasible reorg depths, as explored following its 2020 incidents. Off-chain tools, including explorers and via chain analysis firms, enable rapid identification of forks or unusual rate spikes, prompting interventions like halts by exchanges. Ultimately, the primary deterrent remains economic scale: high network rates, driven by miner incentives, render majority control prohibitively expensive, with attacks proving rare and self-limiting in practice.

Other Security Considerations

Selfish mining, introduced by Ittay Eyal and in their 2013 paper, involves a withholding newly discovered blocks from the network to strategically release them later, potentially orphaning honest miners' blocks and gaining disproportionate rewards. This strategy becomes profitable for the attacker when controlling more than approximately one-third of the network's total hash rate, as it exploits propagation delays and honest behavior to increase the attacker's revenue share beyond its computational proportion. However, below this threshold, the attack's impact remains limited, with empirical simulations showing minimal disruption to the longest-chain rule in Bitcoin's , and no widespread exploitation observed in practice since its proposal. Other vector attacks include the Finney attack, where a miner pre-computes a block containing a double-spend transaction and releases it after spending the same coins in a separate unconfirmed transaction, aiming to invalidate the merchant's acceptance. This is mitigated primarily through requiring multiple block confirmations before considering transactions final, a standard practice in Bitcoin that raises the attack's cost and probability of failure. Similarly, timejacking attempts to manipulate a node's system clock to accept stale or forked blocks by skewing timestamps beyond protocol tolerances, but Bitcoin's rules—enforcing block timestamps within two hours of the network-adjusted time and greater than the median of the prior eleven blocks—effectively prevent acceptance of manipulated chains on honest nodes. Quantum computing poses a theoretical risk via , which offers a for brute-force searches, effectively reducing the security of hash functions like SHA-256 from 256 bits to 128 bits against collision or preimage attacks. For proof-of-work , this could accelerate searches but requires fault-tolerant quantum hardware scaling to billions of qubits, far beyond 2025 capabilities, rendering the threat negligible in the near term. Protocol upgrades, such as migrating to quantum-resistant hash functions, remain feasible without altering core consensus mechanics, unlike vulnerabilities in proof-of-stake systems that have enabled slashing exploits and fake-stake attacks without comparable real-world breaks in proof-of-work networks.

Economic Aspects

Mining Incentives and Rewards

In proof-of-work (PoW) systems, miners are compensated for validating transactions and extending the blockchain through block rewards, which comprise a fixed subsidy of newly created cryptocurrency units and variable transaction fees paid by users. This dual structure, introduced in Bitcoin's design, incentivizes miners to invest resources in honest computation, as the reward is only claimable upon producing a valid proof-of-work that adheres to consensus rules. Deviations, such as attempting to include invalid transactions, result in rejection by the network, forfeiting the reward and associated costs. The block subsidy halves periodically to control issuance, occurring every 210,000 blocks—roughly every four years given Bitcoin's 10-minute target block interval. Following the April 20, 2024, halving at block 840,000, the subsidy stands at 3.125 BTC per block, down from 6.25 BTC. This mechanism ensures a predictable supply cap of 21 million BTC, with halvings continuing until issuance approaches zero around 2140. As subsidies diminish, transaction fees gain prominence, forming a fee market where users bid for inclusion in scarce block space. Fees rise with network demand, as observed during the 2021 bull market when average fees temporarily surpassed $50 amid congestion from heightened activity. This dynamic aligns incentives with user demand, as higher fees compensate for reduced subsidies and encourage efficient prioritization. The system's derives from game-theoretic properties: miners maximize expected revenue by competing to solve puzzles for the longest valid chain, where dishonest strategies like withholding blocks or reorgs yield lower returns than cooperative extension. Empirically, profitability has persisted post-halving through price appreciation offsetting cuts; for instance, hash rate surged 394% from the 2020 halving to late 2023, reflecting sustained economic viability. This resilience underscores how rising asset value and fee contributions maintain miner participation without reliance on external subsidies.

Hardware and Pool Dynamics

Bitcoin mining initially relied on central processing units (CPUs) in 2009, when the network's computational demands were low enough for general-purpose processors to solve blocks effectively. By 2010, graphics processing units (GPUs) surpassed CPUs due to their capabilities suited for the SHA-256 hashing , enabling hash rates in the megahashes per second (MH/s) range compared to CPUs' kilohashes per second (KH/s). Field-programmable gate arrays (FPGAs) emerged around 2011-2012, offering reconfigurable that improved efficiency over GPUs while bridging to more specialized designs. The introduction of application-specific integrated circuits () in early 2013 marked a pivotal shift, with the first commercial ASIC miner released in January using 130-nm technology, followed by 's Antminer S1 in November achieving 180 gigahashes per second (GH/s) at 80-200 watts. delivered over 1,000-fold efficiency gains relative to prior , measured in joules per terahash (J/TH), by optimizing solely for SHA-256 computations, rendering GPUs and FPGAs obsolete for . This specialization concentrated production among a few manufacturers like and , though emerging open-source ASIC designs, such as Bitaxe for solo and custom SHA-256 accelerators using open tools, aim to lower barriers and enhance verifiability. Mining pools emerged to mitigate the high variance in solo rewards, aggregating individual rates for more frequent, proportional payouts. The Pay-Per-Last-N-Shares (PPLNS) model, common in pools like Slush Pool, credits miners based on their shares in the last N valid submissions before a block is found, reducing short-term luck fluctuations and discouraging opportunistic "pool hopping." However, pool concentration poses risks to , as seen in 2023 when Foundry USA and Antpool collectively exceeded 50% of global rate for extended periods, theoretically enabling coordinated 51% attacks despite operators' incentives against disruption. By mid-2025, these two pools controlled over 51% at times, amplifying concerns over potential or double-spends if collusion occurred. China's 2021 , enforced through provincial crackdowns by mid-year, displaced over 50% of global hash rate, prompting a geographic redistribution that bolstered metrics. The captured over 40% of hash rate by late 2024, with accounting for about 28.5% of U.S. capacity due to favorable energy policies and infrastructure. This shift reduced reliance on single jurisdictions, though Chinese pools retained influence over 55% of delegated hash rate via remote participants. Pools facilitate small-scale participation amid ASIC dominance, allowing decentralized reward distribution while hash rate transparency via explorers verifies overall network health.

Long-Term Viability

Bitcoin's block halvings will continue until approximately 2140, after which miners will rely exclusively on transaction fees for revenue, marking the end of inflationary rewards. This shift raises questions about , as miner incentives must align with covering operational costs without support. Empirical data from 2025 shows transaction fees comprising less than 5% of total miner revenue during low-demand periods, with quarterly figures around 1.33% in early 2025, though fees can surge to over 50% during events like those driven by inscriptions or layer-2 settlements. If fees fail to scale with hash rate costs in the post- era, unprofitable mining could trigger miner exodus, reducing computational and vulnerability to attacks until difficulty adjusts downward. Historical patterns reveal a strong positive between Bitcoin's and mining profitability, with hash rates expanding during bull markets and contracting modestly in bears before recovering. For instance, in the 2022 bear market, hash rates dipped amid capitulation but grew 23% in the first half of the year despite declines, rebounding fully with subsequent and appreciation. This dynamic adjustment—where lower hash rates restore per-unit profitability—has preserved integrity across multiple halving cycles since 2012, as increases offset subsidy reductions by enhancing the fiat value of rewards. Such resilience stems from causal linkages: sustained demand for Bitcoin's layer incentivizes higher fees, tying to real economic value rather than fixed issuance. Critics contend that fee markets may prove insufficient for baseline security without subsidies, potentially leading to under-secured chains, but evidence from subsidy dilutions (e.g., post-2024 halving) shows voluntary miner contributions persisting via price-mediated equilibria. Unlike proof-of-stake, where security derives from pre-committed stakes subject to slashing risks and potential centralization via large holders, proof-of-work's ongoing cost-of-attack model evolves with market participation, fostering adaptability absent in stake-based dilution or validator cartels. Projections assuming exponential adoption—via scaling solutions like —suggest fees could support hash rates exceeding current levels if transaction volume grows proportionally to network value, though this remains contingent on verifiable demand growth rather than assumptions of perpetual subsidy equivalence.

