Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I'm also curious about an attack vector whereby if a coin has a single reasonably well-installed mining software stack, this effectively gives the developers of that stack control over any miner, which could easily add up to 51% if there's only a few mining software options. Sneaking in a backdoor is well within the capabilities of any developer; do the mining companies compile from source?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: