Hello folks,
Today I am entertaining the bit mining debate (the other side of the somewhat popular Bit Coin). So you ask somebody what this is and they say a complex mathematical equation of blocks that takes lots of processing power. I posed the question are you not just intruding someone’s computer and taking their personal info? The “experts” say no and this is the new currency to take over our current currency. Which that in itself raises red flags for me. So here is my astute observations and some insight into this plague:
1) Blocks are pieces that make up your hard drive therefore you are stealing my information without my express consent. (Not sure how this applies for websites and servers)
2) The processing power comes from using the virtualization and speed step on my computer again stealing from me and permanently damaging my RAM.
3) Administrator Sharing Privileges: this is something that would give you the access to my computer and something I have a feeling Windows does not come out of the box with, my guess is this is the Linux guys using the Hybrid Windows/Linux platform of Windows 8.
4) The $ appears (usually hidden) followed by the file name of the original file being mined which says 2 things, Linux is involved and you again are stealing from me.
5) Sleep deprivation and irrational and irregular behaviour – with the use of the cores on your processor and graphics card being used as well I believe a low frequency hum is created which is not heard as the threshold for human hearing is quite high on the frequency scale but effects the human body and mind on a sub conscious level. Knowing what I know about the use of sound and vibrations for crowd control and mind control this can leave people in a suggestable state, vulnerable to subliminal messaging and repetitive messaging whether it is visual, auditory or a combination of both. Which makes this very dangerous.
6) Once a hash is created it modifies the original file, lets use a website for example. You decide to mine Google well this creates a site possibly with a long extension but what this does is creates phishing sites and obscure and dated search results. Also within a normal website the spelling can become errant and the information a combination of multiple sites used in the chain. Mildly entertaining but highly irritating and severely debilitating for those using the internet for school projects and various other culture improving work.
7) This is not a virus and as such will not show up as malicious software. In a lot of cases the Internet Security company you choose is compromised and fails to run regular scans. This is computer programming done by some people seeking ultimate power and put in the hands of those dumb enough to not ask questions or think of the big picture when it comes to this. All people become extremely dangerous and only a few can decipher these people. Anybody who is self-centred and obsessed with others information and financial status are prime suspects to carry out the plot of the assholes at the head of this thing.
That’s all,
The Coinbuster