• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

Bitcoin mining education and history

69er miner

New Member
Joined
Jan 5, 2023
Messages
6 (0.01/day)
I thought I would begin a series of posts with interesting facts about bitcoin mining and some of its many components. I think its very interesting how everything came together and how existing ideas and technologies were used with new ideas. I hope you all enjoy!

SHA256

The National Security Agency (NSA) is a United States government agency that is responsible for the collection and analysis of foreign intelligence. One of the technologies that the NSA has developed is the Secure Hash Algorithm 256 (SHA-256). SHA256 is a cryptographic hexadecimal hash function that is used to secure data. SHA-256 is a member of the SHA-2 family of cryptographic hash functions, which were first published in 2001. SHA-256 is similar to the other members of the SHA-2 family, but it uses a different number of bits in the hash output. The output of SHA-256 is a 256-bit hash value, which is a unique representation of the input data.

SHA-256 is widely used in various applications that require secure data transmission, such as digital signatures, data integrity, and password hashing. One of the most notable uses of SHA-256 is in the cryptocurrency industry, where it is used to secure transactions on the Bitcoin network. an interesting function of this is the avalanche effect, any changes to the encrypted data, even the slightest change completely alters the hash value.

The NSA first proposed the use of SHA-256 in 2005 as a standard for digital signatures in the Federal government. The standard was adopted by the National Institute of Standards and Technology (NIST) in 2011 as a recommended standard for Federal agencies. The NSA has also developed other cryptographic technologies, such as the Advanced Encryption Standard (AES) and the Elliptic Curve Digital Signature Algorithm (ECDSA). These technologies are widely used in government and commercial applications to secure data and protect against cyber attacks.

Overall, the development of SHA-256 by the NSA has been widely adopted and used to secure important information. Its reliability and security has proven to be valuable to many different industries and organizations including the crypto industry, where as we know its Widley used in mining and the creation of bitcoin addresses.

more to come at a later date! but i promise if you decide to follow along I will try to keep it short, sweet and interesting!
 
Joined
Aug 20, 2007
Messages
20,758 (3.41/day)
System Name Pioneer
Processor Ryzen R9 7950X
Motherboard GIGABYTE Aorus Elite X670 AX
Cooling Noctua NH-D15 + A whole lotta Sunon and Corsair Maglev blower fans...
Memory 64GB (4x 16GB) G.Skill Flare X5 @ DDR5-6000 CL30
Video Card(s) XFX RX 7900 XTX Speedster Merc 310
Storage 2x Crucial P5 Plus 2TB PCIe 4.0 NVMe SSDs
Display(s) 55" LG 55" B9 OLED 4K Display
Case Thermaltake Core X31
Audio Device(s) TOSLINK->Schiit Modi MB->Asgard 2 DAC Amp->AKG Pro K712 Headphones or HDMI->B9 OLED
Power Supply FSP Hydro Ti Pro 850W
Mouse Logitech G305 Lightspeed Wireless
Keyboard WASD Code v3 with Cherry Green keyswitches
Software Windows 11 Enterprise (legit), Gentoo Linux x64
I tried an article here some time ago to explain how it all worked.

It didn't exactly stick, but I tried. Best of luck.
 

69er miner

New Member
Joined
Jan 5, 2023
Messages
6 (0.01/day)
Blockchain and bitcoin

In the last article we discussed in short SHA256 and its history, as well as a short introduction to the technology. We can't talk about bitcoin and mining without mentioning another key pillar of this industry and that's Blockchain!

Blockchain is a decentralized, digital ledger that records transactions across a network of computers. It is a highly secure and tamper-proof technology that is revolutionising a wide range of industries.

At its core, a blockchain is a chain of blocks, each block contains a number of transactions. When a new transaction is added to the blockchain, it is added as the most recent block. Each block is linked to the block preceding it, this creates a chain of blocks that stretches all the way back to the first block, which is called "the genesis block."

One of the key features of blockchain technology is that once a block is added to the chain, it becomes immutable, it cannot be altered or deleted. This is because each block contains a unique "hash," (we spoke a little about this in the sha256 article) the hash is a string of characters that serves as a sort of digital fingerprint for the block. If someone were to try to alter the contents of a block, the hash would totally change due to the avalanche effect, this would make the block and all the blocks that follow it invalid.

