Is there a reason why I/O bound instructions are not used in the logic for hashing done by miners?
For example, there could be specialised nodes that act as middlemen, whose sole role would be to dispatch/provide verifiable (timestamped?) pseudo random numbers from authenticated nodes. The provided pseudo random numbers would then be used as part of the hashing algorithm
The bottleneck this will create, will negate any superior speed advantage that ASICs etc. have.
Has this being tried before, and if not, why not?