I do agree with you on that, having something tangible do something as magnificent as that can be eye catching and that's the focus of the new coming technological age, no one wants to implement or use something bulky, no matter how great the product is, if is bulky, the sales will be low compared to a product with a small size, i'm glad the product development team of BITFENCE kept that in mind during development
it's because it's not an actual miner, like an ASIC. From my understanding you are not confirming transactions on the blockchain, you 'mine' a reward everytime it reports a 'hackers' activity to the main network.
Let me get this straight and i'm sure some people in the community will like to get clarification on that, so what this means is, if a network was attacked by a hacker, is it BITFENCE that will automatically flag the hacker's IP as bad or will the report be done by the individual and secondly, will the sting miner do the mining automatically or does it need to be authenticated first by BITFENCE before the mining can be done?
I had similar questions Ive flipped through the whitepaper but its quite a complex project so I think more videos and documentation simplifying and explaining how things like this will work could go quite far with assuring peole