Another key fundamental of blockchain technology is that it is decentralized, meaning that there is no central authority controlling it. Instead, the blockchain is maintained by a network of computers, these are known as "nodes," the nodes work together to validate and record transactions. When a new transaction is added to the blockchain, it is broadcast to all the nodes in the network. The nodes then work together to validate the transaction in a majority ruling scenario, then it is added it to the most recent block confirming it via the network.

The most well-known application of blockchain technology is Bitcoin, Bitcoin is a digital currency that uses blockchain to record transactions. However, the potential uses for blockchain technology go far beyond digital currencies, as immutable decentralised networks take away the issue of trust and provide full transparency. Bitcoin is a digital currency that uses blockchain technology to record and verify transactions. At its core, Bitcoin is a decentralized system that allows for peer-to-peer transactions without the need for a centralised institutions such as banks.

When we send Bitcoin to someone else via an exchange or wallet, we are broadcasting the transaction to the network. Nodes (computers) connected to the network are known as "miners," the miners then compete to validate the transaction by solving a complex mathematical problem (essentially decoding). The first miner to solve the problem adds the transaction to the most recent block and is rewarded with a small amount of Bitcoin.
 

69er miner

New Member
Joined
Jan 5, 2023
Messages
6 (0.01/day)
The importance of an immutable ledger!

last time we discussed bitcoin and blockchain.

Throughout history, assets such as property have been kept on ledgers which were safeguarded by an authority such as a bank or government. In most cases these ledgers were not immutable, meaning that they were subject to tampering or even deletion. Even today many governments still only keep housing ownership records on physical ledgers. This is cause for concern because they are vulnerable to circumstances such as natural disaster, theft, tampering or deletion. Unfortunately without proof of ownership anyone could lay claim to your property.

This is where blockchain comes in! We discussed Blockchain in our previous article and the purpose of this one is to highlight it’s immutable nature.

One of the biggest features blockchain is often associated with is its immutability. Blockchain by design is an immutable database in which you cannot manipulate the data that’s already stored within. The hash value of an existing block is a unique value determined by the data held within. So depending on the block’s content a unique hash value will be assigned that will identify this block only, and never an altered or different version of it. Therefore each block can reference or point to the block which precedes it, meaning blocks always reference their previous blocks and their corresponding hash.

Lets take a look at simple transaction to further break this down. Kevin wants to send money to Lisa. This transaction is represented as a “block.” This block is broadcast to every member of the network. The people in the network approve whether the transaction taking place is valid. As more transactions go on, a chain is formed (Blockchain), that visually show transparency in transactions. Lastly, the cash is sent from Kevin to Lisa, and the transaction is complete.

So in this example, blockchain’s immutable nature is visible, making it flawless. The issues surrounding tampering, deletion, hacking etc are resolved! The fact that we have validations combined with the blockchain hashing process and cryptography makes it immutable and therefore an obvious solution for recording everything to do with assets to monetary transactions and even personal records.

Do you think blockchain will take over as the universally adopted way of doing business? Let me know your thoughts on the comments.
 
Joined
Jan 14, 2023
Messages
661 (1.44/day)
System Name Asus G16
Processor i9 13980HX
Motherboard Asus motherboard
Cooling 2 fans
Memory 32gb 4800mhz cl40
Video Card(s) 4080 laptop
Storage 16tb, x2 8tb SSD
Display(s) QHD+ 16:10 (2560x1600, WQXGA) 240hz
Power Supply 330w psu
I love you NSA.
 
Joined
Jan 5, 2006
Messages
17,778 (2.66/day)
System Name AlderLake / Laptop
Processor Intel i7 12700K P-Cores @ 5Ghz / Intel i3 7100U
Motherboard Gigabyte Z690 Aorus Master / HP 83A3 (U3E1)
Cooling Noctua NH-U12A 2 fans + Thermal Grizzly Kryonaut Extreme + 5 case fans / Fan
Memory 32GB DDR5 Corsair Dominator Platinum RGB 6000MHz CL36 / 8GB DDR4 HyperX CL13
Video Card(s) MSI RTX 2070 Super Gaming X Trio / Intel HD620
Storage Samsung 980 Pro 1TB + 970 Evo 500GB + 850 Pro 512GB + 860 Evo 1TB x2 / Samsung 256GB M.2 SSD
Display(s) 23.8" Dell S2417DG 165Hz G-Sync 1440p / 14" 1080p IPS Glossy
Case Be quiet! Silent Base 600 - Window / HP Pavilion
Audio Device(s) Panasonic SA-PMX94 / Realtek onboard + B&O speaker system / Harman Kardon Go + Play / Logitech G533
Power Supply Seasonic Focus Plus Gold 750W / Powerbrick
Mouse Logitech MX Anywhere 2 Laser wireless / Logitech M330 wireless
Keyboard RAPOO E9270P Black 5GHz wireless / HP backlit
Software Windows 11 / Windows 10
Benchmark Scores Cinebench R23 (Single Core) 1936 @ stock Cinebench R23 (Multi Core) 23006 @ stock
Just ban it all!!

