03:41:06 well we knew that was possible with .... really any kind of PoW at this point. 14:05:19 great, now we have ACM against us https://twitter.com/martinkl/status/1277934863996387331 14:07:53 arguably, current banking system consumes more power than Bitcoin miners 14:08:53 yes... but easy to argue against running both systems at once 14:10:10 actually they're only against using PoW "for supply chain management purposes (e.g., electronic product passports)" 18:34:47 they can use pow for anything, just tie it periodically to BTC POW , you do not need hundreds pows 18:37:40 you can just use it so no one will simply rewrite whole chain without expending energy (PoS utopia) and fool you into some fake data 19:02:02 does this comment about randomx-sniffer make sense? https://reddit.com/r/Monero/comments/hhwu2i/_/fwi5v83/ 19:06:55 yes 19:07:25 I mean yes, obviously malware can bypass AV programs 19:07:42 making randomx-sniffer trigger on every process in the system makes it useless, yes 19:07:57 but actively messing with other processes gives away your malware even easier 19:08:32 but could a cloud provider check the CPU registers from outside 19:08:48 and notify the user if mining is detected? 19:18:13 on the other hand, if randomx-sniffer detects rounding mode changes where they're not supposed to happen... this is also a sign 19:18:37 it can't pinpoint the exact process which is mining, but it's enough to raise a general alarm 19:19:04 so that comment makes sense and at the same time it doesn't 20:08:04 "executable don't need to be on the infected machine" - interesting point. xfer'ing a blob from a remote host for every nonce sounds kinda slow tho 20:30:54 binaries can be run from memory without files on disk, they only need to be downloaded once after each reboot