Currently, the system uses a single proof key for proof of work. Marking is done with this proof key to make sure the job is done when a range is scanned.
However, the proof key can be found immediately and used for marking. To prevent this, min 3 proof keys must be used.
PROOFKEY1 : Randomly generated between 0% and 25% of the returned HEX range.
PROOFKEY2 : Randomly generated between 25% and 75% of the returned HEX range.
PROOFKEY3 : Randomly generated between 75% and 100% of the returned HEX range.
These 3 proof keys are required for marking. All proof keys found are written in order. Then a unique hash is generated with SHA256. SHA256(PROOFKEY1+PROOFKEY2+PROOFKEY3)
Currently, the system uses a single proof key for proof of work. Marking is done with this proof key to make sure the job is done when a range is scanned.
However, the proof key can be found immediately and used for marking. To prevent this, min 3 proof keys must be used.
PROOFKEY1
: Randomly generated between 0% and 25% of the returned HEX range.PROOFKEY2
: Randomly generated between 25% and 75% of the returned HEX range.PROOFKEY3
: Randomly generated between 75% and 100% of the returned HEX range.These 3 proof keys are required for marking. All proof keys found are written in order. Then a unique hash is generated with SHA256.
SHA256(PROOFKEY1+PROOFKEY2+PROOFKEY3)