FAQ - Frequently Asked Questions
🎓 ... let's start with the basics.
To fully understand HashBurst technology and make sense of the questions and answers that arise in our ecosystem, it is essential to have at least a basic knowledge of the topics covered.
In our case, we are talking about mining pools, computing power, blockchain, Bitcoin, and much more.
👉 To help you on this journey, we recommend watching this simple and clear video.
It is designed to offer an accessible explanation even to those who are new to these topics.
FAQ
1. What is HashBurst and what service does it offer?
HashBurst is a revolutionary system that provides cloud computing services to mining pools.
Its main function is to help mining pools with the cryptographic resolution of new blocks that are created on the blockchain.
This service is supported by an internally developed Artificial Intelligence (AI) algorithm, which constantly learns and adapts to optimize synergy with mining pools.
Mining pools that benefit from this service recognize the contribution provided by sending payments directly to HashBurst users in proportion to the computing power made available and used in the system.
HashBurst currently supports 74 cryptocurrencies in 59 mining pools, aggregating computing resources distributed in Cloud Computing.
Synapta Plc is the exclusive worldwide distributor of HashBurst technology in the retail segment.
2. How does HashBurst's Artificial Intelligence work?
HashBurst's Artificial Intelligence (AI) is a program that adapts autonomously to circumstances by analyzing context data and dynamically collected values.
It starts with an initial dataset and, once it has obtained a statistically valid amount of data, compares it with the initial dataset to modify its response according to a goal or to correct its own cognitive bias (for example, learning to distinguish a cat from a dog).
The AI learning process is called "training," which can be autonomous or supervised. Supervised training, with the help of technicians and greater computing power (via super servers or HPC), can significantly speed up the process.
HashBurst's AI self-regulates its parameters using pre-set datasets to work best on the input data. For example, if performance deteriorates (increasing "rejected shares," or unvalidated transactions), the AI attempts to self-correct until it finds the optimal values.
This algorithm constantly monitors crucial parameters such as "Accepted Shares," GPU temperature, and energy efficiency to ensure optimal and long-lasting hardware performance.
3. What are the training and stabilization times for a HashBurst system?
The training and stabilization times for HashBurst systems vary depending on the type of machine. For the best machines or virtual machines (VMs), training takes about a month to a month and a half. For other machines, it can take up to 3 months. It is important that the machine is always turned on and has a stable connection.
By the third month, the cluster should settle down, as the AI also prepares the cluster containing the machines, the cluster being the actual "miner." In this initial-intermediate phase (one and a half to three months), slow but steady growth is observed. After the first three months of training, it takes four months for the pools to verify production activities, allowing for a planned escalation.
Between the sixth and seventh month, the requirements are met to further increase the hash rate and distribute it across multiple pools. From the sixth to the ninth month, the frequency of payouts increases more rapidly. From the ninth to the twelfth month, the system stabilizes, with extremely limited fluctuations and variations, to the permanent benefit of the customer, as the license is lifetime.
4. What role does GitHub play in HashBurst technology, and why is the software "open source"?
GitHub is a development platform where software developers can create, store, and manage their code. HashBurst makes the code developed by its engineers on GitHub (in the "hashburst" directory) publicly available, not out of obligation, but for transparency and collaboration.
Despite the innovations and time invested, the code is visible to everyone to demonstrate its robustness and the "meat" behind the "smoke," countering skepticism and misinformation.
The use of public domain libraries (such as TensorFlow or Keras for neural networks in Python) is a common practice in software engineering, avoiding reinventing the "wheel" for basic functions.
This allows developers to focus on more sophisticated and proprietary algorithms.
For HashBurst, this means that the AI, written mainly in Python (with Nvidia's CUDA interface for the hardware), can call existing functions, optimizing development time and complexity. For example, the algorithm for cryptomining optimization is made public to show how it handles parameters in real time.
5. What are the hardware requirements for HashBurst products and how is power measured?
HashBurst products are pre-assembled hardware configurations with pre-installed software, ready to use. They require a stable Internet connection (minimum 64 Mbps) and constant power supply. The HashBurst algorithm is customized for each machine (Virtual Machine or physical workstation) and interacts differently with the cluster depending on the product range.
