How to let others mine for me
to prevent hackers from mining with your machine is just like anti malware. Don't visit messy websites, Download messy software, insert picked up USB flash drives, install anti-virus software (Windows Defender on windows is very good, but it's too strict), check and kill viruses regularly, and check abnormal processes and files regularly. If a program attracts UAC, If you don't understand, try to choose no, and don't believe that "it may be misled by anti-virus software". If possible, you'd better install an isolation machine, shadow system, or create a virtual machine directly with Hyper-V of windows system for daily work
for Android phones, phones before Android 6 are unlikely to win. After all, mobile phone mining also needs good hardware. After Android 6, mobile phones have the management of the authority of each application, as long as they don't go blind root, don't install applications of unknown origin, try to download apps from the official market and rece the unnecessary authority as much as possible (you can also use "refrigerator" and "black domain" to prohibit other apps from running in the background)
for the mobile phones of apple, windows and other operating systems, I think that as long as we don't break the prison blindly and keep the system in the latest version, we can prevent the hooliganism of most apps.
1. Back up important data and photos and restore factory settings. Don't install applications from unknown sources. In addition, don't authorize in permission settings
2. You can swipe the computer to see if it can't work. Besides, the computer needs to clean up the memory on time so that it won't get stuck. The memory of the mobile phone is seriously insufficient. It is recommended to clean up the memory lightly, and then restart your mobile phone again
3. Clear the data of the mobile phone. If there are important things, save them on the network disk first, and then restore the factory settings three times. This is safer
< H2 > extended data:
1. Set the security level of the browser. Our common browsers all have the function of security level setting. Through reasonable setting, we can effectively filter the access restrictions of some illegal websites, so as to rece the damage to computers and personal information
2. Firmly resist reactionary, pornographic and violent websites. On the one hand, these bad information will affect the physical and mental health of teenagers, on the other hand, many illegal websites will use browser vulnerabilities to attack users3. Don't click illegal links at will
When downloading software and materials, we should choose the regular website or official website5. Turn off some sensitive functions in common communication software. Such as "people nearby" in wechat and "allowing strangers to view photos" in wechat privacy
6. Do not take photos of your family and address. If it goes on like this for a long time, as long as it is analyzed and summarized by others, the information exposed will become a complete set of information, which hides all kinds of unpredictable risks
Do not test related information on the Internet. Some websites do surveys and ask for information about age, hobbies, gender, etc. to do it for a small profit. This information may be used by others, and graally summarized, and sold to others for profit or threatIn fact, it's not difficult. When we use mobile phones everyday, there will be some background applications, which will be "killed" after restart. However, if the mobile phone is hacked and rebooted, it will enter a high load state again, and the system running memory will be used up quickly. Therefore, if the mobile phone is stuck, hot or dead for no reason, it may be g
it is possible that hackers steal all the information before using mobile phones to "mine" cryptocurrency. People will not only encounter problems such as cell phone stuck, fever and even crash, but also other financial losses
moreover, it is worth noting that some mobile mining apps, in the name of "mining", allow users to invest money and continue to develop offline
First of all, mobile phone mining is different from bitcoin mining! If bitcoin's computing power is "hardware" mining, then mobile phone's mining computing power is "software" mining
bitcoin is rich from mining. Mobile phone mining is to let us get rid of mining addiction, zero investment, and make a little money by using the idle time of mobile phone
the concept of bitcoin was first proposed by Nakamoto on November 1, 2008, and was officially born on January 3, 2009 [1]. According to the idea of Nakamoto, the open source software is designed and released, and the P2P network on it is constructed. Bitcoin is a virtual encrypted digital currency in the form of P2P. Point to point transmission means a decentralized payment system
if it must be divided into high-end and low-end, most of the so-called blockchain projects in the form of online earning projects are low-end
generally speaking, the concept of blockchain mining is taken out, that is to say, the hot spots of blockchain are rubbed to attract people to join. It can be seen that there will inevitably be some fraud projects
moreover, many projects will be completed in the months of 2018, and internal tests will be carried out. Now, if you want to do mobile phone mining, you have to make an appointment. If you get the invitation code, you have the opportunity to participate in mobile phone mining
first of all, this kind of mining project is a kind of blockchain mining, which is not the same as those who buy more than 10 mining machines. If you think there is a real advertisement for mining, you have to be careful. Maybe it's a cheater's project
several important data of mobile phone Mining: Blue Diamond and red diamond, energy
the specific operation is generally as follows:
after registering a member, the data of blue diamond, red diamond and energy will appear. Some platforms have gifts, which can be displayed on them
generally,
only blue diamond can withdraw cash. Of course, blue diamonds can also be exchanged for red ones. By mining. In general, it is generated every 30 minutes
Red Diamonds are used to play small games or draw prizes. They are also obtained from mining. Generally, they are proced once every two hours
energy is an important value.
