-
I see in my wallet information that some miner is not configured correctly
```
Invalid miner configuration detected
One or more miner is trying to mine on your account but has an incorrect mining…
-
some attackers should pass unharmed through ACC and MEM, and even cause the MEM chips to release their information.
Otherwise the combo ACC + MEM is much too poweful
-
I loved having to deal with negative chips, and i'd like to see them used in other situations.
Here are a couple of ideas. Feel free to use them or get inspiration from!
1. ~~Review the cost of re…
-
### What did you do?
I ran tests.
### What did you expect to happen?
Tests pass without warnings.
### What actually happened?
The following warning was reported:
```
=================…
-
There doesn't seem to be any clear rules as to how a chip chooses which attacker to attack when more than one is passing through the chip simultaneously. I took damage in one game because the SUB chip…
-
**Describe the project you want to add with tech stack**
A crypto Web application known as Xcrypto made using REACTJS and ChakraUI library which fetches the real time data using an API (coingecko.com…
-
Bitmain will begin shipping the Z9 Equihash miner soon. Let's use this thread to discuss ASIC resistance: Is it something we want to spend the time/resources to continue, or should we embrace ASICs?…
-
Due Date: Sábado, 24 de Abril
---
Encarregues: @Telmo465 @GustavoSena
Básicos:
- [x] O que são cryptocoins / o que é a cryptomoeda?
- [x] Porque é que é importante?
- [x] Exemplos de usos pop…
-
Create a new Job that can help identify whether a coin miner is on a machine.
A first good step could be to detect the xmrig miner, which typically is installed on the machine with a ` config.json…
-
Hi developers,
Sorry for my amateurism. I am new at NFTs and Cryptocoins.
Well, I am developing an app which creates random scenes with random assets and then allows taking screenshots to users …