Lecture 2 - Mining Flashcards

1
Q

Why do we need blockchain?

A

To prevent double spending

–> have an ordered list of all transactions; public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a sybil attack?

A

A Sybil Attack refers to when a system is violated by an entity that controls two or more different identities in a network.
–> Voting does not work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do we solve the Sybil problem?

A

Make people pay for each vote. –> Proof of Work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

polynomial time

A

An algorithm is polynomial (has polynomial running time) if for some 𝑘,𝐶>0, its running time on inputs of size 𝑛 is at most 𝐶𝑛𝑘. Equivalently, an algorithm is polynomial if for some 𝑘>0, its running time on inputs of size 𝑛 is 𝑂(𝑛𝑘). This includes linear, quadratic, cubic and more. On the other hand, algorithms with exponential running times are not polynomial.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the assumptions of a fair coin issuance?

A
  • Start with zero coins in the system
  • reward voters with freshly generated coins for supporting the network
  • reduce issuance over time to approach a fixed maximum (period halvings)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

current estimated total hashrate

A

213 EH/s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How often is the difficulty adjusted?

A

Every 2016 blocks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do we calculate the new difficulty?

A

New difficulty = current difficulty / (time taken for last 2016 blocks / 2 weeks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Could quantum computers find valid block hashes easily?

A

No. Because Bitcoin uses two SHA-256 sequentially.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Could a quantum computer crack Bitcoin wallets and steal the coins?

A
  • Very old addresses (P2PK) use the plain public key so they are attackable via Shor’s algorithm.
  • Other addresses that have never been used to send funds: addresses are themselves hashes and since breaking a hash is not feasible they are safe.
  • Any addresses that have send any number of coins in the past: Sending coins requires to sign a transaction. This exposes the private key, so we are vulnerable to Shor
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Shor’s algorithm

A

can factor large numbers in O(log(n)) instead of O(n)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Grover’s algorithm

A

can crack hashes O(sqrt(n)) instead of O(n)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What to do against quantum attacks?

A

Never reuse Bitcoin addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are mining pools?

A

Miners construct blocks at a lower difficulty and submit those as proof of work. When one miner actually finds a block, the hashrate statistics of all miners on the pool are used to calculate fair payouts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Pros of a mining pool

A
  • miners get consistent rewards

- miners don’t need to run a node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cons of a mining pool

A
  • pools must be trusted with the fair distribution of coins

- miners can’t choose which transactions they are mining

17
Q

Largest mining pool companies?

A

Foundry USA,
F2Pool
AntPool

18
Q

Best mining farm builds

A

Custom, Immersion

  • -> medium to low operating expenses overhead
  • -> high stability
  • -> high temperature ranges work
19
Q

Power supply comparison Data Center vs. Mining Farm

A
  • data centers always have redundant power

- mining farms never have backup power since downtimes are not so important

20
Q

Cooling in data centers vs. mining farms

A
  • data centers need to guarantee that servers can run inside their rated environment. Active cooling is necessary
  • mining farms use direct air cooling using outside air. Innovation in Immersion cooling

Active cooling is a heat-reducing mechanism that is typically implemented in electronic devices and indoor buildings to ensure proper heat transfer and circulation from within.

Unlike its counterpart passive cooling, active cooling is entirely dependent on energy consumption in order to operate. It uses various mechanical systems that consume energy to dissipate heat. It is commonly implemented in systems that are unable to maintain their temperature through passive means.

21
Q

What is immersion cooling?

A

Immersion cooling is an IT cooling practice by which IT components and other electronics, including complete servers and storage devices,[1] are submerged in a thermally conductive but electrically insulating dielectric liquid or coolant. Heat is removed from the system by circulating relatively cold liquid into direct contact with hot components, then circulating the now heated liquid through cool heat exchangers. Unlike many other applications, water cooling cannot be used as normal water is electrically conductive and will break electronic components.

22
Q

Networking in DC vs mining farms

A

DC: Complex firewall, glass fibre

mining farm: Low bandwidth requirements

23
Q

Security in DC vs mining farms

A

DC: high
mining: low only perimiter

24
Q

Calculating electricity usage

A
hashrate * efficiency = power 
hashrate is 213 EH/s
average efficiency = 57 J/TH = 57 MJ/EH
--> 213 EH/s * 57 MJ/EH = 12141 MJ/s = 12.1 GW
.2% of global electricity usage
25
Q

What growth can we still achieve?

A

26% growth until spring 2024.

Equilibrium is at about 15.32 GW

26
Q

CO2 impact by source

A

around 25% gas, 35% coal, rest renewables.

Annual CO2 emissions are 44Mt –> around .08% of global emissions.

27
Q

Are renewables cheaper than fossil fuels for bitcoin mining?

A

Yes because mining is done is sparsely populated areas

–> Miners participate in various load management plans worldwide to provide flexibility as a service.

28
Q

when is a block valid?

A

When it’s hash is smaller than 2^224/difficulty

29
Q

new difficulty =?

A

current difficulty / (time for last 2016 blocks / 2 weeks)

30
Q

ASIC 110nm vs ASIC 3cm

A

1000 J/TH

15 J/TH

31
Q

Miner hardware currently

A

66% Bitmain

32
Q

power =

A

hashrate * efficiency

33
Q

When is mining equilibrium reached?

A

when total costs approach total revenue.