Bitcoin Forum

Other => Beginners & Help => Topic started by: Cyclone on July 14, 2011, 01:00:22 AM



Title: Re: Whitelist Requests (Want out of here?)
Post by: Cyclone on July 14, 2011, 01:00:22 AM
I understand the concept of bitcoins fully. I might try to start my own mining pool perhaps, if I could ever get this mining client working. I've some ideas about nonce generation which may allow my pool to generate bitcoins faster than other pools, thereby increasing the payouts and boosting the popularity of my pool.

I really like the technical side of the bitcoin more than the practical side, it's quite an intelligent system.


Title: Re: Whitelist Requests (Want out of here?)
Post by: yuriyg on July 14, 2011, 01:04:01 AM
nonce generation which may allow my pool to generate bitcoins faster than other pools
As far as I understand, you get a yes or no answer to see whether your hash is correct. How can you optimize that? You can't really do a binary search...


Title: Re: Whitelist Requests (Want out of here?)
Post by: Cyclone on July 14, 2011, 01:08:14 AM
Most miners generate nonces entirely at random, if I am not mistaken. That's inherently flawed, there are much better ways to generate a "low" hash value.


Title: Re: Whitelist Requests (Want out of here?)
Post by: ah42 on July 14, 2011, 01:24:17 AM
Most miners generate nonces entirely at random, if I am not mistaken. That's inherently flawed, there are much better ways to generate a "low" hash value.

Actually, they iterate consecutively through the noncespace. (I think)

But hey, finding a needle in a haystack is in your favour searching consecutively if the needle is near the front of the haystack. Searching randomly, it doesn't matter where the needle is, it's random chance.


Title: Re: Whitelist Requests (Want out of here?)
Post by: yuriyg on July 14, 2011, 01:39:47 AM
Most miners generate nonces entirely at random, if I am not mistaken. That's inherently flawed, there are much better ways to generate a "low" hash value.
If you know the range of input-output correspondance of a SHA256 hash, you can write one hell of a password cracker! Not sure if possible...


Title: Re: Whitelist Requests (Want out of here?)
Post by: Cyclone on July 14, 2011, 01:40:18 AM
Actually, they iterate consecutively through the noncespace.

But hey, finding a needle in a haystack is in your favour searching consecutively if the needle is near the front of the haystack. Searching randomly, it doesn't matter where the needle is, it's random chance.

So then, how does each miner know what it should check? Surely there'd be a useless overlap. And "noncespace" is a cool word, mind if I borrow it?