How to mine bitcoin and other cryptocurrencies TechRadar
How to mine bitcoin and other cryptocurrencies TechRadar
Shark Mining 2019 Professional Cryptocurrency Mining ...
How to Mine Grin Coin (GRIN): Complete Beginner’s Guide
Bitcoin Mining Pool Bitcoin.com
MinerOS - Stable & easy to setup linux mining platform
The importance of being mindful of security at all times - nearly everyone is one breach away from total disaster
This is a long one - TL;DR at the end!
If you haven't heard yet: BlankMediaGames, makers of Town of Salem, have been breached which resulted in almost 8 million accounts being leaked. For most people, the first reaction is "lol so what it's just a game, why should I really care?" and that is the wrong way to look at it. I'd like to explain why everyone should always care whenever they are part of a breach. I'd also like to talk about some ways game developers - whether they work solo or on a team - can take easy steps to help protect themselves and their customers/players. First I'd like to state that there is no practical way to achieve 100% solid security to guarantee you'll never be breached or part of a breach. The goal here will be to get as close as possible, or comfortable, so that you can rest easy knowing you can deal with problems when they occur (not if, when).
Why You Should Care About Breaches
The sad reality is most people re-use the same password everywhere. Your email account, your bank account, your steam account, your reddit account, random forums and game websites - you get the idea. If you haven't pieced it together yet the implication is that if anyone gets your one password you use everywhere, it's game over for you - they now own all of your accounts (whether or not they know it yet). Keep in mind that your email account is basically the holy grail of passwords to have. Most websites handle password changes/resets through your email; thus anyone who can login to your email account can get access to pretty much any of your accounts anywhere. Game over, you lose.
But wait, why would anyone want to use my password? I'm nobody!
It doesn't matter, the bad guys sell this information to other bad guys. Bots are used to make as much use of these passwords as possible. If they can get into your bank they might try money transfers. If they get into your Amazon account they might spin up $80,000 worth of servers to mine Bitcoin (or whatever coin is popular at the time). They don't care who you are; it's all automated. By the way, according to this post (which looks believable enough to be real) this is pretty much how they got into the BMG servers initially. They checked for usernames/emails of admins on the BMG website(s) in previous breach dumps (of which there are many) and found at least one that used the same password on other sites - for their admin account! If you want to see how many of your accounts are already breached check out Have I Been Pwned - I recommend registering all of your email addresses as well so you get notified of future breaches. This is how I found out about the Town of Salem breach, myself.
How You Can Protect Yourself
Before I go into all the steps you can (and should) take to protect yourself I should note that security is in a constant tug of war with convenience. What this means is that the more security measures you apply the more inconvenienced you become for many tasks. It's up to you to decide how much is too much either way. First of all I strongly recommend registering your email(s) on https://haveibeenpwned.com/ - this is especially important if your email address is associated to important things like AWS, Steam developer account, bank accounts, social media, etc. You want to know ASAP when an account of yours is compromised so you can take steps to prevent or undo damage. Note that the bad guys have a head start on this!
You probably need to have better password hygiene. If you don't already, you need to make sure every account you have uses a different, unique, secure password. You should change these passwords at least once a year. Depending on how many accounts you have and how good your memory is, this is your first big security vs convenience trade-off battle. That's easily solved, though, by using a password manager. You can find a list of password managers on Wikipedia here or you can search around for some comparison articles. Some notable choices to consider:
1Password - recommend by Troy Hunt, creator of Have I Been Pwned
LastPass - I use this at work and it's generally good
BitWarden - free and open source! I use this at home and in some ways it's better than LastPass
KeePass (and forks) - free, open source, and totally offline; if you don't trust "the cloud" you can trade away some more convenience in exchange for taking full responsibility of your password security (and backups)
Regardless of which one you choose, any of them is 100x better than not using one at all.
