Hacker News new | past | comments | ask | show | jobs | submit login

Does nicehash let you run custom mining software to make adjustments to how it handles your transactions (permit double spend) or change the algorithm (like the verge attack)?

Edit: or would the malicious code live in a mining pool that you direct the nicehash hashing power to?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: