"don't work well for AI" is a hell of an understatement, the Application they are Specific to is literally just sha256(sha256(x)), what AI are you going to do with that?
GP probably didn't mean that hardware though, but rather the facility, electricity supply, cooling, etc.
The disappointing truth is that we simply don't know. Satoshi never explained it. For SHA-2 it can be used as a mitigation against length-extension attacks¹, and this seems like the most likely explanation, but it's just speculation.
"don't work well for AI" is a hell of an understatement, the Application they are Specific to is literally just sha256(sha256(x)), what AI are you going to do with that?
GP probably didn't mean that hardware though, but rather the facility, electricity supply, cooling, etc.
Why double sha256?
The disappointing truth is that we simply don't know. Satoshi never explained it. For SHA-2 it can be used as a mitigation against length-extension attacks¹, and this seems like the most likely explanation, but it's just speculation.
¹ https://en.wikipedia.org/wiki/Length_extension_attack
a that’s the botcoin hashing algorithm.
2 replies →
This is true, but large miners also have beneficial electricity contracts and data center capacity, both suitable for AI workloads.