Criticisms and Debates

Energy Consumption Analysis

The Bitcoin network, the largest proof-of-work system, consumed an estimated 162 terawatt-hours (TWh) of electricity annually as of 2024, based on the Cambridge Centre for Alternative Finance's Bitcoin Electricity Consumption Index (CBECI), which provides lower and upper bound estimates ranging from 138 TWh to 172 TWh. This consumption level equates to approximately 0.6% of global electricity usage and is comparable to the annual electricity demand of mid-sized countries like the Netherlands or Argentina. Estimates vary across methodologies; for instance, the Digiconomist index reports higher figures around 200 TWh, but Cambridge's approach, incorporating miner surveys and hardware data, is considered more conservative and empirically grounded. Mining hardware efficiency has advanced dramatically, reducing energy requirements per unit of computational work. Network-wide efficiency improved from roughly 5,000,000 joules per terahash (J/TH) in early CPU/GPU eras around to an average of 28.2 J/TH by mid-2024, reflecting over 99% gains through specialized ASIC chip developments and optimizations like . These improvements paradoxically increase total consumption, as the protocol's difficulty adjustment raises hash rate targets to maintain 10-minute intervals, ensuring computational scales with available technology. A significant portion of Bitcoin mining draws from renewable and underutilized sources. data indicate that —42.6% renewables plus 9.8% —comprised 52.4% of the mix in 2023-2024 surveys, up from prior estimates amid shifts to hydro- and wind-rich regions. Miners preferentially site operations near stranded or excess energy, such as flared in oil fields or curtailed renewables, monetizing that grids cannot otherwise absorb due to or limits. This utilization aligns with proof-of-work's demand-response nature, where interruptible loads absorb surplus generation without subsidies, though total consumption remains tied to imperatives rather than fixed caps, as underutilization of heightens vulnerability to attacks like 51% dominance.

Environmental Impact Assessments

Bitcoin mining's carbon footprint has been estimated at approximately 130 million metric tons of CO2 equivalent annually as of 2024, representing about 0.35% of global emissions. This share aligns with broader cryptocurrency mining's contribution of nearly 1% of global emissions, per analysis, though Bitcoin dominates PoW networks. Comparative assessments indicate Bitcoin's emissions are less than half those of global , which produces around 240-250 million metric tons annually, and significantly lower than the banking sector's footprint when including data centers, branches, and ATMs. PoW mining has driven positive environmental outcomes by incentivizing renewable energy integration and grid stability. In Texas, Bitcoin operations from 2021 to 2024 utilized flexible demand to absorb excess renewable output, particularly wind and solar, reducing curtailments and stabilizing the ERCOT grid while saving an estimated $18 billion in costs and avoiding emissions from peaker plants. This dynamic load-balancing has repurposed stranded or flared energy sources, such as natural gas in the Permian Basin, into productive use without net increases in fossil fuel dependency. Critics highlight from obsolete , with estimates of up to 30-64 metric kilotons annually, equivalent to small-scale IT discards. However, ASIC longevity exceeds prior assumptions, often spanning 7-10 years with low failure rates of 3-5%, minimizing actual disposal volumes. infrastructure for hardware is advancing, with specialized firms recovering valuable components like chips and metals, though global rates remain inconsistent; unlike proof-of-stake systems, PoW's hardware transparency allows verifiable e-waste tracking absent in less auditable alternatives. Empirical data show no causal evidence of net ecological harm from PoW, as its incentives promote innovations and financial systems enabling inclusion in underserved regions, offsetting localized impacts through broader utility.

Comparisons with Proof of Stake

Proof of work (PoW) establishes consensus through verifiable computational effort rooted in physical laws, requiring participants to expend real-world resources like and , which objectively measures commitment and secures against alterations without equivalent . In contrast, (PoS) selects validators based on the size of their holdings or staked assets, relying on economic disincentives such as slashing (penalizing misbehavior by confiscating stake) rather than physical proof, which introduces subjectivity as validation depends on perceived future value and incentives rather than immutable work. This distinction leads proponents of PoW to argue it provides a more robust, tamper-evident history, as rewriting the chain demands proportional energy expenditure, whereas PoS's model can incentivize validators to support multiple conflicting forks without physical —a known as the "nothing-at-stake" problem, where rational actors might endorse all branches to maximize rewards absent strong penalties. PoS systems face heightened centralization risks due to stake concentration in few entities, exemplified by Lido's control of approximately 24% of Ethereum's staked ETH as of October 2025, with total staked ETH reaching 35.7 million amid ongoing concerns over plutocratic tendencies where wealthier participants dominate validation. Such dynamics contrast with PoW's broader hardware accessibility, though both mechanisms can see pool concentration; however, PoW's physical barriers prevent easy stake replication, while PoS staking amplifies influence for those with pre-existing capital, potentially undermining decentralization. Critics of PoS highlight that slashing mechanisms, intended to deter malice, have proven fallible in practice, with incidents like the November 2023 slashing of 99 Ethereum validators due to operational errors resulting in ~100 ETH losses, and a September 2025 mass slashing of 39 validators from human mistakes, each incurring ~0.3 ETH penalties plus inactivity leaks. Empirically, PoW networks like have maintained uninterrupted operation since 2009, securing over 59% of the total as of mid-2025 without successful long-range attacks, attributing to the objective cost of computation that aligns incentives with network preservation. PoS advocates counter that their model avoids PoW's demands—Ethereum's 2022 Merge to reduced consumption by 99.95%—and enables via mechanisms like sharding, though actual throughput gains post-Merge have relied on layer-2 rollups rather than PoS itself, with base-layer transaction speeds remaining limited. Debates in 2024 and 2025, including analyses in , emphasize PoW's superiority for censorship resistance due to geographically distributed tied to markets, arguing that PoS's economic abstractions invite or , while PoS proponents claim lower barriers foster broader participation, despite evidence of persistent centralization in dominant chains.

Recent Developments and Impact

Regulatory Perspectives

In March 2025, the U.S. Securities and Exchange Commission's Division of Corporation Finance issued a statement clarifying that certain proof-of-work (PoW) mining activities on public, permissionless blockchains—specifically, protocol where miners validate transactions intrinsic to the network's function—do not constitute the offer or sale of securities under . This guidance, released amid a pro-crypto shift following the administration's , reduced prior uncertainties that had classified some operations as investment contracts, thereby facilitating operations for U.S.-based firms without securities registration requirements. China's 2021 crackdown on , enacted through a series of prohibitions culminating in September, effectively banned PoW operations nationwide, citing and risks, which prompted a rapid global redistribution of hash rate to regions like and . The European Union's (MiCA) regulation, fully effective from December 2024, adopts a technology-neutral stance on mechanisms like PoW but imposes disclosure requirements on crypto-asset service providers, mandating reporting of energy use and climate impacts to address environmental scrutiny without outright restrictions. In contrast, has implemented incentives to promote PoW mining's integration with energy markets, including a 2023 severance under HB 591 for producers diverting flared or vented to power mining rigs, reducing emissions by up to 63% compared to flaring alone. Federally, Senator Ted Cruz's FLARE Act, introduced in April 2025, proposes tax credits for utilizing flared gas in mining, recognizing PoW's potential to monetize otherwise wasted energy resources. These developments have collectively diminished regulatory uncertainty, countering earlier fears of enforcement actions and fostering increased investment in PoW infrastructure, as evidenced by hash rate migrations and policy-driven expansions in supportive jurisdictions.

