Post
Topic
Board Altcoin Discussion
Re: Does any project use the power of all the unused smartphones worldwide?
by
Twinkledoe
on 14/02/2021, 06:42:00 UTC
Hey guys, I am no techie but had the idea that it would be very smart to use/share all the unused power of smartphones (f.e. during night at sleep) for cpu works (like rendering, filecoding etc) and use its free space (even hundrets of MB shall work instead of 200 GB as filecoin needs at least).

It is so obvious to try to use those billions (!) Smartphone potential out there but I dont know any project which do so.

There are so many possibilities therefore. Right now I had the idea of creating a decentralised internet (or messenger at least) based on Bluetooth (or wifi) p2p Network, so it still works after the regular internet may break down.

This is possible since it already happened before but thankfully someone found it out and manage to warn the people on how it works. Yeah! it really does mine on its own without the phone's owner's permission. You just simply shocked when you see your battery it's already drained and those guys who create those micro miners on phones do earn a big amount of money since their program is like a virus that spreads faster than any other smartphone virus out there.

You can read more of it here: https://www.mcafee.com/blogs/consumer/mobile-and-iot-security/warning-crypto-currency-mining-targeting-android/

That's right. Not only smartphones but computers that have been hacked by these people. I believe it is still happening. But will be too late before anyone of us noticed this.

This is how to protect your phone whenever you noticed something unusual with your battery life coming from this article also.

https://www.businessinsider.com/cryptojackers-are-targeting-mobile-users-and-could-destroy-your-phone-2018-8

-Ensure your operating system and apps are updated to the latest version to ensure they remain secure.
-Only install apps from official platforms (Google Play Store and Apple's App Store).
-Avoid installing applications from unknown sources.
-Use the number of app downloads and user reviews to ensure any apps you download are the legitimate versions.
-Don't grant your apps unnecessary permissions.