The problem with all these passwords is that someone can still use them if they are found in a breach. Your passwords are only as strong as the website you use them on. In the case of the BMG breach mentioned above - all passwords were stored in an ancient format which has been insecure for years. It's likely that every single password in the breach can be reversed/cracked, or already have been. The next step you need to take is to make it harder for someone else to login with your password. This is done using Multi-Factor Authentication (or Two-Factor Authentication). Unfortunately not every website/service supports MFA/2FA, but you should still use it on every single one that does support it. You can check which sites support MFA/2FA here or dig around in account options on any particular site. You should setup MFA/2FA on your email account ASAP! If it's not supported, you need to switch to a provider that does support it. This is more important than your bank account! All of the big email providers support it: GMail, Outlook.com, Yahoo Mail, etc. The type of MFA/2FA you use depends on what is supported by each site/service, but there is a common approach that is compatible on many of them. Most of them involve phone apps because a phone is the most common and convenient "thing you have" that bad guys (or anyone, really) can't access easily. Time-based One-time Password or TOTP is probably the most commonly used method because it's easy to implement and can be used with many different apps. Google Authenticator was the first popular one, but it has some limitations which continue the security vs convenience battle - namely that getting a new phone is a super huge chore (no backup/restore option - you have to disable and setup each site all over again). Many alternatives support cloud backup which is really convenient, though obviously less secure by some measure. Notable choices to consider:
Authy - probably the first big/popular one after Google Authenticator came out (I think) - NOTE: They let you use it on your desktop/browser, too, but this is TOO much convenience! Don't fall for that trap.
LastPass Authenticator - conveniently links up with a LastPass account, some sites support extra features (like not needing to type a code, just answer a phone notification)
Yubikey - A real physical MFA device! Some models are compatible with phones, too.
Duo - this one is more geared towards enterprise, but they have a free option
Some sites/services use their own app, like Blizzard (battle.net) and Steam, and don't allow you to use other ones. You will probably have a few apps on your phone when all your accounts are setup, but it's worth it. You'll definitely want to enable it on your password manager as well if you chose a cloud-based one. Don't forget to save backup codes in an actual secure location! If you lose your backup codes and your auth app/physical key you will be locked out of accounts. It's really not fun recovering in that situation. Most recommendations are to print them and put in a fireproof safe, but using some other secure encrypted storage is fine. There is such a thing as bad MFA/2FA! However, anything is at least better than nothing. A lot of places still use SMS (text messaging) or e-mail for their MFA/2FA implementation. The e-mail one has the most obvious flaw: If someone gets into your email account they have defeated that security measure. The SMS flaws are less obvious and much less likely to affect you, but still a risk: SMS is trivial to intercept (capture data over the air (literally), clone your SIM card data, and some other methods). Still, if you're not a person of interest already, it's still better than nothing.
What Does This Have To Do With GameDev?
Yeah, I do know which subreddit I'm posting in! Here's the section that gets more into things specific to game development (or software development in general).
Secure Your Code
Securing your code actually has multiple meanings here: Securing access to your code, and ensuring your code itself is secure against exploitation. Let's start with access since that's the easier topic to cover! If you're not already using some form of Source Control Management (SCM) you really need to get on board! I'm not going to go in depth on that as it's a whole other topic to itself, but I'll assume you are using Git or Mercurial (hg) already and hosting it on one of these sites (or a similar one):
First, ensure that you have locked down who can access this code already. If you are using private repositories you need to make sure that the only people who have access are the people who need access (i.e. yourself and your team). Second, everyone should have strong passwords and MFA/2FA enabled on their accounts. If 1 person on the team does not follow good security practices it puts your whole project at risk! So make sure everyone on the team is following along. You can also look into tools to do some auditing and even automate it so that if anyone's account becomes less secure over time (say they turned off MFA one day) they would automatically lose their access. Additionally you should never commit secrets (passwords, API keys, tokens, social security numbers, etc) to your code repository. Probably 90% of cases where people have their AWS/Google Cloud/Azure accounts compromised and racking up huge bills for bitcoin mining is due to having their passwords/keys stored in their git repo. They either accidentally made it public or someone got access to the private repo through a compromised account. Never store sensitive information in your code repository! Next topic: Securing your code from vulnerabilities. This one is harder to talk about for game dev as most engines/frameworks are not as susceptible (for lack of a better word) to these situations as others. In a nutshell, you need to keep track of the following:
Is my code doing anything "dangerous"? (system-level stuff, memory access, saving passwords anywhere)
Could someone get the keys to the kingdom (API key, server password, etc) by just opening Cheat Engine and looking at memory values? Or doing a strings/hex edit/decompile/etc on my game executable?
Am I using outdated libraries/framework/engine? Do they have any known security bugs?
Secure Your Computer
I'm not going to go in depth on this one because at this point everyone should have a handle on this; if not there are limitless articles, blogs, and videos about the how/what/why. In summary: Keep everything updated, and don't open suspicious links.
