This is awesome to see, I'm glad the team have published and given us a insight as to what this miner actually looks like. I can't wait for the release, I myself; will most definitely be getting one.
I'm in love with this Stingminer. I like the fact it's small and not a huge bulky miner. Slick design and easy to mount or place anywhere in the house.
That was something which attracted me, the size of it is fantastic. Similar to a Raspberry Pi; easily can disclose it in a hidden location. Also the fact you can still mine on it from such a small system and generate some tokens is fantastic. Great workj
I do agree with you on that, having something tangible do something as magnificent as that can be eye catching and that's the focus of the new coming technological age, no one wants to implement or use something bulky, no matter how great the product is, if is bulky, the sales will be low compared to a product with a small size, i'm glad the product development team of BITFENCE kept that in mind during development
it's because it's not an actual miner, like an ASIC. From my understanding you are not confirming transactions on the blockchain, you 'mine' a reward everytime it reports a 'hackers' activity to the main network.
Let me get this straight and i'm sure some people in the community will like to get clarification on that, so what this means is, if a network was attacked by a hacker, is it BITFENCE that will automatically flag the hacker's IP as bad or will the report be done by the individual and secondly, will the sting miner do the mining automatically or does it need to be authenticated first by BITFENCE before the mining can be done?
I think the sting-minger does it all automatically. As soon as a hacker reaches into the honeypot, the trap snaps shut and the stingminer identifies the IP of the hacker and automatically reports it to the Bitfence network
so I understood the system, if I have a mistake, please correct me
Thank you, then i guess the process has been configured in such a way that it picks up flaws that has been labelled as a malicious activity, so once that activity happens, the security measures that has been put in place will alert the network and the necessary steps will follow, if that's the case, then is a good thing, my initial thought was that the community will do the reporting, which to me may have its flaws, now i'm clarified