Technological Innovations

In 2023, the Stratum V2 protocol was advanced to improve decentralization by enabling individual miners to construct their own candidate blocks, reducing central pool control over transaction selection and enhancing resistance to . This upgrade, building on prior versions, incorporates and mechanisms to secure miner-pool communications, with reference implementations and roadmaps released that year to facilitate broader adoption. Proof-of-useful-work (PoUW) proposals gained traction as alternatives to traditional PoW, redirecting computational effort toward practical problems; a September 2023 study in Nature demonstrated a PoW adaptation for optimizing multi-location product distribution in logistics, where mining solves routing tasks to validate blocks while yielding real-world utility. Such hybrid mechanisms aim to mitigate PoW's perceived wastefulness without compromising security, though scalability in complex optimizations remains under evaluation. Hardware efficiency progressed with next-generation ASIC miners, such as the Antminer S21 series, achieving hash rates exceeding 200 TH/s at under 20 J/TH by 2025, driven by advancements and -assisted design optimizations for . Miners increasingly adopted tools for predictive hashprice modeling and dynamic load balancing, as seen in platforms like Luxor's , to maximize profitability amid fluctuating electricity costs. Research into quantum-resistant hashing intensified, with explorations of lattice-based and hash-based functions to fortify PoW against threats, though SHA-256's quadratic vulnerability has prompted hybrid proposals like proof-of-quantum-work requiring quantum hardware for . These efforts, documented in 2023-2025 preprints, focus on maintaining PoW's while preparing for scalable quantum threats. Following the April 2024 Bitcoin halving, which halved block rewards to 3.125 BTC, miners adapted by emphasizing transaction fee capture and integrating layer-2 solutions; the processed off-chain payments, reducing on-chain transaction volume by enabling high-throughput channels that settle periodically, thus alleviating main-chain congestion and supporting fee sustainability. 's global hashrate reached a of 1.442 ZH/s on September 20, 2025, at block 915,533, reflecting network resilience and miner investments in efficient infrastructure despite reduced subsidies.

Role in Modern Blockchain Ecosystems

Bitcoin maintains its position as the foundational store-of-value asset in blockchain ecosystems, securing a exceeding $2 trillion as of October 2025 through consensus alone. This scale demonstrates PoW's capacity to underwrite vast economic value in decentralized networks, providing irreversible transaction finality and resistance to attacks without reliance on trusted intermediaries. DeFi protocols on Bitcoin-compatible sidechains and layer-2 networks increasingly tap into PoW's security for applications like lending, staking, and derivatives, enabling native BTC participation in yield-bearing activities. Solutions such as and emerging cross-chain bridges extend Bitcoin's hash power to execution, mitigating scalability limits while preserving the base layer's adversarial robustness. This BTCfi expansion, anticipated to accelerate in 2025, contrasts with PoS-dominant ecosystems by inheriting decentralized incentives over validator staking pools. PoW exhibits empirical advantages in countering centralization pressures debated in 2024, where networks faced scrutiny for stake concentration enabling potential among top holders—evident in Ethereum's post-merge. Bitcoin's permissionless model disperses across global hardware participants, yielding superior performance in adversarial settings with zero successful core-layer exploits despite sustained state-level opposition. Such underpins uncensorable money transfers, as tracked by rising active addresses and secured transaction volumes in 2025. Prospective integrations position PoW for niche roles in security-critical domains, including IoT ecosystems requiring tamper-proof computation for device authentication and amid sybil threats. Quantitative metrics like sustained hash rate escalation and attack cost thresholds affirm PoW's edge over in hostile environments, favoring its endurance for high-stakes despite energy critiques.

