Electroneum (ETN) cellphone-based blockchain platform performed a U-turn by bringing back ASICs in order to confirm transactions after initially forking to become ASIC-resistant.
The company focuses on using phones as a means to send and receive micro-payments, and its primary user base is in emerging economies where large proportions of the population have access to mobile phones but stay unbanked.
Reintroducing ASIC miners
The Electroneum network is a fork from Monero and removed many of its privacy features which.
CEO and founder of Electroneum Richard Ells stated in the company’s Telegram group that the team decided to take action as soon as possible and re-introduce ASIC miners, this way reversing a fork that had integrated ASIC-resistant code at the end of May.
“Being an anti-establishment coin won’t get us anywhere; we’re a cryptocurrency that needs to work with the operators and regulators to roll-out our services,” Ells said.
Electroneum initially wanted that its consensus model would become GPU-based in order to make it both accessible and less prone to cyber attacks. After the fork, things did not go as expected and the network failed to attract enough GPU-miners for the network to run efficiently.
“The GPU community convinced us to go anti-ASIC,” Ells told Crypto Briefing over the phone. “But when we did this, they [GPU miners] left in droves, which made the network less profitable for them and less secure for our users and us.”
— CoinBene Global (@CoinBene) July 5, 2018
Electroneum Fork’s effects
ASICs have centralized Bitcoin’s consensus protocol, and three mining pools have 48% of BTC’s hashrate this week.
There’s been enhanced concern about whether Bitmain which designs and uses its very own ASICs could eventually attack Bitcoin.
Ells was asked whether bringing back ASICs would put Electroneum in danger of a consensus attack and responded that
“When we banned ASICs, Electroneum became vulnerable to attack,” he stated. “From a rate of approximately two giga-hashes, we ended up with 30 mega-hashes just yesterday. We calculated that if a malicious agent used a cloud-mining site like NiceHash, they could successfully stage a 51% attack for as little as $3,000”.
Ells also argued that re-introducing ASICs would not make mining on the network inaccessible for users.
Who brought home the bacon in 2018? We've picked out 11 of the best ICOs from 2018 in terms of their return....
| November 1, 2018
Monero (XMR), as well as other significant cryptocurrencies in the market, experienced a very tough period c...
| September 12, 2018
When you need to make a crypto to crypto exchange, you usually browse the Internet and see a huge number of ...
| May 9, 2018
We are standing on the cusp of a new period in global finance. The potential for blockchain and shared hyper...
| April 25, 2018
With cryptocurrency adoption ramping up in enterprise and merchant applications, much of the focus has been ...
| April 22, 2018