Discover and read the best of Twitter Threads about #cryptomining

Most recents (8)

Guys arguing BTC can be classified as a security under Howey test.

1/8: Let's explore why #Bitcoin and similar #cryptocurrencies aren't classified as securities under the Howey Test. This test assesses whether an arrangement involves an investment contract. #Crypto #HoweyTest
2/8: The Howey Test has 4 key points: an investment of money, expectation of profits, a common enterprise, and efforts of a promoter or third party. Let's break these down for Bitcoin. #CryptoRegulation #Bitcoin
3/8: Investment of Money: Yes, Bitcoin miners invest money in hardware and electricity, but they're not buying an investment contract from a third party. They contribute resources to validate transactions & secure the network. #CryptoMining
Read 8 tweets
#Crypto Roundup: Top #CryptoNews This Week!

1/ #OKX, a leading crypto platform, is making a bold move by establishing a strong presence in France.

2/ The CEO of #FTX, a prominent #cryptocurrency exchange, has hinted at a significant update called '2.0 Reboot.'

3/ Hong Kong is defying regional crackdowns and embracing #cryptocurrencies.

4/ The #SEC is taking a controversial step by scrutinising #cryptomining equipment.

5/ Troubling allegations surround #Binance Exchange, suggesting the commingling of customer funds and company revenue.

Read 4 tweets
The first Network Security session at #PESW (organized by @FIT_CTU) has been started by @vaclavbartos1, the chair who introduces our speaker Lukáš Hejcman @FIT_VUT & @CESNET_cz. You may still visit us in Horoměřice at until Saturday!
Matej Hulák (@FIT_CTU & @CESNET_cz) is the second speaker. We move from Packet Capture by Lukáš H. to Traffic classification topic by Matej.
3rd speaker of "Session 3 - Traffic Capture and Detection" - Richard Plný presents #CryptoMining #detection in #network #traffic. Using #IPFIX and "weak classifiers".
Read 5 tweets
(1/6) Our facility, a Thread:

We started out as a home mining operation with 5 Whatsminer D1's, and quickly grew a passion for crypto mining. #CryptoCommunity Image
(2/6) We realized that POW was the future of crypto so we decided scaled up. #POW #CryptoMining Image
(3/6) This space was able to hold 25 miners, so we chose wisely. We found that Kadena was an immerging blockchain with innovative technology. #kda #Kadena Image
Read 6 tweets
I took a few photos over the weekend. It felt good to get out and I pressed the shutter, I realized I wasn't just taking a photo, I was also mining $KOII 🤯

How is this possible? A short 🧵on what $KOII is and how you can mine @KoiiNetwork tokens with a camera.
1/ Cryptographic tokens are mined through consensus mechanisms (i.e. Bitcoins Proof of Work) the @koiinetwork has a unique consensus mechanism called Proof of Real Traffic or PoRT whereby $KOII is mined through the verified traffic that visits a particular piece of content.
2/ When you take a photo and upload it to the @Koiinetwork it is registered as an Atomic NFT and stored permanently on the #Arweave permaweb.

Read 11 tweets
Two large #antitrust probes in the same screenshot that relate to #Genomics and #Bioinformatics
(1) Possible buyout of #ARM by #NVIDIA does have an effect on the #Bioinformatics field: many applications now are deployable on CPU/GPUs with #ARM and/or #NVIDIA chips on them. Some recent examples are:
(a) the Oxford @nanopore MinION Mk1c device, which originally was specced at Jetson TX2 ARM+Pascal GPU accelerators (ARM processor 6 cores, 256 Core GPU), 8 GB RAM (may have changed since then.
Read 42 tweets
#Campaign in tweets - @Guardicore Labs in a new tradition; we find the attacks, you get to know them and learn the attackers' tricks and techniques. This time, let's get familiarized with "Lemon_Duck", a #cryptomining campaign involving a sophisticated #propagation tool. 🍋🦆
Before we start: all scripts, binaries and IOCs are available on our github repository. In addition, malicious IPs, attack servers and domains appear on @Guadicore Cyber Threat Intelligence portal. You're welcome to take a look :)……
Lemon_Duck starts by breaching machines over the #MSSQL service or the #SMB protocol. We'll focus on the MS-SQL flow. Once inside the machine, the attacker enables #xp_cmdshell to run shell commands. It will take only a single command line to trigger the rest of the attack.
Read 12 tweets

Related hashtags

Did Thread Reader help you today?

Support us! We are indie developers!

This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!