References

  1. [1]
    [PDF] A Peer-to-Peer Electronic Cash System - Bitcoin.org
    The proof-of-work involves scanning for a value that when hashed, such as with SHA-256, the hash begins with a number of zero bits.
  2. [2]
    [PDF] Pricing via Processing or Combatting Junk Mail
    Cynthia Dwork. Moni Naor y. Abstract. We present a computational technique for combatting junk mail, in particular, and controlling access to a shared resource ...Missing: original | Show results with:original
  3. [3]
    Understanding Proof of Work (PoW) in Blockchain: Key Mechanism ...
    Proof of work (PoW) is a consensus mechanism used by cryptocurrencies like Bitcoin to validate transactions and secure the blockchain. Mining in PoW requires ...What Is Proof of Work (PoW)? · Proof of Work vs. Proof of Stake
  4. [4]
    Proof of Work vs. Proof of Stake in Cryptocurrency - ResearchGate
    This research document demonstrates the understanding of two key elements: Proof of Work (PoW) and Proof of Stake (PoS) within cryptocurrency.
  5. [5]
    Tracking electricity consumption from U.S. cryptocurrency mining ...
    Feb 1, 2024 · Our preliminary estimates suggest that annual electricity use from cryptocurrency mining probably represents from 0.6% to 2.3% of US electricity consumption.
  6. [6]
    A systematic literature review on proof-of-useful work consensus ...
    Sep 12, 2025 · A detailed investigation highlights the advantages and disadvantages of each study. Keywords. Decentralized systems. Blockchain. Consensus.
  7. [7]
    RPOW - Reusable Proofs of Work - Satoshi Nakamoto Institute
    Reusable Proof-of-Work (RPOW) was invented by Hal Finney intended as a prototype for a digital cash based on Nick Szabo's theory of collectibles.
  8. [8]
    Bitcoin Genesis Block - Blockchain.com Explorer | BCH | ETH | BCH
    Jan 3, 2009 · The Bitcoin Genesis block was mined on January 3, 2009, by Satoshi Nakamato, creating the network. The 50 bitcoin reward is unredeemable.
  9. [9]
    The Evolution of Bitcoin Mining Hardware: From CPUs to ASICs and ...
    Oct 3, 2025 · Discover the evolution of Bitcoin mining hardware, from CPUs and GPUs to ASICs, chip advances, cooling systems, and the future of modular ...
  10. [10]
    [PDF] An overview of Litecoin and its use cases - Fidelity Digital Assets
    Oct 9, 2011 · One material difference between Litecoin and Bitcoin is the use of Scrypt in Litecoin's proof-of- work algorithm instead of SHA-256. This ...
  11. [11]
    scrypt - Wikipedia
    It was first implemented for Tenebrix (released in September 2011) and served as the basis for Litecoin and Dogecoin, which also adopted its scrypt algorithm.Introduction · Overview · Algorithm · Cryptocurrency uses
  12. [12]
    The Merge - Ethereum.org
    The Merge was executed on September 15, 2022. This completed Ethereum's transition to proof-of-stake consensus, officially deprecating proof-of-work and ...Missing: ProgPoW | Show results with:ProgPoW
  13. [13]
    RandomX | Moneropedia | Monero - secure, private, untraceable
    RandomX is a Proof Of Work algorithm developed by Monero contributors and adopted by Monero from release 0.15. This innovative POW is optimized for CPUs.Missing: date 2019 resistant
  14. [14]
    Bitcoin Hashrate Chart 2021 - CoinWarz
    Current Bitcoin Hashrate. Bitcoin Global Hashrate 1,375.25 EH/s. Bitcoin Hashrate All Time High. Bitcoin Hashrate on Sep 20, 2025 at block 915,533 1,441.84 EH/s ...
  15. [15]
    Bitcoin Hashrate Chart - BitInfoCharts
    Bitcoin Hashrate historical chart. Average hashrate (hash/s) per day | 1.27 Z hash/s +9.37% in 24 hours. Share:. Hashrate. Bitcoin - Hashrate.
  16. [16]
    What is Proof of Work? Security, mining, and trade-offs explained
    Rating 5.0 (150) · Free · iOSPoW provides Sybil resistance and consensus in a permissionless environment. By tying block production to real-world computational costs, PoW makes it ...<|control11|><|separator|>
  17. [17]
    [PDF] On-Demand PoW Light Client with Constant-Size Storage for DeFi
    Aug 11, 2023 · to verify which chain carries the most Proof-of-Work (PoW). ... by solving a cryptographic puzzle that is hard to compute and easy to verify.
  18. [18]
    [PDF] Lecture 6: Safety of Bitcoin
    Feb 11, 2021 · In modeling the mining process as a Poisson process, we focus only at the times at which new, valid blocks are created. The Poisson process ...
  19. [19]
    Proof of Work vs. Proof of Stake: Why Their Differences Matter
    Oct 5, 2022 · A Sybil resistance mechanism protects the network against Sybil attacks in which an attacker seeks to gain control over the network by amassing ...
  20. [20]
    Partial pre-image attack on Proof-of-Work based blockchains
    SHA-256 [3] was proven secure against all known attacks on hashing functions, except for, trivially, the brute-force attack [28], [29]. Specifically, the lower ...
  21. [21]
    SHA-256: The Backbone of Bitcoin's Proof-of-Work Mining - GoMining
    SHA-256 is a cryptographic hash function that secures Bitcoin's blockchain. Learn how it powers Bitcoin mining and ensures the integrity of transactions in ...
  22. [22]
    Ethash - Ethereum.org
    Memory hardness is achieved with a proof of work algorithm that requires choosing subsets of a fixed resource dependent on the nonce and block header. This ...
  23. [23]
    ASIC-Resistance in Crypto Mining: Is it possible? - Nervos Network
    Apr 11, 2023 · The mining algorithm used to mine Ethereum from 2015 to 2022, Ethash, is an example of a memory hard function. It required a large amount of ...
  24. [24]
    Proof-of-Work Hash Functions | Practical Cryptography for Developers
    Jun 19, 2019 · ETHash is the proof-of-work hash function in the Ethereum blockchain. It is memory-intensive hash-function (requires a lot of RAM to be ...<|separator|>
  25. [25]
    [PDF] Bandwidth Hard Functions for ASIC Resistance
    The standard approach towards ASIC resistance today is through memory hard functions or memory hard proof of work schemes. However, we observe that the memory ...
  26. [26]
    Difficulty adjustment algorithms - Bitcoin Optech
    Bitcoin's DAA attempts to keep the average time between blocks at approximately one block every ten minutes. It uses timestamps contained within block headers ...
  27. [27]
    Difficulty adjustment - Onramp Bitcoin
    Mar 18, 2024 · The adjustment factor applied every 2,016 blocks is proportional to the difference between the actual time taken and and the desired time of two ...
  28. [28]
    Charts - Network Difficulty - Blockchain.com
    Notes. The difficulty is adjusted every 2016 blocks (every 2 weeks approximately) so that the average time between each block remains 10 minutes.
  29. [29]
    The Impact of China's Ban on Bitcoin Mining on the Market - GoMining
    Aug 26, 2025 · When the ban took effect, Bitcoin's hash rate fell by almost half within weeks. Charts that had shown steady growth suddenly cratered ...
  30. [30]
    Assessing carbon emissions from bitcoin mining in China
    1). The analysis shows that China stands as a significant contributor to the global Bitcoin mining hash rate, accounting for over half of the total hash rate ...
  31. [31]
    Bitcoin mining difficulty sees biggest drop since 2021 China ban ...
    Jun 29, 2025 · The difficulty decline represents the biggest drop since July 2021 during the aftermath of China's bitcoin mining ban, when it fell 28%, and ...
  32. [32]
  33. [33]
    Block Chain - Bitcoin.org
    Block headers are serialized in the 80-byte format described below and then hashed as part of Bitcoin's proof-of-work algorithm.Missing: double components<|separator|>
  34. [34]
    Proof of Work in Bitcoin. No floating point number used | by sCrypt
