Several obfuscated checks were added to the Raptoreum CPU miner to signal if someone attempted to modify the donation address, to steal from the developers. At this line, it checks if the donation_userRTM was modified: https://github.com/WyvernTKC/cpuminer-gr-avx2/blob/main/util.c#L1866
If it was, it fixes the donation addresses, but also adds ".1" to the address, signaling that it was modified. You can see the addresses (with the ".1" appended) here: https://github.com/WyvernTKC/cpuminer-gr-avx2/blob/main/util.c#L462
And if we check the dev address on Flockpool, you can see quite a bit of hash going to that worker: https://flockpool.com/miners/rtm/RQKcAZBtsSacMUiGNnbk3h3KJAN94tstvt
So... where did it come from? Well, we don't have to look far... here's a normal protocol dump:
https://i.imgur.com/uHmEhGK.png
Here's one from Hive:
https://i.imgur.com/8CBFl6J.png
Stealing from the few developers who do open source miner work is a good way to stop people from doing open source miner work. Further, if they're doing this to developers... God knows what they will do to their users if they can get away with it.
[link] [comments]
You can get bonuses upto $100 FREE BONUS when you:
π° Install these recommended apps:
π² SocialGood - 100% Crypto Back on Everyday Shopping
π² xPortal - The DeFi For The Next Billion
π² CryptoTab Browser - Lightweight, fast, and ready to mine!
π° Register on these recommended exchanges:
π‘ Binanceπ‘ Bitfinexπ‘ Bitmartπ‘ Bittrexπ‘ Bitget
π‘ CoinExπ‘ Crypto.comπ‘ Gate.ioπ‘ Huobiπ‘ Kucoin.
Comments