Snynet Solution Logo
MON - SUN: 10 AM - 6 PM
+60 11 5624 8319


Why China's crypto crackdown can help you get a GeForce RTX 3080

Image Description

China has tightened its grip on its promise to restrict cryptocurrencies, with Coindesk reporting that Anhui, Gansu, and Henan provinces are following the crackdown in Sichuan and closing down any mining operations they can find in a bid to prevent a power shortage.

With Sichuan already estimated to be China's most prolific cryptomining province thanks to cheap power costs, it's estimated that the government ban could erase up to 90% of China's Bitcoin mining capacity. It's unclear if this will help in the long term as investors and miners will possibly look to relocate their operations overseas, but these policies should allow for some temporary respite on stock shortages.

You may have heard in recent weeks that China setting these firmer restrictions on cryptocurrencies is a cause for celebration among gamers and PC builders – but what does this actually have to do with PC gaming?

An Array Of Graphics Cards Mining Bitcoin

(Image credit: Shutterstock / GreenBelka)

Why do crypto miners need gaming GPUs?

Most of the conflict between groups is because of graphics cards; more accurately new GPUs released by Nvidia and AMD over the last 12 months. Because of a global shortage of silicon chips (caused in itself by manufacturing issues and high demand from almost every area of tech, from computers to cars and smartphones), there were already concerns regarding how much stock would be made available of new GPUs like the GeForce RTX 3080 prior to their release, especially because while they are still an expensive piece of tech, this latest generation of cards are more affordable than the previous-gen hardware. 

As a result, the best graphics cards have been snapped up en mass to use in mining rigs for cryptocurrencies such as Bitcoin and Ethereum. The process for using a GPU to 'mine' for crypto is somewhat complicated for newcomers and can differ for each cryptocurrency, but we can break down Bitcoin mining in laymen's terms.

What a Bitcoin miner does is check transactions to make sure that users have not tried to spend the same bitcoin twice by solving cryptographic equations through the use of computers, similar to counterfeit money inspection in the non-digital world. 

This process involves validating data using something called the Secure Hash Algorithm (SHA) and adding transaction records to a public record known as a blockchain. Once miners have verified 1MB worth of Bitcoin transactions (also called 'blocks') those miners are eligible to be rewarded with a number of bitcoins.

Notice how we said 'eligible' and not 'guaranteed'. Not only do miners need to solve these cryptographic equations, but they also need to be lucky enough to be the first to do so in order to earn any bitcoin as payment. As such, Cryptomining is as much about luck as it is having the hardware available to constantly run the equations.

Used GPUs on sale

(Image credit: The Block)

The spoils of (crypto)war

This is where graphics cards come in. The speed at which the SHA process is completed is measured using Hashes per second (H/s), otherwise known as the 'Hash Rate'. GPUs are far more efficient in this regard than CPUs or other hardware, and generally speaking, the more powerful the GPU, the faster the Hash rate (though Hash Rate doesn't actually make the GPU more powerful).

This is why Nvidia implemented a Hash Rate limiter across almost every card in the RTX 3000 series family, after initially introducing it with the GeForce RTX 3060. That card was selected due to its affordability, with an RRP of around $329 (about £240, AU$430). Given cryptominers are looking to make money rather than spend it buying hardware, really expensive GPUs like the GeForce RTX 3090 are less at risk of being snapped up due to them being an expensive investment.

Scalpers saw the competition between miners and gamers for the limited inventory of cards, and started using bots to clear up the available stock and inflate prices, some by almost three times their recommended MSRP for the more in demand products like the GeForce RTX 3080

In fact, China's decision to close down mining operations has had further knock-on effects to deter miners from setting up shop elsewhere, with Bitcoin dramatically falling in price as a result of its actions. This makes relocation an unwise investment for many as it's unclear if the profits made by moving would be better than selling off hardware and prevent the operations from haemorrhaging money. 

While Bitcoin isn't exactly banned in the country, Chinese banks haven't been able to handle Bitcoin since 2013, and China cited environmental policies, concerns around crypto’s volatile price, and its potential use in illegal money laundering operations as reasons for the crackdown.

Happy PC gamer celebrating

(Image credit: Shutterstock / Gorodenkoff)

The respite we needed

Thanks to a combination of the Hash Rate limiter and China closing down mining operations, gamers and PC enthusiasts might finally see the market start to settle after months of fighting to obtain what little stock was available. 

If you're happy to take a risk and buy a used product then there's also good news on that front – rather than opting to relocate, some miners have been flooding the market with second-hand GPUs over the last few weeks, with listings for GeForce RTX 3060 card being advertised as low as 1,760 yuan (roughly $270/£195/AU$360).

It's been said that cryptocurrency prices collapsing would result in both new and used GPU stock becoming more available, and with so many operations closing up shop, the west should start to see the benefits in the coming months. If you've had your eye on getting a GeForce RTX 3070 for your rig, now might be the time to start keeping an eye on prices.


