pull down to refresh

Ah, I see. That would make sense! However, what about the SHA256-ASICs part?
ASICs are like a moat with regards to security. An external attacker needs to specifically manufacture (or otherwise acquire) machines which are only good at a single task (hashing with SHA-256) in order to even attempt to overpower the network. If you remove that moat, you are more susceptible to attack.
reply
Yes, I know that. But it's confusing to mention SHA256-ASICs when only bitcoin uses them (afaik). Maybe he just used them as an example for dedicated hardware?
reply
Yes, I think it's just an example of dedicated hardware.
reply
Okay, I can live with that haha
reply