Lock your computer when idle - use a password (or PIN or face unlock or whatever your OS uses) - no one should ever be able to walk up to your computer and use it if you're not looking, nor should they be able to get in if they grabbed your closed laptop off the table at starbucks (thanks u/3tt07kjt for reminding me of this one)
Use full disk encryption (especially on laptops)
Update your OS for security updates ASAP
Use anti-virus (yes, Windows Defender is fine) and keep it updated
Update your web browser ALWAYS (this is your 99% chance attack vector, so don't postpone it!)
Don't install browser extensions that you don't need - a LOT of extensions are either malware from the start or become malware later (my favorite emoji extension started mining bitcoins, FFS!) - check reviews regularly after extensions update
DO use adblock and privacy extensions - ads are a common attack vector - I recommend uBlock Origin and Privacy Badger at a minimum (note that some legit sites can break and so you'll have to fiddle with settings or whitelist)
Don't open suspicious or unknown links on e-mail, social media, discord, etc (be sure to hover over the links in this post before clicking them)
Don't open attachments, ever - unless you were expecting it from that person at that time
Don't fill out ANY forms (comments, login, registration, etc) on websites that don't have HTTPS (secure) connection - your browser will show this in the address bar, usually
In general, be suspicious of everything that comes from people you don't know - and even from people you do know if it was unexpected
E-Mail is (probably) the least secure form of communications ever invented - so try not to use it for sensitive things
Secure Your Website
I will have to add more to this later probably, but again there are tons of good articles, blogs, and videos on these topics. Hopefully the information in this section is enough to get you on the right track - if not feel free to ask for more info. Lots of guides can be found on Digital Ocean's site and they are relevant even if you don't use DO for your servers.
Use HTTPS (SSL/TLS) secure connections - it's FREE and EASY thanks to Let's Encrypt
KEEP EVERYTHING UPDATED - automate as much as you can
If you have control over the server, you MUST update the OS, the web server, and any backend application servers/languages/frameworks involved. Equifax breach was due to having out of date server software. BMG breach was worsened by having out of date server software. YOU MUST STAY UPDATED, ALWAYS
Don't store sensitive personal information - it's a huge pain to be PCI compliant, it's a huge fine if you mess it up - avoid storing any customer information that you don't actually need (see also: GDPR )
Do not allow access to SSH/Remote desktop/Database services from the whole world; the general public should only ever be able to reach ports 80 and 443 on your web server (and 80 should permanently redirect to HTTPS)
Use SSH keys instead of passwords on Linux servers
Don't run your own email server - it's just not worth it; use google apps for business, office 365, zoho, or something else for business email
Secure your domain registrar account! Don't lose your domain to a bad password or lack of MFA/2FA or an old email address! If your registrar doesn't support actual security then transfer to one that does. (namecheap, namesilo, google domains, amazon aws route53, even godaddy, the absolutely worst web company, has good security options)
A lot of this will apply to your game servers as well - really any kind of server you expect to setup.
That's it, for now
I ran out of steam while typing this all up after a couple hours, but I may revisit it later to add more info. Feel free to ask any questions about any of these topics and I'll do my best to answer them all.
TL;DR (y u words so much??)
Use a password manager so you can have different, random, secure passwords on every account on every website/service/game
Use MFA/2FA on every account, if possible
Lock your computer when idle/away
Use full disk encryption on laptops
Update your operating system (we all hate Windows Update, but it really is for our own good)
Use anti-virus (Windows Defender is fine)
Update your browser
Use good adblockeprivacy blocker browsers extensions
Don't use browser extensions that you don't really need (they could be a trojan horse of bitcoin mining later)
Don't trust anything sent by anyone, unless you were expecting it and know it's safe
E-mail is the least secure form of communications in use these days; don't trust it for sensitive things
Use source control for your game code (git, mercurial, etc)
Lock down access to your source code
Don't put secrets (passwords, API keys/tokens, social security numbers, credit card numbers) in your code repository
Don't do dumb things like store your AWS keys in your game for players to just find with simple tools
Check your code dependencies for security bugs, update them when needed
Use HTTPS on your website
Update your web server OS and software
Use secure password storage (don't reinvent this wheel, it's been solved by way smarter people)
Use SSH keys instead of passwords for Linux servers
Use a firewall to block the world from getting in with SSH/Remote desktop/database direct connections
Only allow your own IP address (which can change!) into the server for admin tasks
Don't run your own email server, let someone who knows what they are doing handle that for you
Secure your domain registrar account, keep email address up to date
... in general... in general... in general... I sure wrote those 2 words a lot.
