E. Snowden: Zcash is most interesting BTC alternative

An American computer professional, Edward Snowden, claims that Zcash is the most interesting Bitcoin alternative
30 September 2017   2136

Edward Snowden, an American computer professional and former CIA employee, who copied and leaked classified information from the NSA in 2013, now expresses his view on the top cryptocurrencies via Twitter. The man reponds to a user, who claims that "Zcash is the only altcoin (that I know of) designed and built by professional and academic cryptographers. Hard to ignore":

Snowden also comments on another popular cryptocurrency, Monero, arguing that it is a "great project, but the problem with amateur crypto is mistakes happen and have huge consequences for people like me". This is believed to be the reference to the fact that about 60% of Monero transactions can be linked, meaning that transactions are not as anonymous as users would have initially hoped.

The statements redulted in the flood of Twitter responses. Thus, Monero developer Richard Spagni strongly defends his project's technology, while the creator of litecoin, Charlie Lee, claims that he owns "Monero but not Zcash”.

Monero and Zcash on coinmarketcap.com

Zcash and Monero are both geared towards providing privacy for their users, but use different tools to achieve the same end result. Thus, while Zcash is based on a cryptographic operation called zk-snarks, Monero works by obfuscating information with ring signatures and stealth addresses.

Chinese Miners to Fall Victims of Ransomware

Looks like ransomware came together with "improved" firmware, that should "overclock" device
21 January 2019   79

In China, a ransomware spreads, victims of which are Bitcoin miners. The damage from its activities is measured in tens of thousands of dollars. This is reported by Trustnodes.

The virus infects miners, released by Bitmain, and requires you to send 10 bitcoins, otherwise threatening to cause overheating of the device.

The problem is solved by formatting the SD card of the infected device, however, as Trustnodes notes, the whole process can take up to four days, while malicious software rapidly spreads to the other miners.

Compromised device
Compromised device

Probably, the virus comes with an "improved" firmware for miners. Some owners install such firmware to “overclock” their ASIC devices and improve their performance.

The first messages about the virus refer to August last year. In particular, Antminer S9, T9 and even L3 + for Litecoin were attacked. Over time, the malware has been improved. Now its distributor himself can decide when to display a message requesting a ransom. One miner also said that one night the address to which the 4,000 devices belonging to him sent the mined cryptocurrency was changed to the address of the hacker, which brought him $ 8,000.