• Forum has been upgraded, all links, images, etc are as they were. Please see Official Announcements for more information

51% HASHRATE COINMINE.PL !!!

Hi,
I think you put too much attention to botnet miner because hanlab user is responsible for 41% of total hashrate in last 24 hrs. All remaining users (approx 176) on my pool generated 15% of blocks in last day. The real problem is that there is not so many miners in total to even the hashrate distribution.

The problem is: ordinary miners have to pay for electricity and so on, but hanlab not.

So ordinary miners just can't compete with bonnet(-s) and leave Dash. It isn't normal situation. And as we can't setup many "competing botnets" - it is better to kill this existing one to return to normal miners competition.
 
Hi,

I think you put too much attention to botnet miner because hanlab user is responsible for 41% of total hashrate in last 24 hrs. All remaining users (approx 176) on my pool generated 15% of blocks in last day. The real problem is that there is not so many miners in total to even the hashrate distribution.

I am repeating this again and again - I am not a malicious pool operator and I am not going to break Dash network. I even do not have such skills to do it.

My pool has IP DDoS protection but even if someone would like to stop my pool and takeover the network I believe 80% of the miners (hanlab for sure) have some backup pool configured - all hashrate will go to other pools securing the network from attacker.

Cheers,
feeleep

Greetings,

Even if you claim not to be a malicious operator your pool could get hacked and become the base of malicious activities and that even without you knowing at first. Yes, there is Hanlab but you forgot the large botnet being hosted with the over* users (now anonymous). The majority of the hashrate you are hosting comes from unknown sources.

Dash is supposedly the symbol of decentralization with it's masternode system and you are proving it's not really because the coin creation is pretty much centralized.

Being a good player and responsible you would encourage users to move their hashrate around (with more than a simple banner on your pool, we both know this doesn't do anything) as we did when we reached close to 50%.

Cryptocurrency is a trustless environment and there is so much money involved I consider one pool having over 50% a great threat at any time whoever is running it.

My 2 cents.

TL;DR? Spread hashrate, centralization is no good and goes against DASH's core principles.
 
Last edited by a moderator:
There may be a very simple answer to this - I'm the furthest thing from an expert - but doesn't InstantX "solve" this problem with transaction locking? Why not push an update that makes/enforces InstantX as default? Wouldn't that solve the issue, with the added bragging points of being the first coin to "solve" this inherent flaw in PoW coins?
 
The problem is: ordinary miners have to pay for electricity and so on, but hanlab not.

Hi,

hanlab is nicehash as far as I know...

EDIT:
Anyway - I can do few things but I cannot force miners to move somewhere else. This is actually miner choice what he is doing with his hashrate. Problem exist in hashrate centralisation, because as I said peviously hanlab (nicehash?) itself generates about 40% of DASH blocks every day. They could do their own pool and with some luck have 51% of power. it looks like majority of Dash network is in few hands only and either hanlab will find more profitable coin to mine or Dash will increase value so more miners will come.
 
Last edited by a moderator:
If Dash always need at least one instantX confirm and the the InstantX always reject mining transaction from miner which has more than 50% of hashing power.

In that case we don't need to worry about that problem.
 
I'm not liking the silence of the dev-team on this matter, this situation is creating a lot of unrest on both this forum and on the Bitcointalk forum.
A simple "we are working on a solution" would do at this point, just give some feedback to the community.

Is it something that update version 13 can possibly fix ? Has dev-team talked about this internally ? What are our options ?
Doesn't this directly undermine the marketing campaign and dev-team commitment to use that marketing campaign to get a higher Dash price ?
 
qwizzie, admin of coinmine.pl is is close contact with the devs and they do the moves to bring the hashrate lower at lvl 30-35%
 
The other miner or miners are a different story, according to this:
http://biersteker.tweakblogs.net/blog/11915/hidden-cryptominers-in-game-torrents

Did anyone contacted antivirus companies?

I guess It should be done in good English, here is some places to send the virus alarm:

[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],

web-form:
https://virusdesk.kaspersky.com
http://www.google.com/safebrowsing/report_badware/
http://www.scumware.org/add_url.scumware
http://z-oleg.com/secur/avz/uploadu.php
http://www.siteadvisor.com/sites/domain/writeComments?firstTry=1&section=domainSuggestion
http://www.c-sirt.org/
https://www.badwarebusters.org/community/submit
http://cybertopcops.com/report-malware-sites.php
http://global.sitesafety.trendmicro.com/
http://cybercrime-tracker.net/submit.php
http://app.webinspector.com/
https://analysis.avira.com/ru/submit-urls
https://support.drweb.com/new/urlfilter/
http://www.crdf.us/#contact
http://www.fortiguard.com/contactus.html
http://www.malware.com.br/contrib.shtml
http://www.malwaredomainlist.com/contact.php
https://www.stopbadware.org/report-badware
http://www.abuse.ch/?page_id=4727
https://support.avast.com/Tickets/Submit/RenderForm
http://antivirus.baidu.com/en/submit-url.php
https://analysis.f-secure.com/portal/login.html
 
Last edited by a moderator:
Did anyone contacted antivirus companies?

