Vertcoin should not be confused with VERTCON.
Currency Name: | Vertcoin |
Image 1: | File:Vertcoin-2018-Logo.jpg |
Using Countries: | Worldwide |
Subunit Name 1: | millivertcoin |
Plural: | Vertcoin, Vertcoins |
Ticker Symbol: | VTC |
Block Reward: | 12.5 |
Circulating Supply: | 68,972,398 (as of 19 March 2024) |
Supply Limit: | 84,000,000 |
Implementations: | Vertcoin Core |
Status: | Active |
Latest Release Version: | 23.2 |
Latest Release Date: | [1] |
Operating System: | Windows, Linux, macOS |
Source Model: | Free and open-source software |
License: | MIT License |
Hash Function: | Verthash |
Timestamping: | Proof-of-work |
Block Time: | 2 minutes, 30 seconds |
Exchange Rate: | Floating |
Precision: | 10−8 |
Vertcoin (Abbreviation: VTC) is an open-source cryptocurrency created in early 2014, that focuses on decentralization. Vertcoin uses a proof-of-work mechanism to issue new coins and incentivize miners to secure the network and validate transactions. Vertcoin is designed to be mined via graphics cards instead of through ASICs.
Vertcoin aims to be decentralized by being difficult to mine using dedicated processors,[2] known as ASICs.[3] Vertcoin is open source and has a 2.5-minute block time.[3]
NBC News's Ben Popken said in 2018 that Vertcoin had received significant attention on Reddit due to it being impervious to ASICs which are used to mine bitcoin.[4] TechRadar's Jonas DeMuro wrote in February 2018 that Vertcoin was comparatively popular due to a lack of friction for new users, as well as an active social media presence.[3]
From October through December 2018, Vertcoin suffered from 51% attacks.[5] In response, Vertcoin changed to a different proof-of-work algorithm before suffering from another 51% attack on December1, 2019.[6]
A December 2018 paper published in The Transactions of the Korean Institute of Electrical Engineers said that "because [Vertcoin] is not a very popular blockchain, the difficulty adjustment algorithm is very sensitive to hash rate change, making it an easy target to timestamp spoofing and cherry-picking attack."[7]