They use mining application to “listen” for transactions broadcasted throughout the network and compete to crank out the mathematical proof of work by producing hashes, which aren't tricky to execute but Power intense. which is why they need specialised mining hardware named application-precise built-in circuits (ASICs). But a halving doesn’