And I'll say it again Double SHA256 != DoubleSHa256. A Bitcoin block is a hash of the hash of the block header that is lower than the target difficulty.
Doing it twice, is hardly a fundamental deal-breaker...
That is like saying you can't multiply, because this uses double-multiply... C*(B*X) OMG new technology.. we can't just SHA-256 it twice... Seriously...
Which link was "not a chip"... The first link IS a chip, and a process. None of those were, "just ideas", they are used in cryptographic hardware.
ASIC's that "only do SHA-256" are new... because no-one would limit themselves to that specific of an insecure technology, when just adding a few more commands, in silicon, has no penalty.
I only linked those, of the thousands I found, which interested me the most. The point was, that they already have patents and rights, to much of the hardware which, in part, is being used on the ASIC's being developed now. Items that could already be in users hands, instead of waiting for all these potential devices to actually be "created" from scratch. (Which, it is safe to assume, may even all fail, or be insufficient to adapt to any form of "modified" bitcoin code, which will eventually be made. As it stands, these potential "cracking" ASICs coming to our hands, are going to be used for that, at some point. They have a brute-force ability above any GPU, and equal to a super-computer, for such a modest SHA-256 encryption. Which, by the way, is not hard to "fake" valid checks, when you simply have to modify the package until it results in an equivalent HASH. That is how viruses inject themselves into system-files, and avoid detection after injection. They just alter insignificant values until a valid hash is returned.)
This system will only last so long, before it has to be, "trimmed" and re-secured with more non-standard encryption. Don't forget, "crackers" don't have to do a "proof of concept", they only have to bash until they find an acceptable hash with a modified chunk of hacked data. (Essentially creating or destroying coins, which-ever attack they are going for.) And if ONE person/company, producing the "large chunk" is holding the longest chain, invalid, but the longest, that it keep re-validating... they control the banks. (Which will be those developing the ASICs now, with our dollar. You don't seriously think they are going to "give us", a majority of a market they know they can consume, do you?)
Fine, you can't, and have no actual idea how to... so why answer?
As for "archived posts", If I wanted to read old dead posts, I would have searched. Is there some rule, "one original topic per forum?" Just because someone suggested it once before, and nothing was done, why should I be damned to posting a new, up-to-date topic? Get a better search function, and I might actually use it. Then I will revive every previously buried topic known to man.
Ok, I am bored now... Back to my corner of the net.
I'm not scared, I go where the money is... No more money here, I just go. I still have not actually seen a functioning GHs rig ASIC yet. Only that one, which is buggier than an e-machine, which is still a power vampire. And now he wants $8000+ for it... lol... Defeats the purpose, really!