15 Jul 2021



Other Blog

  • Facebook has banned news in Australia

    In response to proposed laws, the social media giant has restricted Australians from sharing or viewing all news on its platform.

    Read More
  • Tips for improving cybersecurity in the cloud

    It’s clear to see that COVID-19 has been the driving force for enterprises to adopt the cloud in recent times. Although many enterprises were already well on their way to adopting cloud in early 2020, cloud adoption has accelerated at a much faster pace than previous years.

    What’s become clear now is that there is no going back. Despite the initial perception that Software-as-a-Service (SaaS) and collaboration applications were meant to be temporary stopgap measures during lockdowns, they have quickly become the norm for employees and customers. In fact, according to a recent ONS survey, 85 per cent of UK workers want to maintain a hybrid working approach.

    About the author

    Tristan Morgan is Director of Global Advisory at BT.

    In the future, remote and hybrid work will only be done via the cloud because it alone offers the scalability, flexibility, simplified costs, and improved user experiences needed to deliver a secure, agile working environment For many, migrating to the cloud is an opportunity to reimagine business operations, innovate and even open new revenue streams, but these new approaches call for a cybersecurity rethink. The question is, how can organizations enhance the effectiveness of their risk management capabilities as they implement cloud strategies and begin to fully realize the potential benefits of this technology?

    Why cyber hygiene matter, and how it differs

    Cloud security is different from securing the on-premises infrastructure. The combination of SaaS and Infrastructure as a Service (IaaS) as well as many hyperscalers being software defined, traditional enterprise security controls may not always translate. Organizations cannot simply replicate what they had before in the cloud.

    Whenever a business decides to make the move to the cloud, it is crucial for them to understand where the data will reside and how it will be managed. Over the past year, cloud computing has evolved into a complex ecosystem of employees, customers, partners, and providers, making visibility of this data more challenging. As a result, basic hygiene has unintentionally worsened for many businesses over the last year. By concentrating on the basics of cyber hygiene, via asset and inventory management, vulnerability management, and configuration management, businesses can better understand where their most valuable information is stored, who has access to it, and where vulnerabilities exist so that they can safeguard it properly.

    Starting with the right skills means ongoing education

    Working in the cloud can simplify some aspects of security, reducing and even essentially outsourcing some of the overall risk burden of an organization. However, vulnerabilities will always remain an unfortunate part of cybersecurity, so it's critical that an organization's security team has the necessary skills and expertise to understand how to create and maintain a secure cloud architecture.

    In the rapidly advancing technology sector, cloud providers tend to make changes or updates to their products on a regular basis. If a team lacks the right skills, this level of fluctuation, combined with the sheer number of security products and services, can be overwhelming to manage. While it is important for teams to be equipped with the correct skills and knowledge from the get-go, it's also imperative for businesses to offer ongoing education and training to the team so that any data issues may be avoided in the future.

    Monitor and detect threats more effectively

    Putting workloads in the cloud isn't a one-click process. It has become increasingly important for businesses to be aware of potential risks once they've migrated. In this case, the challenge is to connect fragmented APIs, systems, and applications, and to see what's happening in real time.

    An important aspect of choosing a cloud provider is understanding what native monitoring capabilities they can provide. Cloud native controls provide a detailed view of activity and are useful for detecting suspicious activities. However, business owners should also conduct their own assessments, with the end user to the cloud, in order to identify any other potential vulnerabilities.

    Keep your guard up by adopting a zero-trust strategy

    Security services and capabilities on cloud platforms are continually improving. However, as technology continues to evolve, so do threats. It is essential that organizations adopt an ongoing risk-led improvement cycle, which translates into continuous updating and patching. Automation is the future of cloud security, however, there is still much work to be done to get there. For businesses to protect themselves in the meantime, they should consider a zero-trust strategy to guard against threats, assuming that every application is potentially malicious before verifying and trusting.

    Don’t go at it alone

    A business can gain many benefits from moving to the cloud, but there can also be some pretty serious consequences if it's not done properly. Clearly, maintaining security isn't a job that can be dealt with by one organization alone given the volumes and rates of threats present daily. Businesses should seek support from external partners to bolster in-house capabilities - making sure that everything is done right the first time around. In order to navigate the constantly changing threat landscape and to avoid mistakes others have made, partnerships are the way forward as they are a tried and tested way to access knowledge about hyperscale services.

    A great benefit of cloud services is that the focus is less on the technology and more on the outcomes. Moving to the cloud may also pose some new risks - but businesses that make the move to the cloud today, and which place security at the foundation of the cloud strategy, will reap the greatest benefits in the digital age.

    Read More
  • Nominet CEO finally ousted after months of wrangling

    Public campaign against Nominet’s missteps successfully boots out the current board.

    Read More
  • Common misconceptions about the rise of Magecart attacks

    Here are five of the biggest rumors and misconceptions surrounding Magecart.

    Read More

Find Out More About Us

Want to hire best people for your project? Look no further you came to the right place!

Contact Us