In cryptocurrency networks, mining is a validation of transactions. For this effort, successful miners obtain new cryptocurrency as a reward. The reward decreases transaction fees by creating a complementary incentive to contribute to the processing power of the network. The rate of generating hashes, which validate any transaction, has been increased by the use of specialized machines such as FPGAs and ASICs running complex hashing algorithms like SHA-256 and Scrypt. This arms race for cheaper-yet-efficient machines has been on since the day the first cryptocurrency, bitcoin, was introduced in 2009. With more people venturing into the world of virtual currency, generating hashes for this validation has become far more complex over the years, with miners having to invest large sums of money on employing multiple high performance ASICs. Thus the value of the currency obtained for finding a hash often does not justify the amount of money spent on setting up the machines, the cooling facilities to overcome the enormous amount of heat they produce, and the electricity required to run them.
666 Munze Kryptowahrung
Wie beginne ich Bitcoins kaufen
In the case of Bitcoin, miners run computer programs to verify the data that creates a complete transaction history of all Bitcoin. A technology known as the blockchain, which is used to create irreversible and traceable transactions, makes the process of verification possible. Once a miner has verified the data (which comes in a block, hence, blockchain), they are rewarded with some amount of digital currency, the same currency for which they were verifying the transaction history. So mining Bitcoin, for example, would earn you Bitcoin.
Ist Bitcoin wirklich unauffindbar
Bitcoin is pseudonymous rather than anonymous in that the cryptocurrency within a wallet is not tied to people, but rather to one or more specific keys (or "addresses"). Thereby, bitcoin owners are not identifiable, but all transactions are publicly available in the blockchain. Still, cryptocurrency exchanges are often required by law to collect the personal information of their users.