5 months ago

Crypto Mining 101 – There’s No Such Thing as a Free Block

Crypto Mining 101 – There’s No Such Thing as a Free Block
Table of contents
    • Crypto mining is the mechanism that picks the next valid block and makes Bitcoin’s history hard to fake.
    • Miners propose blocks and burn energy to win rewards, while full nodes enforce the rules and reject anything invalid.
    • The security budget comes from block rewards plus transaction fees, and hashrate rises or falls with real-world economics like power prices.
    • A 51% attack is possible in theory, but requires huge hashrate and electricity spend, which makes serious attacks on Bitcoin economically unattractive.
    • Mining industrialised into an energy business and will depend more and more on fees, policy, and location choices as halvings keep cutting subsidies.

    If Bitcoin is “just code”, why do we need warehouses of machines burning electricity?

    If mining is so expensive, why has nobody just turned it off and moved to something cleaner?

    And if one attacker gets enough machines, can they really rewrite the chain and steal money?

    Lastly, is there still any point in mining at home?

    All of that loops back to one thing. Mining is the mechanism that turns a set of rules into a chain that is extremely hard to fake. If you remove the mining process, you do not get a gentler version of Bitcoin. You get a database that anyone can tamper with.

    What Mining Is (and What It Is Not)

    Mining is the process that picks the next page of the ledger and locks it in place by making it costly to change.

    Transactions move around the network all the time. Wallets create them, sign them, and broadcast them. These transactions sit in a waiting area called the mempool until someone includes them in a block. Miners are the ones who decide which of those pending transactions make it into the next block, pack them together, and then compete to make that block “official”.

    They do this by feeding the block header into a hash function called SHA-256, together with a number called a nonce. The hash function spits out a 64-character result that looks random. The network sets a target, and only hashes that are lower than that target count as valid. Miners simply keep changing the nonce and hashing again until one of them lands on a hash that is low enough.

    There is no smart puzzle to solve. It is pure trial and error at industrial speed. The first miner that finds a valid hash gets to broadcast its block, and if the rest of the network agrees that the block follows the rules, it becomes the next official piece of history and the miner gets paid.

    So mining is not “generating coins out of thin air”. Mining is burning real-world resources to win a race where the prize is new coins and fees, and the side effect is a secured ledger.

    How a Mined Block Gets Onto the Chain

    A miner runs software that keeps a full copy of the blockchain and stays in sync with the rest of the network. That software receives new transactions and throws away anything invalid: wrong signatures, coins that have already been spent, malformed data, anything that breaks the consensus rules.

    From the valid ones that remain, the miner builds a candidate block. The miner’s node knows the hash of the previous block, which becomes one of the key inputs in the new block header. That header also includes a summary of the transactions, a timestamp, and some other fields. This header is what gets hashed again and again with different nonces.

    Each hash attempt is one lottery ticket. Buying more machines lets you buy more tickets per second, but nobody can skip the basic process. Eventually, some miner somewhere finds a nonce that produces a sufficiently low hash. That miner broadcasts the new block to the rest of the network.

    Other nodes then do two simple checks. Does the block link to the current tip of the chain with the correct previous hash, and does everything inside it follow the rules? If both are true, they accept it and move their “tip” forward. If not, they ignore it, and the miner just paid an electricity bill for nothing.

    Who Decides What is Valid

    A lot of people talk about miners as if they control Bitcoin. They do not.

    Miners assemble and propose blocks. Nodes decide whether those blocks are acceptable. A node can be any machine running the full protocol and keeping its own copy of the chain. It does not need mining hardware, and it does not earn block rewards. Its job is to be stubborn.

    Nodes enforce fixed rules, meaning the current block subsidy, the total supply cap, the allowed script types, signature validity, the correct difficulty adjustment, and the exact structure of a block header. If a miner broadcasts a block that breaks any of these rules, every honest node simply refuses to add it. It does not matter how much computing power the miner owns. Invalid is invalid.

    That separation matters for security. Miners decide which valid transactions make it into the next block and in what order. Nodes decide what “valid” means. If a mining pool tried to sneak in a block that issues extra coins or rewrites old rules, nodes would just stop following it, and the pool would be wasting money on blocks nobody accepts.

    Security is Paid For

    Every block pays a miner in two ways. The first is the block subsidy, a fixed amount of new coins that decreases over time. Bitcoin started at 50 BTC per block in 2009. Every 210,000 blocks the subsidy halves. Right now it sits at 3.125 BTC per block, and it will keep falling until new issuance effectively stops.

    Each transaction can include a fee to persuade miners to include it. When blocks are full, people bid against each other for space, and the fee part of the reward can equal or even exceed the subsidy.

    Together, subsidy and fees form the revenue pool miners fight over. On the other side of the equation, they have hardware costs and electricity costs. That balance decides how much hashrate the network actually gets. If rewards are high, fees are strong, and power is cheap, miners turn on more rigs. If the opposite is true, marginal operators shut down and hashrate drops.