    Feb 27, 2024 · The hash function used by Bitcoin is double SHA-256, which produces a 256-bit hash value. Miners generate hash values by combining the block ...
  35. [35]
    Block | A Container for Bitcoin Transactions
    Aug 30, 2025 · A block hash is created by double-SHA256'ing the block header. The block hash is a unique identifier for a block, which has two benefits: The ...Missing: components | Show results with:components
  36. [36]
    Merkle Root | A Fingerprint for the Transactions in a Block
    Aug 5, 2025 · How do you create a merkle root? A merkle root is created by hashing TXIDs in a tree-like structure. Hash the TXIDs together in pairs.
  37. [37]
    51% Attack in Crypto: Can Bitcoin Be Hacked? (2025 Update)
    Sep 17, 2025 · Bitcoin's network has never suffered a 51% (majority) attack—proof that its scale, economic incentives, and active community make such ...
  38. [38]
    The 51 Percent Attack: When Consensus Becomes Control
    Jul 2, 2025 · Has Bitcoin ever suffered a 51% attack? The Bitcoin network has never been successfully compromised by a 51% attack. Its immense and ...
  39. [39]
    Charts - Total Hash Rate (TH/s) - Blockchain.com
    Total hash rate is the estimated terahashes per second the Bitcoin network performs in 24 hours, a key security metric. A 7-day average is better due to ...Missing: 2021 | Show results with:2021
  40. [40]
    Does a higher hashrate strengthen Bitcoin network security?
    Jun 5, 2024 · This study tests the causal relationship between the hashrate and the security outcome of the Bitcoin blockchain.
  41. [41]
    Next Bitcoin Halving: March 26th, 2028 History and What to Know!
    May 11, 2020 — Reward down: 12.5 BTC to 6.25 BTC. 4th Bitcoin halving date — April 19, 2024 — Reward down: 6.25 BTC to 3.125 BTC. 5th ...
  42. [42]
    The history of Bitcoin halving: Timeline and 2024 insights | Kraken
    Sep 4, 2024 · April 20, 2024, Fourth Bitcoin halving: Reduced to 3.125 BTC​​ On April 20, 2024, bitcoin underwent its fourth programmed halving event. This ...
  43. [43]
    Litecoin Foundation
    Litecoin uses Scrypt Proof of Work (PoW), with parameters `N=1024`, `r=1` and `p=1`. The `salt` is the same 80 bytes as the input. The output is 256bits (32 ...
  44. [44]
    Litecoin - an overview | ScienceDirect Topics
    It operates on an open-source global payment network, utilizing scrypt cryptography for Proof of Work, offering faster transaction confirmation times compared ...
  45. [45]
    Dogecoin Community Celebrates as Merge Mining with Litecoin ...
    Sep 11, 2014 · Following months of debate, Dogecoin is now officially being merge mined with litecoin. By Stan Higgins. Updated Mar 6, 2023, 7:27 a.m. ...
  46. [46]
    Case Study: Merged Mining in Dogecoin & Litecoin - Binance
    Jul 12, 2019 · Created in December 2013, Dogecoin (DOGE) adopted the merged mining model in August 2014. Within one month, Dogecoin's hashrate/mining ...
  47. [47]
    RandomX: New Monero Mining Algorithm - 2Miners
    Nov 12, 2019 · RandomX is a Proof-Of-Work algorithm optimized for general-purpose GPUs and CPUs. Its main feature is random code execution (hence the name) together with ...Missing: introduction | Show results with:introduction<|separator|>
  48. [48]
    What is Ravencoin? - NiceHash
    Sep 1, 2021 · KAWPOW algorithm helps Ravencoin stay ASIC resistant and only minable with GPUs, which helps decentralization. It does so by utilizing the ...
  49. [49]
    Ravencoin Wiki
    To avoid centralized ASIC mining of Ravencoin, the developers created a new algorithm, X16R (FR, KR, DE). ... Ravencoin network and moved to KAWPOW. KAWPOW is a ...
  50. [50]
    Top Proof of Work cryptocurrencies - Mineable coins & algorithm
    Sep 9, 2023 · In 2021 according to Coin Market Cap there are close to 10000 cryptocurrencies. Out of all there are only 500 cryptocurrencies that uses Proof ...
  51. [51]
    2024 Crypto Mining Review and 2025 Trend Outlook - ViaBTC
    Jan 21, 2025 · The Bitcoin network's hashrate grew by 51% in 2024. Although the ... Bitcoin remains the dominant PoW coin, accounting for over 90% of ...
  52. [52]
    [PDF] Proofs of Useful Work - Cryptology ePrint Archive
    We construct a Proof of Useful Work (uPoW) scheme based on the Orthogonal Vectors (OV) problem, which is a well-studied problem that is conjectured to take n2−o ...
  53. [53]
    [2209.03865] Challenges of Proof-of-Useful-Work (PoUW) - arXiv
    Sep 8, 2022 · Proof-of-Useful-Work (PoUW) is an alternative approach which aims to replace excessive usage of hash functions with tasks that bring additional real-world ...
  54. [54]
    [PDF] Cryptocurrency with Prime Number Proof-of-Work - Primecoin
    Jul 7, 2013 · Abstract. A new type of proof-of-work based on searching for prime numbers is introduced in peer-to-peer cryptocurrency designs.
  55. [55]
    Primecoin: The Cryptocurrency Whose Mining Is Actually Useful
    Jul 8, 2013 · Primecoin is the first proof-of-work based cryptocurrency that has come up with any kind of workable solution.<|separator|>
  56. [56]
    Primecoin - Cryptocurrency with Useful PoW Consensus - GitHub
    Primecoin's proof-of-work is an innovative design based on searching for prime number chains, providing potential scientific value in addition to minting and ...
  57. [57]
    Adapting blockchain's proof-of-work mechanism for multiple ... - Nature
    Sep 6, 2023 · In this paper, we proposed a blockchain network for distributing products to different locations based on the use of the Proof of Useful Work mechanism.
  58. [58]
    Introducing Ofelimos: a proof-of-useful-work consensus protocol
    Aug 15, 2022 · Proof of useful work addresses the problem of energy efficiency by repurposing the computational effort required to maintain protocol security ...
  59. [59]
    [PDF] SoK: Is Proof-of-Useful-Work Really Useful?
    A particularly appealing mechanism is Proof-of-Useful Work (PoUW), which seeks to repurpose computational effort for valuable tasks for the real world, such as.
  60. [60]
    DPoW: A decentralized proof-of-work consensus mechanism for ...
    Proof of Work (PoW) serves as a consensus mechanism in blockchain that verifies and selects the next node through solving computationally intensive puzzles.
  61. [61]
    What is Sybil Resistance in Blockchain? Understanding Sybil Attacks
    Mar 4, 2024 · Sybil-resistant designs encompass various mechanisms to deter Sybil attacks within blockchain networks. These mechanisms impose economic costs ...
  62. [62]
    What is a Sybil Attack | Examples & Prevention - Imperva
    Economic costs can work as artificial barriers to entry that make a sybil attack much more expensive. For example, requiring investments in resources like stake ...
  63. [63]
    [PDF] Game theoretical framework for analyzing Blockchains Robustness
    May 27, 2020 · Proof. A strong equilibrium is a Nash equilibrium and fulfills the property ui(σC,σ−C) ≥ ui(τC,σ−C).
  64. [64]
    [PDF] Energy Equilibria in Proof-of-Work Mining
    Jun 28, 2019 · The Bitcoin protocol induces miners, through monetary rewards, to expend energy in order to add blocks to the chain.
  65. [65]
    Bitcoin: Censorship Resistance Against Hash Dominance
    Apr 23, 2024 · This paper analyzes Bitcoin's resistance to censorship, proving that Proof of Work defenses are capable of resisting attacks regardless of hash ...
  66. [66]
    Censorship Resistance - River Financial
    Bitcoin is censorship resistant in the sense that no single entity has the ability to reverse a Bitcoin transaction or blacklist a wallet or address.
  67. [67]
    Bitcoin Uptime Tracker (Network Status Live) - Bitbo
    99.98996441232%. of the time since its inception on January 3, 2009 at 02:54:25 GMT. Uptime tracker desktop image Uptime tracker ...
