-
gingeropolouswell we knew that was possible with .... really any kind of PoW at this point.
-
hycgreat, now we have ACM against us twitter.com/martinkl/status/1277934863996387331
-
sech1arguably, current banking system consumes more power than Bitcoin miners
-
hycyes... but easy to argue against running both systems at once
-
sech1actually they're only against using PoW "for supply chain management purposes (e.g., electronic product passports)"
-
gethhthey can use pow for anything, just tie it periodically to BTC POW , you do not need hundreds pows
-
gethhyou can just use it so no one will simply rewrite whole chain without expending energy (PoS utopia) and fool you into some fake data
-
selstadoes this comment about randomx-sniffer make sense? reddit.com/r/Monero/comments/hhwu2i/_/fwi5v83
-
sech1yes
-
selstaI mean yes, obviously malware can bypass AV programs
-
sech1making randomx-sniffer trigger on every process in the system makes it useless, yes
-
sech1but actively messing with other processes gives away your malware even easier
-
selstabut could a cloud provider check the CPU registers from outside
-
selstaand notify the user if mining is detected?
-
sech1on the other hand, if randomx-sniffer detects rounding mode changes where they're not supposed to happen... this is also a sign
-
sech1it can't pinpoint the exact process which is mining, but it's enough to raise a general alarm
-
sech1so that comment makes sense and at the same time it doesn't
-
hyc"executable don't need to be on the infected machine" - interesting point. xfer'ing a blob from a remote host for every nonce sounds kinda slow tho
-
sech1binaries can be run from memory without files on disk, they only need to be downloaded once after each reboot