Ashton Kutcher Burn GIF
 
Joined
Jan 14, 2023
Messages
661 (1.44/day)
System Name Asus G16
Processor i9 13980HX
Motherboard Asus motherboard
Cooling 2 fans
Memory 32gb 4800mhz cl40
Video Card(s) 4080 laptop
Storage 16tb, x2 8tb SSD
Display(s) QHD+ 16:10 (2560x1600, WQXGA) 240hz
Power Supply 330w psu
Just ban it all!!

Ashton Kutcher Burn GIF
I started mining in the 1st BTC mining boom with lots of 7970 and 7950s, then the 2nd boom with ETH and 1080s and a few 1070s, I still dont understand what is it mining. Is it mining an old language that died out or trying to map out the entire universe.

I still say, burn it all.
 
Joined
Dec 25, 2020
Messages
4,583 (3.79/day)
Location
São Paulo, Brazil
System Name Project Kairi Mk. IV "Eternal Thunder"
Processor 13th Gen Intel Core i9-13900KS Special Edition
Motherboard MSI MEG Z690 ACE (MS-7D27) BIOS 1G
Cooling Noctua NH-D15S + NF-F12 industrialPPC-3000 w/ Thermalright BCF and NT-H1
Memory G.SKILL Trident Z5 RGB 32GB DDR5-6800 F5-6800J3445G16GX2-TZ5RK @ 6400 MT/s 30-38-38-38-70-2
Video Card(s) ASUS ROG Strix GeForce RTX™ 4080 16GB GDDR6X White OC Edition
Storage 1x WD Black SN750 500 GB NVMe + 4x WD VelociRaptor HLFS 300 GB HDDs
Display(s) 55-inch LG G3 OLED
Case Cooler Master MasterFrame 700
Audio Device(s) EVGA Nu Audio (classic) + Sony MDR-V7 cans
Power Supply EVGA 1300 G2 1.3kW 80+ Gold
Mouse Logitech G305 Lightspeed K/DA
Keyboard Logitech K400 Plus
Software Windows 10 Enterprise 22H2
Benchmark Scores "Speed isn't life, it just makes it go faster."
The question I pose is one of practical utility; what can someone do with blockchain technology that cannot be done better, and in a more secure and efficient form with anything else?
 

Frick

Fishfaced Nincompoop
Joined
Feb 27, 2006
Messages
18,923 (2.86/day)
Location
Piteå
System Name Black MC in Tokyo
Processor Ryzen 5 5600
Motherboard Asrock B450M-HDV
Cooling Be Quiet! Pure Rock 2
Memory 2 x 16GB Kingston Fury 3400mhz
Video Card(s) XFX 6950XT Speedster MERC 319
Storage Kingston A400 240GB | WD Black SN750 2TB |WD Blue 1TB x 2 | Toshiba P300 2TB | Seagate Expansion 8TB
Display(s) Samsung U32J590U 4K + BenQ GL2450HT 1080p
Case Fractal Design Define R4
Audio Device(s) Line6 UX1 + some headphones, Nektar SE61 keyboard
Power Supply Corsair RM850x v3
Mouse Logitech G602
Keyboard Cherry MX Board 1.0 TKL Brown
VR HMD Acer Mixed Reality Headset
Software Windows 10 Pro
Benchmark Scores Rimworld 4K ready!
The question I pose is one of practical utility; what can someone do with blockchain technology that cannot be done better, and in a more secure and efficient form with anything else?

I've seen this question asked a lot but never a satisfying answer.
 