  68. [68]
    What is a 51% Attack on Blockchain? Risks, Examples, and Costs ...
    A 51% attack occurs when an entity controls more than half of a blockchain's computing power, potentially altering transactions and blocking new ones. These ...What Is a 51% Attack? · How 51% Attacks Affect... · Are the Odds Growing?
  69. [69]
    51% Attacks - MIT Digital Currency Initiative
    An attacker could double-spend through a 51% attack in which the attacker amasses a majority of the hashrate on the target cryptocurrency.
  70. [70]
    51% Attack: The Concept, Risks & Prevention - Hacken.io
    Jun 26, 2025 · A 51% attack is an attack on a blockchain network where a single entity gains control of more than half (51%) of its staking or computational power.
  71. [71]
    Ethereum Classic (ETC) Hit by Double-Spend Attack Worth $1.1 ...
    Jan 8, 2019 · The heist resulted in the loss of $1.1 million worth of the Ethereum Classic digital currency. The digital currency immediately fell in price after the news ...
  72. [72]
    Ethereum Classic Hit by Third 51% Attack in a Month - CoinDesk
    Aug 29, 2020 · The Ethereum Classic blockchain suffered a 51% attack Saturday evening, its third such attack this month, noticed by mining company Bitfly.
  73. [73]
    Coinbase's perspective on the recent Ethereum Classic (ETC ...
    Aug 21, 2020 · At 10:57 PM PST 7/31/2020, Ethereum Classic (ETC) was 51% attacked resulting in ~800,000 ETC (~$5.8 million) of double spend transactions. At 8: ...
  74. [74]
    Ethereum Classic Attacker Successfully Double-Spends $1.68M in ...
    Aug 7, 2020 · Ethereum Classic’s second 51% attack Thursday resulted in a massive reorganization of 4,236 blocks and successful double-spend of $1.68 ...
  75. [75]
    What Is a 51% Attack? - Ethereum Classic
    Nov 21, 2023 · A 51% attack occurs when someone controls 51% of a blockchain's computing power, enabling them to build an alternative chain to perform a ...Missing: definition | Show results with:definition
  76. [76]
    Bitcoin Hashrate Chart - BTC Hashrate 1.086 ZH/s - CoinWarz
    The current Bitcoin hashrate is 1.086 ZH/s, representing the global Bitcoin network hashrate with a mining difficulty of 146.72 T at block height 920,816. View ...
  77. [77]
    Research Shows a Week-Long 51% Attack on Bitcoin Network ...
    Oct 13, 2025 · Cost of a 51% Attack: Professor Campbell Harvey estimates that a successful 51% attack on Bitcoin could cost around $6 billion, which is ...
  78. [78]
    Duke Professor Estimates $6 Billion Needed to Launch 51% Attack ...
    Oct 10, 2025 · ... 51% attack on the Bitcoin blockchain would cost $6 billion, or 0.25% of Bitcoin's $2.4 trillion market cap. According to Bloomberg, the attack ...
  79. [79]
    51% Attacks: How They Work, Ramifications, & Safeguards
    A 51% attack is when bad actors control over 50% of processing power in Proof-of-Work cryptocurrencies to reverse or erase transactions.What is a 51% Attack? · How do 51% Attacks Work? · 51% Attack Example<|separator|>
  80. [80]
    [1311.0243] Majority is not Enough: Bitcoin Mining is Vulnerable
    Nov 1, 2013 · This attack can have significant consequences for Bitcoin: Rational miners will prefer to join the selfish miners, and the colluding group will ...
  81. [81]
    Finney Attacks in Cryptocurrency - ImmuneBytes
    Oct 3, 2023 · Use More Confirmations: One of the most effective ways to mitigate Finney attacks is to wait for a higher number of block confirmations before ...
  82. [82]
    What is Timejacking. The blockchain is not perfect. Though… - NFTing
    Oct 25, 2022 · During a timejacking attack, a hacker alters the network time counter of the node and forces the node to accept an alternative blockchain.
  83. [83]
    Grover's Algorithm and Its Impact on Cybersecurity - PostQuantum.com
    Grover's algorithm is a fundamental quantum computing algorithm that dramatically accelerates unstructured search tasks.
  84. [84]
    BTQ Technologies Demonstrates Quantum-Safe Bitcoin Using NIST ...
    Oct 16, 2025 · Additionally, Grover's algorithm provides quantum computers a quadratic speedup for Bitcoin mining, potentially disrupting the proof-of-work ...
  85. [85]
    [PDF] I Can't Believe It's Not Stake! Resource Exhaustion Attacks on PoS
    In brief, these cryptocurrencies do not adequately validate the proof-of-stake before allocating resources to data received from peers. An attacker can exploit ...
  86. [86]
    The Quotable Satoshi - Fees
    The incentive value when a node finds a proof-of-work for a block could be the total of the fees in the block. View email · Fees, Bitcoin Economics.
  87. [87]
    Understanding Bitcoin Halving: Impact on Price and Investment ...
    The halving process occurs approximately every four years, with the latest event happening on April 20, 2024, reducing the block reward to 3.125 BTC. Halvings ...What Is Bitcoin Halving? · Benefits and Drawbacks · Upcoming Bitcoin Halving
  88. [88]
    Bitcoin Halving Countdown | CoinGecko
    The last bitcoin halving happened on April 20, 2024, at the block height of 840,000. Bitcoin's block reward was reduced from 6.25 to 3.125. Here's a table of ...<|separator|>
  89. [89]
    The Bitcoin Halving explained | EY - Switzerland
    After every 210,000 blocks that these miners add to the chain, the number of Bitcoins they receive as a reward is halved. This happens approximately every four ...
  90. [90]
    Why Are Bitcoin Fees So High? - Arch Lending
    Rating 4.9 (277) Apr 29, 2025 · Bull markets and price rallies: The 2017 and 2021 bull runs both saw average fees temporarily exceed $50. Major market crashes: Sudden price ...Core Factors Driving High... · Fee Calculation Mechanics · Mitigating High Fees
  91. [91]
    Miner competition and transaction fees - ScienceDirect.com
    Transaction fees and the block reward are substitutes in the Bitcoin system to incentivize miners. This is the original idea proposed by Nakamoto (2008), the ...
  92. [92]
    The Economics of a Bitcoin Halving:A Miner's Perspective
    This includes a 40% hash rate decline in 2021 following China's ban on Bitcoin mining. Interestingly, the hash rate has continued its climb, even as BTC ...
  93. [93]
    Bitcoin Halving and Mining Update: Mid-2024 Perspective
    Jul 22, 2024 · The bitcoin halving event in April 2024 reduced the block reward for miners, which is expected to increase bitcoin's price over time due to ...
  94. [94]
    [PDF] The Evolution of Bitcoin Hardware - Michael Taylor
    Sep 2, 2017 · The approximate introduc- tion dates of new mining technologies are indicated: CPUs, GPUs, field-programmable gate arrays (FPGAs), and ...Missing: timeline | Show results with:timeline
  95. [95]
    The Evolution of Mining Hardware from CPU to ASIC | Bitget News
    Aug 29, 2025 · The evolution of mining hardware began with home computer CPU mining at the birth of Bitcoin, experienced the rise of GPU mining and a ...Missing: timeline | Show results with:timeline
  96. [96]
    Solo Mining Bitaxe: Comprehensive Guide to the Open Source ASIC ...
    Jul 10, 2025 · As the first open-source ASIC miner dedicated to solo mining, Bitaxe is redefining what's possible in the world of decentralized mining.
  97. [97]
    Custom ASIC Design for SHA-256 Using Open-Source Tools - MDPI
    Dec 25, 2023 · This work presents a custom ASIC hardware accelerator for the SHA-256 algorithm entirely created using open-source electronic design automation tools.
  98. [98]
    Comparison of mining pools - Bitcoin Wiki
    Dec 10, 2023 · PPLNS - Pay Per Last N Shares. Similar to proportional, but instead of looking at the number of shares in the round, instead looks at the last N ...Operational Pools · Defunct Pools · SPV Mining / Old Bitcoin Core