    Researchers have been modelling this explicitly. One approach treats each miner like an insurance company that has initial capital, a stream of costs, and a random stream of rewards. If the bad streaks last too long or costs spike, the miner hits “ruin” and exits. Another approach treats mining as a contest in which each miner’s share of hashrate gives them a corresponding share of expected rewards and uses that to calculate how sensitive hashrate is to changes in electricity prices and block rewards.

    At protocol level, the difficulty adjustment keeps block timing stable while this economic dance happens. Every 2016 blocks, the network looks at how long those blocks took. If they came too fast, difficulty is adjusted upward. If they came too slowly, difficulty is adjusted downward. The target is still roughly ten minutes per block in the long run, regardless of how many machines miners plug in.

    Why Rewriting the Chain Is So Expensive

    Consider a simple scenario. You pay someone 0.1 BTC. Your transaction gets included in a block, and a few minutes later another block is built on top of it. At that point, your payment has one confirmation. Each new block adds another confirmation.

    Now think about an attacker who wants to reverse that payment. They cannot just delete your transaction from the record everyone else is following. They have to create an alternative chain that starts from a point before your payment, exclude that transaction, and then mine a new chain that ends up longer than the honest one.

    To do that in practice, they need to control a majority of the hashrate for as long as it takes to catch up and overtake. That is the famous “51% attack”. It is just a race between the attacker’s chain and the rest of the world.

    On a small chain with low hashrate, the cost of doing this can be relatively modest. There have been several real 51% attacks against smaller coins where attackers pulled off double-spends and reorgs. On Bitcoin, with massive hashrate and highly optimised hardware already deployed, the picture looks different.

    An attacker must acquire or redirect an enormous amount of ASIC capacity, secure enough power to run it continuously, and coordinate this without tipping off the rest of the network too early. They burn electricity the entire time they are trying to catch up. If the attack is noticed or fails, all of that spend turns into a pure loss.

    This is why confirmations matter in practice. One confirmation means your transaction is in the latest block and still relatively easy to roll back. After several confirmations, reversing it would require rewriting many blocks worth of work. That pushes the cost and complexity up very quickly.

    Mining as an Energy and Location Game

    Once specialised ASIC miners arrived and difficulty increased, mining turned into an energy-intensive industrial business. Modern operations live in warehouses, shipping containers, and repurposed industrial buildings. They negotiate power contracts, cooling strategies, and zoning issues. They also move.

    Mining follows cheap, stable electricity and tolerable regulation. Locations with abundant hydro, wind, geothermal, or stranded gas are attractive because they offer low marginal power cost. Cooler climates help because less energy is spent on cooling hardware. Consistent rules and low risk of sudden bans matter as well.

    When you analyse the industry at scale, you see that miners behave like a strange type of flexible power customer. They appear in regions with excess or non-exportable energy, and they vanish when electricity gets expensive or laws tighten. Some countries actively court this business with favourable power deals and light oversight. Others push it out with taxes, restrictions, or direct bans.

    This has two direct effects on security.

    First, it connects Bitcoin’s defence budget to real-world energy markets. A bull market with high rewards and plenty of cheap power leads to higher hashrate and a higher cost to attack. A long bear market combined with high power prices can force weaker miners to shut down and shrink that margin.

    Second, it spreads or concentrates risk geographically. If hashrate clusters heavily in a few regions on a few grids, those regions become more important than the marketing language would suggest.

    Energy, Emissions, and the Real Tradeoffs

    Mining consumes a lot of electricity. At various points, aggregate Bitcoin mining demand has been compared to that of entire countries. Hardware wears out and becomes e-waste. Large mines can strain local grids, raise local power prices, or spark political backlash if they are seen as exporting benefits and importing externalities.

    Some early climate modelling treated the network as if its emissions would keep climbing indefinitely and framed mining as a straight line to disaster. Those models made headlines, even though many of their assumptions about miner behaviour and energy mix were later challenged.

    On the other side, miners and some researchers argue that the picture is more nuanced. Mining often uses power that cannot be easily sold elsewhere, such as remote hydro without enough transmission capacity, curtailed wind and solar that would otherwise be wasted, or flare gas that would otherwise be burned off inefficiently. In those contexts, mining can monetise energy that the grid is failing to use and, in theory, help finance new infrastructure.

    The truth is somewhere in between. Some mining loads are clearly heavy on fossil fuels and add to emissions. Some loads do sit on top of renewables and stranded energy. Local effects also matter. Even a mine that uses relatively clean power can upset a community if it crowds out other uses or is seen as capturing public resources for private profit.

    From a security point of view, this is the tradeoff. Bitcoin’s model uses real-world energy as a shield. The network is hard to attack precisely because there is a large, ongoing cost built into keeping it secure. The real question for policymakers and users is where that costs land, who bears the externalities, and whether the security benefit justifies it.

