|
|
|
Myriad was introduced in February 2014 and is notable because it uses five different Proof-of-Work algorithms (SHA256, Scrypt, Qubit, Skein or Groestl) simultaneously, with block rewards and difficulty varying for each algorithm, depending on miner participation. The intent is to make Myriad immune to ASIC specialization and centralization as well as much more resistant to consensus attacks, as multiple mining algorithms would have to be attacked simultaneously.
|
|
|
|
Myriad was introduced in February 2014 and is notable because it uses five different Proof-of-Work algorithms (SHA256d, Scrypt, Qubit, Skein or Myriad-Groestl) simultaneously, with difficulty varying for each algorithm depending on miner participation. The intent is to make Myriad immune to ASIC specialization and centralization as well as much more resistant to consensus attacks, as multiple mining algorithms would have to be attacked simultaneously.
|