  99. [99]
    Growing Complexity in Bitcoin Mining Landscape Amidst ...
    Sep 27, 2023 · According to its data, Foundry and Antpool have collectively controlled north of 50% of Bitcoin's hash rate since January 2023. Such ...
  100. [100]
    Bitcoin's Decentralization Under Threat as Mining Pools Control ...
    Aug 20, 2025 · Foundry and AntPool mining pools now control over 51% of Bitcoin's total hashrate, creating potential attack risks · This represents the highest ...
  101. [101]
    Bitcoin mining difficulty drops after hashrate collapse in China - CNBC
    Jul 3, 2021 · Bitcoin mining is now easier and more profitable as algorithm adjusts after China crackdown · More than 54% of bitcoin's hashrate, which is the ...Missing: shift | Show results with:shift
  102. [102]
    U.S. Leads Global Bitcoin Hashrate Growth, Contributing Over 40 ...
    Jan 5, 2025 · Chinese mining pools remain influential despite U.S. advances, commanding an estimated 55% of the global hashrate, according to CryptoQuant CEO ...
  103. [103]
    Where are bitcoin miners in 2023: Texas - CNBC
    Sep 26, 2023 · Texas made up 8.43% of the hashrate in the U.S as of the end of 2021, and that percentage has grown to 28.50% as of July 27, 2023.Missing: shift | Show results with:shift
  104. [104]
    Crypto Mining Pools Overview: How They Work, Benefits, and Risks
    May 21, 2024 · Many mining pool operations develop reward structures to discourage pool hopping, like Pay-Per-Last-N-Shares (PPLNS) or score-based payouts.How Crypto Mining Pools Work · Benefits Of Crypto Mining... · Risks Of Crypto Mining Pools
  105. [105]
    What Happens After All Bitcoin Are Mined? - River Financial
    When the halving happens, miners' income is cut in half, which could make mining less profitable. This could lead some miners to stop mining, which might affect ...
  106. [106]
    Q1 2025 Bitcoin Data Special - Coin Metrics State of the Network
    Mar 25, 2025 · So far in Q1 2025, miner revenues sit at a healthy ~$3.6B, with transaction fees accounting for merely 1.33% of total revenue, while the 30D ...Missing: percentage | Show results with:percentage<|separator|>
  107. [107]
    Bitcoin Transaction Fee % of Total Miner Revenue - The Block
    Miner revenue takes into account inflation rewards (block subsidy) and transaction fees. Miners are paid rewards in the blockchain's native currency for ...
  108. [108]
    The Fee Drought: Challenges and Scenarios for Bitcoin's Mining ...
    Sep 18, 2025 · For most of 2025, transaction fees have accounted for less than 1% of total block rewards, the lowest share in years. This “fee drought” has ...Missing: percentage | Show results with:percentage
  109. [109]
    Bitcoin Hashrate & Price - Bitbo Charts
    The idea behind this chart is to illustrate any correlation between the price of bitcoin (shown in green) and the hashrate (shown in purple).
  110. [110]
    2022 Mid-Year Bitcoin Mining Update - Galaxy
    Aug 25, 2022 · In the first half of 2022, the 10-Day Moving Average hashrate grew 23% from 174.9 EH to 215.9 EH. Miners have generated $6.1bn of total mining ...
  111. [111]
    These Six Charts Show How Bitcoin Mining Is Enduring The Bear ...
    Dec 7, 2022 · The annotated line chart below shows normalized hash rate growth during the 2018 and 2022 bear markets from bitcoin's price peak to the ...Missing: recovery | Show results with:recovery
  112. [112]
    What Happens After All 21 Million Bitcoins Are Mined? - EZ Blockchain
    Oct 14, 2025 · Miners will no longer receive newly minted BTC as block rewards, relying entirely on transaction fees to maintain profitability. This change ...
  113. [113]
    What happens when all bitcoins are mined? Can on-chain ... - Binance
    Jul 25, 2025 · After 2140, block subsidies will no longer exist. · The gradual decrease in mining rewards raises questions about Bitcoin's long-term security, ...Missing: projections | Show results with:projections
  114. [114]
    Cambridge Blockchain Network Sustainability Index: CBECI
    It is therefore safe to assume that the cumulative consumption figure listed above provides a robust estimate of Bitcoin's total consumption since its inception ...
  115. [115]
    CBECI: Comparisons - Cambridge Centre for Alternative Finance
    The goal of this page is to make Bitcoin's electricity usage more tangible and meaningful for a diverse audience by comparing it to other uses of electricity.
  116. [116]
    Bitcoin Energy Consumption Index - Digiconomist
    The Bitcoin Energy Consumption Index provides the latest estimate of the total energy consumption of the Bitcoin network.
  117. [117]
    Cambridge Digital Mining Industry Report: Global Operations ...
    Bitcoin mining hardware efficiency saw a 24% year-on-year improvement, reaching an estimated 28.2 J/TH by June 2024. 2. Rising electricity consumption.
  118. [118]
    Bitcoin Mining Efficiency: The Road From 5,000,000 to 5 J/TH (And ...
    Aug 18, 2024 · By the second half of 2025, we aim to release mining rigs with energy efficiencies at or below 5 J/TH—three times more efficient than the best ...Missing: 2010 | Show results with:2010
  119. [119]
    CBECI: Methodology - Cambridge Centre for Alternative Finance
    Figure 1: Evolution of bitcoin mining equipment efficiency​​ Note: A 1,000 W mining device that generates 10 Th/s has an efficiency of 100 J/Th. This chart is ...
  120. [120]
    Cambridge study: sustainable energy rising in Bitcoin mining
    Apr 28, 2025 · The use of sustainable energy sources for Bitcoin mining has grown to 52.4% finds a new study by Cambridge Judge Business School.
  121. [121]
    Rethinking bitcoin's energy use through sustainable digital business ...
    According to the results, it is clear that BTC mining can absorb excess energy, balance energy grids and support renewable energy integration, ultimately ...
  122. [122]
    Bitcoin Mining and the Environment - Michael Saylor
    1. Bitcoin Energy Utilization: Bitcoin runs on stranded, excess energy, generated at the edge of the grid, in places where there is no other demand, at times ...
  123. [123]
    Do bitcoin electricity consumption and carbon footprint exhibit ...
    It has also been anticipated that the increasing level of yearly Bitcoin energy use will peak at 296.59 TWh along with carbon emissions of 130.50 Mt in 2024 ( ...
  124. [124]
    Carbon Emissions from AI and Crypto Are Surging and Tax Policy ...
    Aug 15, 2024 · Crypto mining and data centers now account for 2 percent of global electricity use and nearly 1 percent of global emissions, and their footprint is growing.
  125. [125]
    A Comparison Of Bitcoin's Environmental Impact With That Of Gold ...
    May 4, 2021 · Bitcoin consumes/emits less than half of what the gold mining industry does, and less than one-fifth of what bank branches and ATMs do.
  126. [126]
    Gold Mining Versus Bitcoin Mining - Sazmining
    Environmental Impact Comparison​​ Bitcoin currently consumes about half of what the gold mining industry consumes. In 2020, gold miners captured about 3500 tons ...<|separator|>
  127. [127]
    How Bitcoin mining stabilized the grid, saved Texans $18 billion ...
    Jan 20, 2025 · Bitcoin mining outperforms gas peaker plants, stabilizing grids, cutting costs, reducing emissions, and replacing the need for costly, ...
  128. [128]
    Power-Thirsty Bitcoin Miners Are Flooding the Energy Center of Texas
    Jul 25, 2024 · Power-Thirsty Bitcoin Miners Are Flooding the Energy Center of Texas. In the Permian Basin, where oil and gas are plentiful along with wind and ...
  129. [129]
    Bitcoin's growing e-waste problem - ScienceDirect.com