To compare production potential, the PCR (Relative Computational Power) parameter has been introduced.
A PCR of 1x is the base power (VM and MCM 150), while a Thunderbolt V2 has a PCR of 10x, indicating a theoretical potential ten times higher.
This parameter considers not only raw power, but also algorithmic priority, effective hardware capacity, block calculation time, and internal computational depth.
Recommended hardware includes compact PCs, notebooks, and desktops with various specifications, all designed to work in synergy with HashBurst algorithms.
6. How are payouts and rewards managed in HashBurst?
Payouts or rewards are the financial rewards distributed by mining pools based on the computing power provided by HashBurst clusters. These rewards are directly linked to the performance of HPC clusters, which only activate their power at the most profitable times.
The pools distribute rewards in proportion to the work done, measured in "valid shares." HashBurst uses various distribution methods such as Pay-Per-Share (PPS) and Pay-Per-Last-N-Shares (PPLNS).
To ensure transparency and traceability, all payouts generated by the HashBurst system are recorded and made public on the Polygon blockchain via a proprietary smart contract.
This allows any user or verification entity to view transaction outcomes in real time, tracking payment flows in an auditable and immutable manner.
This integration with Polygon not only proves the authenticity of payouts and ensures consistency between power delivered and rewards, but also strengthens compliance with AML (Anti Money Laundering) regulations by proving the origin of funds from real computing activity.
7. What is Synapta's business model in relation to HashBurst?
Synapta Plc is the exclusive worldwide distributor of HashBurst technology in the retail segment. It does not sell directly to end customers but acts as a technology intermediary, focusing on indirect product distribution.
Its main activities include:
- Distribution channel creation and management: Builds and manages the network of resellers who promote and sell products based on HashBurst technology.
- Reseller training: Facilitates access to HashBurst products through technical and sales training courses.
- Expansion and growth: Identifies new growth opportunities for the project, ensuring effective coverage of the retail market.
HashBurst offers a "lifetime license" for its products, which means that the customer benefits from a lasting and potentially value-generating asset over time, with no additional recurring costs for access to the ecosystem.
This license is "non-custodial," with payouts sent directly from the mining pools to users' wallets, ensuring transparency and AML compliance.
8. What does it mean that HashBurst's AI is "like a child learning to walk"?
The analogy with a child learning to walk is used to explain the learning process of HashBurst's artificial intelligence neural networks. Initially, the neural network (like a child) "knows" nothing.
It is fed input data (real data) which is compared with "test" data (expected results). If the network's output is incorrect, the AI compares the error, readjusts its internal parameters (like a child correcting their posture after a fall), and tries again.
This iterative process, consisting of multiple "epochs" and "batch sizes" (e.g., 320 iterations in one example), allows the AI to progressively improve its accuracy. Just like a child who learns to walk better and better through trial and error, AI, by comparing the error and adjusting the parameters, "converges" towards an increasingly correct result, increasing the probability of success from an initial 0% to over 95-98%.
This is the principle behind features such as image recognition (distinguishing a cat from a dog) or cryptomining optimization to maximize "accepted shares" and minimize "rejected shares."
FAQ VPN
9. Why not use a VPN and put all the machines in one place?
The pools we are connected to do not allow the use of VPNs and proxy services, as they use IDS (Intrusion Detection System) systems that detect such connections. These systems are able to identify and block connections that do not comply with regulations, such as those from VPN services.
The IDS systems used by the Pools detect whether connections come from known VPN or proxy solutions. These systems are able to identify the signatures of connections, which indicate whether the connection is legitimate or not. Connections using VPN services are often recognizable by these signatures and are blocked to prevent unauthorized activity.
10. Is it possible to connect multiple machines in a single location with multiple IP addresses?
Although it is possible to have multiple static public IPs, pools tend to treat these connections as coming from a single source if the IPs are associated with a single router. This does not help to multiply transactions as it is seen as a single connection line.