Joined
Dec 25, 2020
Messages
4,583 (3.79/day)
Location
São Paulo, Brazil
System Name Project Kairi Mk. IV "Eternal Thunder"
Processor 13th Gen Intel Core i9-13900KS Special Edition
Motherboard MSI MEG Z690 ACE (MS-7D27) BIOS 1G
Cooling Noctua NH-D15S + NF-F12 industrialPPC-3000 w/ Thermalright BCF and NT-H1
Memory G.SKILL Trident Z5 RGB 32GB DDR5-6800 F5-6800J3445G16GX2-TZ5RK @ 6400 MT/s 30-38-38-38-70-2
Video Card(s) ASUS ROG Strix GeForce RTX™ 4080 16GB GDDR6X White OC Edition
Storage 1x WD Black SN750 500 GB NVMe + 4x WD VelociRaptor HLFS 300 GB HDDs
Display(s) 55-inch LG G3 OLED
Case Cooler Master MasterFrame 700
Audio Device(s) EVGA Nu Audio (classic) + Sony MDR-V7 cans
Power Supply EVGA 1300 G2 1.3kW 80+ Gold
Mouse Logitech G305 Lightspeed K/DA
Keyboard Logitech K400 Plus
Software Windows 10 Enterprise 22H2
Benchmark Scores "Speed isn't life, it just makes it go faster."

ir_cow

Staff member
Joined
Sep 4, 2008
Messages
3,766 (0.66/day)
Location
USA
blockchain is good for anti-theft. pretty useless for legit money transactions.

Raven coin is a good example of how the automotive industry could stick a QR core on each part using Raven coin type blockchain. It would cost the company nothing (if they minted coins). Public ledger and can be updated to say the car or part was stolen. completely kills off the grey market.
 
Joined
Dec 25, 2020
Messages
4,583 (3.79/day)
Location
São Paulo, Brazil
System Name Project Kairi Mk. IV "Eternal Thunder"
Processor 13th Gen Intel Core i9-13900KS Special Edition
Motherboard MSI MEG Z690 ACE (MS-7D27) BIOS 1G
Cooling Noctua NH-D15S + NF-F12 industrialPPC-3000 w/ Thermalright BCF and NT-H1
Memory G.SKILL Trident Z5 RGB 32GB DDR5-6800 F5-6800J3445G16GX2-TZ5RK @ 6400 MT/s 30-38-38-38-70-2
Video Card(s) ASUS ROG Strix GeForce RTX™ 4080 16GB GDDR6X White OC Edition
Storage 1x WD Black SN750 500 GB NVMe + 4x WD VelociRaptor HLFS 300 GB HDDs
Display(s) 55-inch LG G3 OLED
Case Cooler Master MasterFrame 700
Audio Device(s) EVGA Nu Audio (classic) + Sony MDR-V7 cans
Power Supply EVGA 1300 G2 1.3kW 80+ Gold
Mouse Logitech G305 Lightspeed K/DA
Keyboard Logitech K400 Plus
Software Windows 10 Enterprise 22H2
Benchmark Scores "Speed isn't life, it just makes it go faster."
blockchain is good for anti-theft. pretty useless for legit money transactions.

Raven coin is a good example of how the automotive industry could stick a QR core on each part using Raven coin type blockchain. It would cost the company nothing (if they minted coins). Public ledger and can be updated to say the car or part was stolen. completely kills off the grey market.

I mean, original vehicle parts already have a serial number that matches the chassis, this is known as a VIN and it is unique to each and every vehicle built. The registry of this identification number is usually tied to your vehicle's license. Cops searching for stolen cars and workshops that deal in illicitly obtained parts will often be caught by a VIN check. Wouldn't that completely eliminate the need for the use of the blockchain as it is? Unless your vehicle is also in an illegal condition :eek:
 

ir_cow

Staff member
Joined
Sep 4, 2008
Messages
3,766 (0.66/day)
Location
USA
I mean, original vehicle parts already have a serial number that matches the chassis, this is known as a VIN and it is unique to each and every vehicle built.
Yes, but the way chop shops work they take a legit wrecked cars frame. Remove everything from a the stolen car and put it on the rebuilt title one. Can't trace that. However if ever part had a VIN type number, this would hinder sales as now each part is registered and not just the VIN/ Car Frame.

Edit: Chop shop stuff comes from a VICE documentary. I have no experience with this myself.
 
Joined
Apr 24, 2020
Messages
2,559 (1.76/day)
It probably should be noted that SHA256 isn't very important, as much as the concept of a hash itself.

