Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
Tuna-Fish
on June 16, 2012
|
parent
|
context
|
favorite
| on:
Butterfly Labs Announces Next Generation ASIC Line...
You'd have to expend as much hashing power as has already been expended. Trying to do something like that is something that would take months (or year), and it would be visible to everyone on the network, and they would be able to react.
Consider applying for YC's Summer 2026 batch! Applications are open till May 4
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: