Post
Topic
Board Tokens (Altcoins)
Re: 🔥🔥🔥 [ANN][ICO] BITFENCE - REMOVE HACKERS FROM YOUR NETWORK
by
Ace44
on 12/05/2018, 06:58:45 UTC
I have checked the Bitfence Twitter and found a post and a picture of a sting miner. It looks very small and will protect you from hackers while earning crypto. I want this tiny sting miner now.
https://twitter.com/BitFence_/status/994395208967249920

This is awesome to see, I'm glad the team have published and given us a insight as to what this miner actually looks like. I can't wait for the release, I myself; will most definitely be getting one.
I'm in love with this Stingminer. I like the fact it's small and not a huge bulky miner. Slick design and easy to mount or place anywhere in the house.

That was something which attracted me, the size of it is fantastic. Similar to a Raspberry Pi; easily can disclose it in a hidden location. Also the fact you can still mine on it from such a small system and generate some tokens is fantastic. Great workj

I do agree with you on that, having something tangible do something as magnificent as that can be eye catching and that's the focus of the new coming technological age, no one wants to implement or use something bulky, no matter how great the product is, if is bulky, the sales will be low compared to a product with a small size, i'm glad the product development team of BITFENCE kept that in mind during development

it's because it's not an actual miner, like an ASIC.  From my understanding you are not confirming transactions on the blockchain, you 'mine' a reward everytime it reports a 'hackers' activity to the main network.

Let me get this straight and i'm sure some people in the community will like to get clarification on that, so what this means is, if a network was attacked by a hacker, is it BITFENCE that will automatically flag the hacker's IP as bad or will the report be done by the individual and secondly, will the sting miner do the mining automatically or does it need to be authenticated first by BITFENCE before the mining can be done?


I think the sting-minger does it all automatically. As soon as a hacker reaches into the honeypot, the trap snaps shut and the stingminer identifies the IP of the hacker and automatically reports it to the Bitfence network
so I understood the system, if I have a mistake, please correct me

Thank you, then i guess the process has been configured in such a way that it picks up flaws that has been labelled as a malicious activity, so once that activity happens, the security measures that has been put in place will alert the network and the necessary steps will follow, if that's the case, then is a good thing, my initial thought was that the community will do the reporting, which to me may have its flaws, now i'm clarified