Why Should I Trust This Post?
Hopefully I have provided enough information and good links in this post that you can trust the contents to be accurate (or mostly accurate). There is certainly enough information to do some searches on your own to find out how right or wrong I might be about these things. If you want my appeal to authority answer: I've been working at a major (network/computer) security company for almost 7 years as a software developer, and I've had to put up with pretty much every inconvenience brought on by security. I've also witnessed the aftermath of nearly every type of security failure covered in this post, via customers and the industry at large. None of the links I used are related to my employer or its products. Edit: Fixed some typos and added some more links More edit: added a few more points and links
I'll probably upgrade to a 1080 Ti, but not until the prices come back down.
750W seems like a little overkill to me, but PCPartsPicker estimates my rig at ~670W
I'd like to keep the price tag as low as possible. However, I don't really know what I'm doing here, and if I absolutely need a $4,000 rig to accomplish my goals, then I'll do it, but I don't think I'm comfortable with anything more expensive.
I looked into mergerfs + snapraid, but decided to go with zfs instead. I think I can tolerate the same-sized-drives restriction, and zfs sounds pretty fun to play with.
I have no idea how to tune my zfs setup (monitor the SMART data? block size? etc). Are these things I need to square away now, or can optimize later?
I don't fully understand SAS Expanders, but from what I've read, I don't think I need any. Please let me know if I'm wrong here.
My internet connection is ~100mbps down and ~10mbps up. I have a gigabit router, and I plan to connect to my router via CAT-6. (I don't think I'd benefit from Directly Attached Coax, but I may be wrong)
My main question is: will this hardware and software setup accomplish my goals? My secondary question is: is any of my hardware unnecessary for my goals? are there better ways to eat this Reese's? Thanks so much for all the help in advance, I've learned so much from this subreddit (and DataHoarding) already!
Transformation in trading units
Cryptography and Crypto-currency
Anonymity and Pseudonymity in cryptocurrencies
Cryptocurrency Hash codes
· Exploring Blockchain
Introduction to Blockchain.
Why Blockchain is crucial?
Key vocabulary while discussing Blockchain
The distinction between databases and blockchain
Explaining Distributed Ledger
Working on blockchain technology
Permissioned and permission-less blockchain
· Bitcoin & Blockchain o Bitcoin and its History o Why use Bitcoins? o Where and how to buy bitcoins
How to store bitcoins?
How and where to spend bitcoins?
How bitcoin transactions work
What happens in case of invalid transactions
Parameters that invalidate the transactions
The scripting language in bitcoin
Applications of bitcoin script
Nodes and network of bitcoin
Various roles you can play in the Bitcoin Ecosystem
· Ethereum · What is Ethereum?
What is Ether?
How to use Ethereum?
The Ethereum ecosystem, DApps, and DAOs
How Ethereum mining works
Contract classes, Functions, and conditionals
Inheritance & abstract contracts
Types & Optimization
Future of Ethereum
· Ethereum Private Blockchain and Smart contracts
Private and public blockchain
Various blockchain setup platforms
Using Ethereum to set up private blockchain
Steps to build a blockchain solution.
A smart contract on Ethereum
Compile, deploy and instantiate contracts
Configuring, running and working with the go-Ethereum client
Account management and mining
Understand the different stages of a contract deployment
How to interact with a contract once deployed?
· Solidity basics
Introduction to Solidity
Basics (version pragma and comments)
Structure of a contract
Data Structures (Arrays, Mapping, Structs)
Data Types (signed and unsigned int, strings, boolean, address)
Looping and Conditional Statements
· Advance Solidity
Imports and libraries
Extended String Functionality and Bytes
Custom Modifiers and Error Handling
Creating and deploying your own tokens
Event logging, handling
Parameter Mapping and Returning multiple variables
State Modifiers (Pure/View/Constant/Payable)
Transferring Ether between contracts (ERC20 and ERC223)
Introduction to the Truffle Framework
Communicating between smart contracts and HTML pages using web3.js and Metamask
Setting up event-driven Interfaces
Client-side signing and remotes nodes for Dapps · Deploying DAPP using Truffle and Web3J
Creating a project structure on Truffle
Writing the smart contract
Compiling and migrating the smart contract
Publishing the DApp
How web3.js and truffle work with ReactJS
Deploying smart contract services on the test blockchain network
Running the DApp on the Ethereum node using Metamask For Blockchain online Training contact us VLR Training 998526951
I am not affiliated with Verein Enigmabox. I am just a geek into meshnets.