    On average Bitcoin generates 272 g of e-waste per transaction processed on the blockchain. Bitcoin could produce up to 64.4 metric kilotons of e-waste at peak ...
  130. [130]
    Proper E-waste Management Might Help Your Company's Profitability
    ASIC miners (the computing chip of choice for Bitcoin) last 7 years on average, with failure rates of 3–5% annually, and can last for 10+ years if kept in ...<|separator|>
  131. [131]
    Can You Recycle Crypto Mining Machines? What You Need to Know
    Jul 21, 2025 · Discover how to safely and responsibly recycle crypto mining machines, including ASIC miners and GPU rigs. Learn what businesses and miners ...
  132. [132]
    Trashing the Bitcoin E-Waste Myth
    May 5, 2025 · Bitcoin mining generates only a very small amount of e-waste – as the ASICs remain profitable for much longer than previously thought.
  133. [133]
    Proof-Of-Work Is Objective, Proof-Of-Stake Is Not - Bitcoin Magazine
    The proof-of-work consensus mechanism used in Bitcoin is an objective measure of history which cannot be changed on the whims of validators.
  134. [134]
    Proof Of Work Vs. Proof Of Stake: Why Bitcoin Won't Change
    May 26, 2022 · The three panelists covered topics including energy consumption, the differences between PoW and PoS and why PoW is necessary for Bitcoin.Missing: comparison | Show results with:comparison
  135. [135]
    Understanding Proof of Stake: The Nothing at Stake Theory - Medium
    Jun 7, 2018 · The nothing at stake theory is the assumption that in early versions of PoS, every validator will build on every fork when a fork takes place.
  136. [136]
    Ethereum Staking Weekly Report | by Ebunker | Oct, 2025 | Medium
    Oct 14, 2025 · ETH Staking Core Data. 1️⃣ Ebunker Ethereum Staking APR: 3.04%. 2️⃣ stETH (Lido) Average 7 day APR: 3.06%. 3️⃣ Staked Ether: 35,712,781 ETH.
  137. [137]
    Stake with Lido | Lido
    Statistics of the Lido protocol ; Annual percentage rate *. 2.6% ; Total staked with Lido. 8,590,001.859 ETH ; Stakers. 571,583 ; stETH market cap. $33,925,847,965 ...Reward History · Wrap & Unwrap · WithdrawalsMissing: 2025 | Show results with:2025
  138. [138]
    Why Proof-Of-Work Is A Superior Consensus Mechanism For Bitcoin
    Jan 15, 2022 · Proof-of-work as a system for validating transactions and securing the blockchain network is far more superior to a proof-of-stake (PoS) model, but it comes at ...Missing: comparison | Show results with:comparison
  139. [139]
    Significant Slashing Events and Other Incidents on Ethereum
    Incident #2. Date: November 14, 2023 Risk: Operational Failure Loss: ~100 ETH. What happened: 99 new Ethereum validators were slashed and all ...
  140. [140]
    Ethereum Completes Biggest Validator Slashing in Proof-of-Stake Era
    Sep 12, 2025 · Notably, the event raises questions about operational risks and shows how errors can still cost operators under the proof-of-stake system.
  141. [141]
    Bitcoin Dominance At 59.3% In 2025 Remains Close To 12-Yr Avg ...
    Jul 28, 2025 · This rebound aligns with Bitcoin's price surge, reaching $118,392 in July 2025, and a market cap of $2.35 trillion, representing 59.11% of the ...
  142. [142]
    Chain Insights — Analyzing Ethereum One Year Post-Merge - Medium
    Sep 28, 2023 · Post-merge, Ethereum's transition to PoS resulted in a staggering 99.99% reduction in energy consumption, according to the Crypto Carbon Ratings ...
  143. [143]
    Statement on Certain Proof-of-Work Mining Activities - SEC.gov
    Mar 20, 2025 · This statement addresses the mining of crypto assets that are intrinsically linked to the programmatic functioning of a public, permissionless network.
  144. [144]
    SEC Staff Issues Statement on Proof-of-Work Crypto Mining Activities
    Mar 25, 2025 · In the Statement, the Staff clarifies that Protocol Mining activities on public blockchains do not involve the offer and sale of securities.
  145. [145]
    Assessing China's Crypto Ban Three Years Later
    Aug 29, 2024 · CCAF attributed no hashrate to mainland China during July and August, but saw a significant resurgence in Chinese mining in September 2021 – ...<|separator|>
  146. [146]
    Cryptoasset sustainability disclosures in the EU: MiCA ... - Zumo
    The proposals pick up the mandate for disclosures relating to cryptoasset climate impacts to be included in public white paper and website descriptions.
  147. [147]
    HB 591
    Apr 27, 2023 · When gas is redirected from a flare to a generator for on-site power, there is a 63 percent decrease in carbon emissions and a 99 percent ...
  148. [148]
    WTAS: Sen. Cruz Leads the Fight for Cryptocurrency
    Apr 15, 2025 · “United States Senator Ted Cruz has introduced a new bill that offers tax incentives for cryptocurrency miners using flared natural gas to power ...
  149. [149]
    SEC Staff Clarifies That Crypto Mining Does Not Implicate the ...
    Apr 4, 2025 · The Staff Statement provides clarity that Proof-of-Work crypto mining does not involve securities, reducing regulatory uncertainty and enforcement risks for ...
  150. [150]
    Why Bitcoin Mining Needs Stratum V2
    Mar 6, 2023 · The protocol allows each individual miner to build its own candidate block, removing this power from the pool. The pool will therefore not be ...
  151. [151]
    Stratum V2 (SRI) Roadmap - To infinity and beyond
    Aug 3, 2023 · Today, we're sharing the (Stratum Reference Implementation) roadmap providing insights into our ongoing work and the project's direction.📖 Stratum V2... · 👩‍💻sri Stack · Stratum V2 PoolMissing: proof | Show results with:proof
  152. [152]
  153. [153]
    Automated AI-Powered Cloud Mining Platforms: Smarter Way to ...
    Oct 13, 2025 · Luxor's AI-based hashprice tools help miners optimize profitability across coins and algorithms. The platform also offers a U.S.-friendly ...
  154. [154]
    [PDF] The Lightning Network: - Fidelity Digital Assets
    Feb 13, 2025 · The Lightning Network was originally created in 2016 and has been described as a “payment scaling layer” on the Bitcoin network.
  155. [155]
  156. [156]
    What Is Proof-of-Work (PoW) and How Does It Work in 2024?
    Aug 16, 2024 · Censorship Resistance: The decentralized nature of PoW makes it difficult for any government or organization to censor or control ...Energy Consumption And... · The Ethereum Merge And The... · Bitcoin's Dominance In The...
  157. [157]
    Bitcoin sidechains will drive BTCfi growth - TradingView
    Mar 22, 2025 · 2025 is when that kindling can grow its flame on innovative Bitcoin sidechains. ... BTC price action or even more Bitcoin DeFi adoption.Missing: PoW | Show results with:PoW<|separator|>
  158. [158]
    How to Launch a Bitcoin DeFi Ecosystem: 2025 Guide | SapientPro
    Apr 28, 2025 · Sidechains allow Bitcoin to interact with smart contracts. This will enable the creation of decentralized applications and other DeFi protocols ...What Is Bitcoin Defi (btcfi)... · Bitcoin Defi Vs. Ethereum... · Use Cases Of Bitcoin Defi
  159. [159]
    What is Bitcoin DeFi (BTCFi) - BOB
    Aug 28, 2025 · Bitcoin DeFi (also known as BTCFi) is a segment of the DeFi industry where users can make yield on their BTC by staking, lending, borrowing, ...Defi Opportunities On... · Key Bitcoin Defi Use Cases... · The Future Of Btcfi: Trends...Missing: PoW | Show results with:PoW
  160. [160]
  161. [161]
    Bitcoin: Here Are The Records Already Achieved In 2025!
    Jan 26, 2025 · In 2025, bitcoin continues to set impressive records. With a growing number of wallets holding at least $100 and unprecedented network security.
  162. [162]
    Toward Trusted IoT by General Proof-of-Work - MDPI
    This type of paper provides an outlook on future directions of research or possible applications. Editor's Choice articles are based on recommendations by ...