Reaching the target hash(Draft)

Frank Doherty
1 min readMar 6, 2019

Reverse engineering block propagation

  1. Target Hash is based on a recurrently adjusted difficulty. For, example the TH is a 256-bit string with 17 leading zeros.
  2. The hash can be interpreted as follows SHA_256(SHA_256(Block_Header, n). Where n is the field of bits known as the nonce.
  3. Increment n if H < TH

“Because the nonce is only 32 bits, after exhausting all the nonce possibilities (about 4 billion), the mining hardware changes the block header (adjusting the coinbase extra nonce space or timestamp) and resets the nonce counter, testing new combinations.”

--

--

Frank Doherty

Bringing to light the question of what it means to be human in a time that is waving on an open road .