    Can Regular People Still Mine?

    From a profit perspective, the bar is high. Modern ASICs are expensive and lose value quickly as new models arrive. They produce heat and noise at levels that are hard to tolerate in normal living spaces. Electricity prices for ordinary consumers are often far higher than the industrial rates big mines negotiate. Without cheap power and a suitable location, home mining is usually a passion project rather than a sound investment.

    From a security perspective, what matters is the overall distribution of hash power and the number of independent actors. The more distinct operators there are in different legal jurisdictions, on different power grids, the harder it is for any single government, company, or cartel to gain enough influence over mining to pose a systemic risk.

    That role can be played by a mix of mid-sized regional miners, specialist firms, and some home setups. It does not require millions of hobbyists, but it does require that the economics of mining do not push everything into one or two mega-operators.

    For most people who simply want exposure to Bitcoin or other assets, buying and self-custodying those coins is a far cleaner way to participate. If you decide to mine anyway, treat it like a small business and run the numbers with conservative assumptions. Do not treat it like free money.

    Post-Mortem of a Mine Rush

    As halvings keep cutting the block subsidy, a larger share of miner revenue has to come from transaction fees. That means real usage and demand for block space start to matter more directly for security. If fees stay low while subsidies shrink, the amount of money available to pay miners falls, and the economic incentive to keep large hashrate online weakens. If block space becomes scarce and fees rise, the opposite is true.

    Energy markets and policy will also keep shaping where miners operate and how resilient the network is to local shocks. Taxes, subsidies, grid constraints, and environmental rules can either support a diverse set of mining locations or push activity into a narrower band of jurisdictions.

    On top of that, mining itself will keep industrialising. Bigger players, better hardware, more sophisticated financial hedging, and closer links to energy producers are already visible. Protocol-level responses like better mining pool protocols, more transparent fee markets, and tools that keep decision-making closer to individual miners instead of centralised pool operators are attempts to prevent that industrialisation from turning into full centralisation.

    The core reality does not change. For Proof of Work networks, mining is the bridge between abstract rules and real-world cost. The reason those chains are hard to attack is that attacking them means taking on a very expensive, very public fight against everyone already paying to keep them secure.

    Frequently Asked Questions (FAQ)

    What is crypto mining in simple terms?

    Crypto mining is the process where specialized computers bundle pending transactions into blocks and repeatedly hash them until one finds a valid result, which lets that miner add the block to the blockchain and collect rewards.

    How does crypto mining secure the Bitcoin network?

    Mining secures Bitcoin by forcing anyone who wants to add or rewrite blocks to spend large amounts of electricity and hardware, so attacking the chain means outspending the global network in real time.

    Can one miner or pool control Bitcoin if they get big enough?

    A very large miner or pool can influence which valid transactions get into blocks, but full nodes still reject any block that breaks the rules, so they cannot just print extra coins or change consensus on their own.

    What is a 51% attack and how realistic is it on Bitcoin?

    A 51% attack is when one entity controls most of the hashrate and mines an alternative chain to override recent blocks, but on Bitcoin the cost of acquiring and powering that much ASIC capacity makes it more like a theoretical risk than a practical strategy.

    Why does Bitcoin mining use so much energy?

    Mining uses a lot of energy because Proof of Work intentionally ties security to real-world cost, where miners constantly run hardware to hash blocks, and the total energy draw tracks how much money the network is paying them to protect it.

    Is crypto mining still profitable for individuals?

    Mining can be profitable if you have cheap electricity, efficient hardware, and a proper setup, but for most individuals buying and holding coins is usually a better risk-reward than competing with industrial-scale mines.

    What happens to mining when all Bitcoins are mined?

    When the block subsidy eventually drops to zero, miners will be paid only from transaction fees, so long-term security will depend on how much users are willing to pay for block space and how valuable on-chain settlement remains.

    Is crypto mining legal everywhere?

    Crypto mining is legal in many countries but restricted or banned in others, and large operations also need to comply with local energy rules, zoning, and environmental regulations, so you always need to check local law before setting anything up.

    Mining
    Sell to Survive: Inside the Biggest Bitcoin Miner Liquidation on Record
    Q1 2026 marked the largest institutional miner sell-off on record – public Bitcoin miners sold more than 32,000 BTC in a single quarter. The rea...
    2 weeks ago
    Mining
    Mining Software Showdown: GMiner vs. NiceHash
    The era of “turn it on and forget it” Ethereum mining is over, but the GPU mining landscape remains active for those willing to adapt. In ...
    3 months ago
    Mining
    How to Mine Bitcoin Gold (BTG): A Complete Educational Guide
    Bitcoin Gold (BTG) represents a fascinating chapter in the evolution of decentralized finance. Launched in late 2017, this project emerged as a “...
    3 months ago