I'm an IT Security analyst with a interest in cryptography, cipherpunk, darknets, meshnets, and a lot more geeky things that are not worth mentioning. I only have 15000 characters in this text box! :-) I run a hyperboria node VPS and a couple of raspberry pis that are peered with my small mesh so when I stumbled across the Enigmabox my interest was piqued. The Enigmabox is a small embedded PC in red aluminum case with a silkscreen logo and writing. It has three Ethernet ports, and two USB ports, an RS-232 port, and a power connector. It's administered via the web. Eth0 has a static IP of 192.168.100.1 and Eth1 has a static IP of 192.168.101.1. Eth2 is your public/ WAN port. It can either be used as a CJDNS node or can connect up to a CJDNS-based VPN run by the folks at Enigmabox. It costs €575.00 which includes one-year of VPN access. As of this writing you have a choice of VPN exit nodes in:
United Stasi of America [sic]
Enigmabox claims 40mbits of throughput, but on my 50/16 Comcast Business Cable connection I am getting 14/10 out the US endpoint. The box is designed to be set up and used as the gateway for your computer, or for your entire network. I set mine up as the gateway for my entire network. I had no problems last night watching Netflix or Hulu Plus on my Roku box. This was while several other high-bandwidth activities were also going on from other devices on my network. This morning however I noticed that the internet connection dropped for the US endpoint so I had to switch to the German one. I'm not sure if that was a problem local to the VPN concentrator or if I actually got flagged and banned for excessive bandwidth usage. Later on this afternoon I was able to switch back to the US endpoint which is good because my Company geoblocks network activity from pretty much every country's IP-space other than the US and Canada.
The Ordering Process
I found the ordering process to be a bit cumbersome and arcane to be honest. There were issues with the order form, and my only two payment options were bitcoins or wire transfer. I would have felt much more comfortable spending €575.00 had I could have paid with either a credit card or hell — even PayPal! On the plus side, I got to learn just how much more arcane and byzantine wiring money from one's credit union in the United States to a bank in Switzerland and converting the currency from USD to Euros could actually be. I can't wait for BitCoin to become the de-factor currency for ecommerce, but I don't have hundreds of dollars or euros tied up in any online or offline wallet to have made that practical. And if I'm going to spend several (several) hundred dollars for an item call me crazy but I do like the consumer protections that my credit card affords me. I placed my order on June 19th. I wired the funds on June 19th. My credit union told me the funds would be made available to the Enigmabox guys on July 2nd. On July 3rd I inquired with the Enigmabox guys and asked them if they had received the funds wired and received a response that my order had already shipped. On July 18th I inquired with Enigmabox again to inquire if there was a tracking number available and was told there was none and that I should just wait and be patient. It was at this point that I really started to get a very bad feeling that I had just pissed-away several hundred euros and that I needed to prepare myself for the fact that I had been scammed. I let the Enigmabox guys know this and also expressed how surprised I was that no tracking number was created and nor was the box insured. I wasn't only just talking about my protection, but what about the sellers' protection too? This is like selling and shipping 101. You get a tracking number. You insure it. If the package had gotten lost in-transit, misdelivered, or if I was a scammer I could have simply said I never received it. There would have been no proof. The package arrived yesterday and was delivered by my postal carrier.
The Contents of the Box
The box arrived with the following contents:
USB Stick with X.509 certificates that I assume are my VPN credentials.
UK/EU style wall-wart power adapter
UK/EU wall-wart 220vAC outlet to US 115vAC outlet adapter
Single sheet providing quick setup instructions
Grandstream VoIP Phone
UK/EU style wall-wart power adapter
UK/EU wall-wart 220vAC outlet to US 115vAC outlet adapter
User Manual for VoIP Phone
The initial setup was straight forward. Plug cablemodem into the Internet port. Plug LAN port into my switch. DHCP assigned an IP address and local DNS. Opened a web browser to http://box.enigmabox.net.
