db:threat/asic-supply-chain
Threat
One company can shut off a third of all mining with a software update.
ASIC Supply Chain Compromise
Mining ASICs ship with proprietary firmware that accepts silent over-the-air updates from the manufacturer, and one vendor dominates SHA-256 ASIC production.
The full threat page — recommended controls, incident references, and citations — lands when Defending Bitcoin ships on June 15, 2026.