He also pointed out that if Bitmain or another business received control of the majority of the Ethereum network and used it for an attack, the Ethereum developers could rush the remainder of the protocol development and deploy a whole new algorithm in per week just to safeguard the network https://used-asic-miners-for-sale20525.wikibuysell.com/2050249/asic_miners_used_no_further_a_mystery