Reaching the target hash(Draft)

Reverse engineering block propagation

  1. Target Hash is based on a recurrently adjusted difficulty. For, example the TH is a 256-bit string with 17 leading zeros.
  2. The hash can be interpreted as follows SHA_256(SHA_256(Block_Header, n). Where n is the field of bits known as the nonce.
  3. Increment n if H < TH

“Because the nonce is only 32 bits, after exhausting all the nonce possibilities (about 4 billion), the mining hardware changes the block header (adjusting the coinbase extra nonce space or timestamp) and resets the nonce counter, testing new combinations.”

Bringing to light the question of what it means to be human in a time that is waving on an open road .

Bringing to light the question of what it means to be human in a time that is waving on an open road .