Ayh have had a miner running for several months now. Ayh did this to watch the cpu, gpu, ram, net.. and the actual truth is that there is leakage.
This leakage is then the sum of parts but the sum of nothing to miners. The papers speak nothing to the end to end mechanisms without skipping a crucial part -- what happens between.
Ayh have long explained that there is no such thing as privacy when we do not own the wires that traverses the web.
Just take a look at source code of your miner and you wiil find all answers you need,
Some pools were caught on spreading source code that include some fee for pool. You sould account it as fair share for organising pool or theft, It is up to you, to accept that or deny.
If you get source code for your pool miner from third party, then you could fing that it do some work for third party.. That's also up to you to believe in some "better performance" of third party miner or check it by yourself and find out what is the real price.
If you use some binary you downloaded from some source and you didn;t check and compile source code by yourself, then it is you the worst enemy of yourself.
That's it. either you question everything, either you are fucked up. Simple as that.
I know you, you are smart enough to qestion everything. So just do it.
Then someone else should be able to report on it too, right? Been a long time and only you the keeper of narratives noticed it? I don't doubt you, but "extraordinary claims".
There are others who have been researcher the patterns. Aym not solo in this -- and it has been suggested for some time actually -- but the patterns have become too cogent to dismiss any longer. Ayh have seen the data discrepancies my self and have seen high end cryptographers examine how the algorithms assemble and then fire back data for "validation".
Meanwhile the retorts to this conspiracy theory has been still just "a packet of mysterious data algorithmically resorted and decrypted/encrypted for absolutely no purposeful reason"
Ayh have had a miner running for several months now. Ayh did this to watch the cpu, gpu, ram, net.. and the actual truth is that there is leakage.
This leakage is then the sum of parts but the sum of nothing to miners. The papers speak nothing to the end to end mechanisms without skipping a crucial part -- what happens between.
Ayh have long explained that there is no such thing as privacy when we do not own the wires that traverses the web.
The sum of parts.
Just take a look at source code of your miner and you wiil find all answers you need,
Some pools were caught on spreading source code that include some fee for pool. You sould account it as fair share for organising pool or theft, It is up to you, to accept that or deny.
If you get source code for your pool miner from third party, then you could fing that it do some work for third party.. That's also up to you to believe in some "better performance" of third party miner or check it by yourself and find out what is the real price.
If you use some binary you downloaded from some source and you didn;t check and compile source code by yourself, then it is you the worst enemy of yourself.
That's it. either you question everything, either you are fucked up. Simple as that.
I know you, you are smart enough to qestion everything. So just do it.
Then someone else should be able to report on it too, right? Been a long time and only you the keeper of narratives noticed it? I don't doubt you, but "extraordinary claims".
There are others who have been researcher the patterns. Aym not solo in this -- and it has been suggested for some time actually -- but the patterns have become too cogent to dismiss any longer. Ayh have seen the data discrepancies my self and have seen high end cryptographers examine how the algorithms assemble and then fire back data for "validation".
Meanwhile the retorts to this conspiracy theory has been still just "a packet of mysterious data algorithmically resorted and decrypted/encrypted for absolutely no purposeful reason"
Salsa?