Co do minerów - nie wiem jakie algo są tam używane, ale będzie zabawnie, jak wszystkie te "inwestycje" da się rozwalić w godzinę...
z tego co wiem to kopanie kryptomonet polega na szukaniu X takiego, że hash(X) ma określone właściwości
https://en.wikipedia.org/wiki/Proof_of_work
Background
One popular system, used in Hashcash, uses partial hash inversions to prove that computation was done, as a goodwill token to send an e-mail. For instance, the following header represents about 252 hash computations to send a message to [email protected] on January 19, 2038:
X-Hashcash: 1:52:380119:[email protected]:::9B760005E92F0DAE
It is verified with a single computation by checking that the SHA-1 hash of the stamp (omit the header name X-Hashcash:
including the colon and any amount of whitespace following it up to the digit '1') begins with 52 binary zeros, that is 13 hexadecimal zeros:[1]
0000000000000756af69e2ffbdb930261873cd71
Bitcoin-type proof of work
In 2009, the Bitcoin network went online. Bitcoin is a proof-of-work digital currency that, like Finney's RPoW, is also based on the Hashcash PoW. But in Bitcoin, double-spend protection is provided by a decentralized P2P protocol for tracking transfers of coins, rather than the hardware trusted computing function used by RPoW. Bitcoin has better trustworthiness because it is protected by computation. Bitcoins are "mined" using the Hashcash proof-of-work function by individual miners and verified by the decentralized nodes in the P2P bitcoin network.
The difficulty is periodically adjusted to keep the block time around a target time.
ASICs and mining pools
Within the Bitcoin community there are groups working together in mining pools.[24] Some miners use application-specific integrated circuits (ASICs) for PoW.[25] This trend toward mining pools and specialized ASICs has made mining some cryptocurrencies economically infeasible for most players without access to the latest ASICs, nearby sources of inexpensive energy, or other special advantages.[26]
Some PoWs claim to be ASIC-resistant,[27] i.e. to limit the efficiency gain that an ASIC can have over commodity hardware, like a GPU, to be well under an order of magnitude. ASIC resistance has the advantage of keeping mining economically feasible on commodity hardware, but also contributes to the corresponding risk that an attacker can briefly rent access to a large amount of unspecialized commodity processing power to launch a 51% attack against a cryptocurrency.[28]
klasyczny bitcoin ma chyba bardzo prostego hasha, coś a'la sha1, więc można go policzyć używają małej ilości pamięci i dodatkowo świetnie się takie poszukiwanie X
a zrównolegla.
kompletnie się na kwantowych bitach nie znam, ale tak pi * drzwi (tzn. na oko) mając ilość qbitów wystarczającą na całą przestrzeń roboczą do liczenia pojedynczego hasha można by policzyć wszystkie hashe naraz i tym samy znaleźć proof-of-work
w jednym kroku. no chyba, że faktycznie tak mocno się nie znam, że źle zakładam, że to wypali.