DEFENDING BITCOIN

db:threat/asic-supply-chain

Threat

One company can shut off a third of all mining with a software update.

ASIC Supply Chain Compromise

Mining ASICs ship with proprietary firmware that accepts silent over-the-air updates from the manufacturer, and one vendor dominates SHA-256 ASIC production.

The full threat page — recommended controls, incident references, and citations — lands when Defending Bitcoin ships on June 15, 2026.

← Home