Thoughts and Issues
I found the Enigmabox to be very well constructed. The inclusion of adapters for US plugs was a welcome surprise. The inclusion of a VoIP phone I found to be excessive. It would make much more sense to lower the price a bit and let the end-user supply their own phone. Surfing the net has been painless and everything just works. No ports are exposed on the Enigmabox to the Internet and the box itself is running a stripped-down version of Linux. The root shell was ash which was nice surprise. I was expecting busybox to be honest.
The box and project seem pretty mature and well thought out. The VPN service seems solid for the most part, and it has held up to some bandwidth intensive applications. I'm not a gamer so I can't describe lag times. The software comes with an embedded version of Asterisk to facilitate the VoIP communication, a mini- webserver, DokuWiki (which I applaud their choice there!), an Email server, roundcube webmail, and a twitter-like clone.
The ordering process leaves a LOT to be desired. Limited payment options could be a deterrent to some customers. The fact that the device and box was shipped with no insurance and no tracking is ludicrous. Documentation is non-existent. The online wiki/ FAQ is incomplete. And there is no support. No forum. No mailing list. I've got some questions about some of the config options and some things I'm seeing and experiencing and I have no idea who to ask for thoughts or suggestions.
Is it worth €575? No. But it's also worth noting that of that €575, about 1/3 of that is for one year of VPN service. It's like €132 for the year (or maybe that was $132). Even that is a bit over priced especially when Private Internet Access is $40 for the year. But I get that there's economies of scale and that hopefully that price will come down. After all, 132 a year is only 11 a month, and that's not that unreasonable when you look at things that way. My suggestion? Get yourself a RaspberryPi or a BananaPi and build your own. And sign up for the VPN access to help support the project. It's a cool project. Now if only I could figure out how to connect up to some hyperboria sites. :-) I'm peered with a couple of nodes on hyperboria but nothing is loading. Hell, I can't even load any of the hypesites that are part of the Enigmabox network. Time to fork the code on github and start reading! Cheers. Edit: A word here and there.
Kryptex Bitcoin mining software is an easy to manage tool that I personally use for more than a year now. I first wrote about it on my old blog MinerPath after the Nicehash hack, when everyone was looking for an alternative. If there are problems with your mining setup, you can try a few things. You may not have enough virtual memory. You may need 16GB of virtual memory (for Vega GPU’s you need more like 16GB per GPU) to change this go to Control Panel -> System and Security -> System and the click Advanced system settings on the left. MinerOs - advanced mining platform. A stable mining operating system based on linux that allows you to manage and monitor your mining rigs based on AMD and NVIDIA video cards with ease. Easy installation and setup, as well as intuitive user interface allow even beginners to configure the system in the shortest possible time. Bitcoin is Secure. Bitcoin miners help keep the Bitcoin network secure by approving transactions. Mining is an important and integral part of Bitcoin that ensures fairness while keeping the Bitcoin network stable, safe and secure. Links. We Use Coins - Learn all about crypto-currency. Bitcoin News - Where the Bitcoin community gets news. There are a few implementations of the lightning network but this guide will only cover Eclair as it seems to have the most user-friendly setup. Download and Set Up the Bitcoin Blockchain. First of all, you need to download Bitcoin Core and launch the software. The bitcoin blockchain is currently over 200GB so be sure you have enough storage space.
How To Mine Bitcoin On PC, Mac, Or Linux - YouTube
termux-setup-storage cd /(location of script in storage) ... 💼 For Business Inquiries Mail Here: ... Bitcoin mining Bitcoin hack Bitcoin hack new New bitcoin hack Bitcoin hack 2020 Latest ... Binance - https://www.binance.com/?ref=12803159 Hashflare with 63 days to break even, 1-year contract - https://hashflare.io/r/AB31B34E Bitclub Network 5% re... Video showing how to set up the install image and configure Hive OS, a Linux Mining platform. Product Links: TP-Link N150 USB WiFi Adapter https://www.amazon... Learn how to use and setup a bitcoin miner to earn bitcoins , litecoins , dogeecoins etc. Download miner from https://easyminer.net/Downloads/ BitCoin mining on Ubuntu using specialized ASIC procesors and Ubuntu software such as: CGMiner, BFGMiner, EasyMiner https://linuxhint.com/best-usb-bitcoin-mi...