The goal of a cryptographic hash function is to create a one-way trapdoor function. That is, f(X) -> Y, where if you publish Y, it is "impossible" to discover X. However, this is a "trapdoor", because f(X) "should be easy" to compute. (IE: "If you already know X", the trapdoor activates and its really easy to verify that Y and X are related).

That's it. Any function that satisfies this requirement (F(X) easy to compute, but "impossible" to reverse) is a good hash function. Older hash functions (MD5 and SHA1) have patterns discovered where the Y back to X path is being discovered by mathematicians. No such path is known yet for SHA256.
 
Joined
Dec 25, 2020
Messages
4,583 (3.79/day)
Location
São Paulo, Brazil
System Name Project Kairi Mk. IV "Eternal Thunder"
Processor 13th Gen Intel Core i9-13900KS Special Edition
Motherboard MSI MEG Z690 ACE (MS-7D27) BIOS 1G
Cooling Noctua NH-D15S + NF-F12 industrialPPC-3000 w/ Thermalright BCF and NT-H1
Memory G.SKILL Trident Z5 RGB 32GB DDR5-6800 F5-6800J3445G16GX2-TZ5RK @ 6400 MT/s 30-38-38-38-70-2
Video Card(s) ASUS ROG Strix GeForce RTX™ 4080 16GB GDDR6X White OC Edition
Storage 1x WD Black SN750 500 GB NVMe + 4x WD VelociRaptor HLFS 300 GB HDDs
Display(s) 55-inch LG G3 OLED
Case Cooler Master MasterFrame 700
Audio Device(s) EVGA Nu Audio (classic) + Sony MDR-V7 cans
Power Supply EVGA 1300 G2 1.3kW 80+ Gold
Mouse Logitech G305 Lightspeed K/DA
Keyboard Logitech K400 Plus
Software Windows 10 Enterprise 22H2
Benchmark Scores "Speed isn't life, it just makes it go faster."
Yes, but the way chop shops work they take a legit wrecked cars frame. Remove everything from a the stolen car and put it on the rebuilt title one. Can't trace that. However if ever part had a VIN type number, this would hinder sales as now each part is registered and not just the VIN/ Car Frame.

Edit: Chop shop stuff comes from a VICE documentary. I have no experience with this myself.

Usually when parts are legally harvested from a wreck they accompany documentation explaining this condition, I could maybe see it serving as proof of purchase or proof of origin, but then again any old paper slip signed by transit authorities could fulfill this role :oops:
 

ir_cow

Staff member
Joined
Sep 4, 2008
Messages
3,766 (0.66/day)
Location
USA
Your assuming everyone isn't in on it. Maybe the parts place just makes stuff up. But the dealership or the new buyer can trace it back themselves.
 
Joined
Oct 21, 2005
Messages
6,877 (1.02/day)
Location
USA
System Name Computer of Theseus
Processor Intel i9-12900KS: 50x Pcore multi @ 1.18Vcore (target 1.275V -100mv offset)
Motherboard EVGA Z690 Classified
Cooling Noctua NH-D15S, 2xThermalRight TY-143, 4xNoctua NF-A12x25,3xNF-A12x15, 2xAquacomputer Splitty9Active
Memory G-Skill Trident Z5 (32GB) DDR5-6000 C36 F5-6000J3636F16GX2-TZ5RK
Video Card(s) EVGA Geforce 3060 XC Black Gaming 12GB
Storage 1x Samsung 970 Pro 512GB NVMe (OS), 2x Samsung 970 Evo Plus 2TB (data 1 and 2), ASUS BW-16D1HT
Display(s) Dell S3220DGF 32" 2560x1440 165Hz Primary, Dell P2017H 19.5" 1600x900 Secondary, Ergotron LX arms.
Case Lian Li O11 Air Mini
Audio Device(s) Audiotechnica ATR2100X-USB, El Gato Wave XLR Mic Preamp, ATH M50X Headphones, Behringer 302USB Mixer
Power Supply Super Flower Leadex Platinum SE 1000W 80+ Platinum White
Mouse Zowie EC3-C
Keyboard Vortex Multix 87 Winter TKL (Gateron G Pro Yellow)
Software Win 10 LTSC 21H2
I propose OP should discuss proof of work versus proof of stake models.

Vulnerabilities such as 51% attack, etc.
 

Bitboyoo

New Member
Joined
Jan 19, 2023
Messages
13 (0.03/day)
I'd love to see how , hypothetical of course a 51% attack would play out
 
Top