Monero (XMR) To Utilize A New Proof-Of-Work Algorithm, RandomX, By October 2019

Monero To Implement New Proof-Of-Work Algorithm, RandomX, By October

Developers of Monero (XMR) are now officially making specific plans to launch a new proof-of-work (PoW) algorithm in a few months. Monero will be working on this in collaboration with Arweave, which will support an audit of the new algorithm before it is officially launched.


Arweave is a new type of data storage blockchain platform that supports a permanent server-less web, creating a new type of permanent platform for data storage. The firm has stated that the new RandomX algorithm will be formally implemented by Monero after the successful audit has been complete.

The collaboration between Monero and Arweave will supposedly cost both firms a combined $150,000 and will be carried out for two months so it can all be ready by the proposed October date.


Before now, the developers at Monero have been using CryptoNight, apparently having to do a hard-fork every six months. The hard-fork was done by making a few small changes to CryptoNight, guaranteeing Application-Specific Integrated Circuit (ASIC).

This method of hard-forking the network has seen quite a bit of disapproval overtime. A commentator once pointed out sometime last year, that the several hard forks being done, directly means that a certain amount of centralization is compulsorily needed for proper harmonization.


Arweave has however spoken on this, saying that the new RandomX will not need a lot of interference from the Monero developers and would still be ASIC-resistant.

Furthermore, the GitHub page for RandomX mentions a feature that would improve its security. According to the page, miners of the algorithm would have to devote more than 2 GB of RAM for the mining process, specifically making it more difficult to mask attempts at cryptojacking.

This seems like good news, especially considering the fact that a recent report done by Check Point Research, established that crypto miners were the “three most common malware variants.” According to the report, the second most common is the XMRig which is an open-source mining software for mining Monero.

A different report by Trend Micro Inc, a security intelligence firm, has concluded that many cybercriminals have taken to manipulating the widget connector vulnerability CVE-2019-3396, for the Confluence software – a software made by Atlassian – which is a popular collaboration and planning software connected to Monero mining.

According to reports, the exploitation allows criminals to sneakily access an exposed computer and then install and run a miner for Monero (XMR) on it. The criminals also hide their mining activity on the exposed system and network using a rootkit. This can however, be downloading and installing new security patches.

Get Daily Headlines

Enter Best Email to Get Trending Crypto News & Bitcoin Market Updates

What to Know More?

Join Our Telegram Group to Receive Live Updates on The Latest Blockchain & Crypto News From Your Favorite Projects

Join Our Telegram

Stay Up to Date!

Join us on Twitter to Get The Latest Trading Signals, Blockchain News, and Daily Communication with Crypto Users!

Join Our Twitter

Add comment

E-mail is already registered on the site. Please use the Login form or enter another.

You entered an incorrect username or password

Sorry, you must be logged in to post a comment.
Bitcoin Exchange Guide