the digital gold of the future: PI. Mobile phone free dig
the development of the project is divided into four stages:
the first stage is the simulator stage, which is a period of high output and high rate of the whole project. The mining speed is the fastest and the output is the highest. At this stage, KYC (real name authentication) scheme will be tested
this phase will start on March 14, 2019, run for about a year, and will end at the end of March 2020< br />< The above is done & gt
the second stage is the test network stage. In the early stage of this stage, KYC (real name authentication) will be opened in a large range, and applications will be put on the shelves and test nodes will be launched; Later will test the main network, wallet, etc
this phase will start at the end of March 2020 and run for half a year to one year< br />< The above is in progress & gt
the third stage is the main network stage. In this stage, every miner will have his own wallet address, and the PI in his hand can be exchanged freely. Only at this time can PI have real value and price, and you can use pi to shop and exchange for legal money
this stage is expected to start in the second half of 2020 or 2021. In the first half of the year, there will be exchanges online
the fourth stage is after the main network. After the main network, the whole system will no longer be interfered and controlled by the project party or non project party, and will run freely and spontaneously. The specific development situation is immeasurable, which may be tens of millions, hundreds of millions, or even billions of user groups
if you want to see the whole picture of this project, it is estimated that it will take at least three years, that is, 2021
as long as you are patient and ambitious, let's witness together and look forward to your joining!
세 51032; 49345;
##Domestic mobile phone mining bee coin
the recent craziness of bitcoin makes people feel ethereal. From a bowl of 100 instant noodles to the current 6W dollars, no one knows what kind of posture bitcoin will appear in the next stage
recently, I've been idle and bored. I've looked at bitcoin and tried to dig some. Although the income is not as good as before, a normal home computer still earns 20 yuan a day. At present, there are a lot of bitcoin mining software, and some of them have been tried. Many platforms are rubbish, such as honeyminer. Although it is simple and easy to use, who uses it knows. I still suggest using niecash to dig, and the profit should be about twice that of honeyminer
bitcoin needs powerful GPU support. The better the GPU, the stronger the capability. So I found out if I could dig some coins with my mobile phone
at present, mobile phone coin digging software mainly includes PI coin and bee coin. The former requires overseas Apple's IP download software, and it was launched in 2019. At present, it has been halved three times, and it can dig about one coin a day.
bee coin was launched in December last year. At present, the speed is still very fast, and it can dig about two coins an hour, In addition, the app store can be downloaded directly in China without using overseas ID, which is extremely convenient
two steps in place:
the first step
app store search bee nework download domestic version
I g about 12 in a day, I observed that after opening this software, the battery consumption will be about 10% faster, I am an old mobile phone, novice machine estimated not much feeling. The operation of digging bee coins is very simple, and after 24 hours, you only need to click the green little bee to continue digging
at present, there are two kinds of mobile phone based coins. It's not clear what the value of bee coin is. It may be worthless, or it may be more than 10 US g. I feel that I can dig it and put it there first. Anyway, it won't delay anything
bee coin is now open internally and needs an invitation code. You can use my invitation code: SZU_ Charlie, you can also leave your own invitation code to form your own circle in the future
this routine has the same nature as MLM, which brings people from all over the world into the association, and the value rises, ha ha