I guess It should be done in good English, here is some places to send the virus alarm:

[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],

web-form:
https://virusdesk.kaspersky.com
http://www.google.com/safebrowsing/report_badware/
http://www.scumware.org/add_url.scumware
http://z-oleg.com/secur/avz/uploadu.php
http://www.siteadvisor.com/sites/domain/writeComments?firstTry=1&section=domainSuggestion
http://www.c-sirt.org/
https://www.badwarebusters.org/community/submit
http://cybertopcops.com/report-malware-sites.php
http://global.sitesafety.trendmicro.com/
http://cybercrime-tracker.net/submit.php
http://app.webinspector.com/
https://analysis.avira.com/ru/submit-urls
https://support.drweb.com/new/urlfilter/
http://www.crdf.us/#contact
http://www.fortiguard.com/contactus.html
http://www.malware.com.br/contrib.shtml
http://www.malwaredomainlist.com/contact.php
https://www.stopbadware.org/report-badware
http://www.abuse.ch/?page_id=4727
https://support.avast.com/Tickets/Submit/RenderForm
http://antivirus.baidu.com/en/submit-url.php
https://analysis.f-secure.com/portal/login.html
I don't think you get it. If someone has an antivirus installed, most of the time it will warn them if they download software through torrents and from a not trusted site, but because they want the software, they bypass the antivirus warning.

So, I'm not sure what you want me to tell these antivirus software companies? :)
 
I don't think you get it. If someone has an antivirus installed, most of the time it will warn them if they download software through torrents and from a not trusted site, but because they want the software, they bypass the antivirus warning.

So, I'm not sure what you want me to tell these antivirus software companies? :)

If program has undeclared functionality that harms users (in our case - is using their CPU+GPU power without their permission for DASH mining) - this program can be classified as virus.

After this file's semantics will be added to antivirus databases - all users who is downloading-installing-running this "game" will be warned that they get not just a "game" but "game with built-in virus". It will eliminate the number of users who will run such a game.
 
If program has undeclared functionality that harms users (in our case - is using their CPU+GPU power without their permission for DASH mining) - this program can be classified as virus.

After this file's semantics will be added to antivirus databases - all users who is downloading-installing-running this "game" will be warned that they get not just a "game" but "game with built-in virus". It will eliminate the number of users who will run such a game.
If someone doesn't want their computer to be harmed, they would not download illegal software to begin with, and they would pay attention to their antivirus software warnings... But many people don't care and because they don't want to pay for software, they get whatever is "free" out there, even if their antivirus software tells them not to do it. They will disable the antivirus and get it anyway. I hope you understand this.

We can't fix stupidity, like camosoul said... lol..
 
I'm not liking the silence of the dev-team on this matter, this situation is creating a lot of unrest on both this forum and on the Bitcointalk forum.
A simple "we are working on a solution" would do at this point, just give some feedback to the community.

Is it something that update version 13 can possibly fix ? Has dev-team talked about this internally ? What are our options ?
Doesn't this directly undermine the marketing campaign and dev-team commitment to use that marketing campaign to get a higher Dash price ?

I think it's gone on far too long and we are continually being hurt by this in the markets. I do have to say though that this guy is brilliant for this idea and may even have a built in way to update the code remotely on all his zombies. Changing things on our end may only be a temp fix.

Has anyone traced any of the coins to a wallet....or is (s)he D/S'ing everything?
 
I think it's gone on far too long and we are continually being hurt by this in the markets. I do have to say though that this guy is brilliant for this idea and may even have a built in way to update the code remotely on all his zombies. Changing things on our end may only be a temp fix.

Has anyone traced any of the coins to a wallet....or is he D/S'ing everything?
And in addition, he may have done us a favor, as we get to tackle this problem head-on while the project is still relatively small. This is akin to a hacker revealing an exploit in the code.

If I know this Dev team, a solution to this has been or will be found soon, and we improve Dash again, getting it ready for prime time.
 
Other than that the misappropriated hash is directed all at one pool, I don't understand why we care how or where that hash originates - the coins would still be mined... Is it just that we worry to see so many coins in the hands of this 'bad actor'?
 
Other than that the misappropriated hash is directed all at one pool, I don't understand why we care how or where that hash originates - the coins would still be mined... Is it just that we worry to see so many coins in the hands of this 'bad actor'?

Because we are losing all "normal miners" - they just can't compete with botnet(-s).

So it is not basically about money, but about fact the DASH (mining) network is being completely captured by centralized botnet operator(-s).
 
Last edited by a moderator:
alex-ru - I'm not even sure if this can work, but i'm thinking if we post on their community forums it might get someone's attention. Here's some links to their community:

I don't know about official communities (I think most of them is buying normal game without miners inside), but judging by Russian torrent trackers, It works like this:

1. Most software is distributed by torrents, with "fixes" (so for free). No problems with viruses, miners, ... in 95% cases.
2. As soon as Antivirus starts warning about the downloading file - people start crying on torrent forums "Virus alert inside - don't install it" and so on.
 
I know myself personally, and I think people generally - would not knowingly install or even d/l infected warez. But since much warez trigger false positives from anti-virus protections, many people often ignore such warning. Problem is so many unwitting users, using public trackers especially (of which there are many) have no idea what they're downloading, or who from.
 
Because we are losing all "normal miners" - they just can't compete with botnet(-s).

So it is not basically about money, but about fact the DASH (mining) network is being completely captured by centralized botnet operator(-s).

Suppose the GPU miners made a switch to ASIC mining hardware, would that help with more evenly spreading the hashrate or is
current GPU botnet just too massive ?

link:

https://medium.com/@soleoshao/asic-dash-miner-is-in-town-f6b833d3fdcc
http://pinidea.io/
 
Back
Top