cryptoyes
Member
Offline
Activity: 297
Merit: 10
|
|
May 08, 2018, 10:39:48 PM |
|
I've read through the thread (though I admit not every bit of it) and I'm very surprised to see nobody has been concerned about whether this executable does any funky things like ever connect to the Internet at any point, read any files off disk, etc? Has anyone monitored it (long enough) for any of those things?
Looks nice, but all of a sudden someone anonymous just deciding to help everyone by providing a closed source executable should normally raise just a healthy dose of suspicion.
|
|
|
|
jimmykl
|
|
May 08, 2018, 11:00:37 PM Last edit: May 08, 2018, 11:20:29 PM by jimmykl |
|
I've read through the thread (though I admit not every bit of it) and I'm very surprised to see nobody has been concerned about whether this executable does any funky things like ever connect to the Internet at any point, read any files off disk, etc? Has anyone monitored it (long enough) for any of those things?
Looks nice, but all of a sudden someone anonymous just deciding to help everyone by providing a closed source executable should normally raise just a healthy dose of suspicion.
You really did skim read it in that case. A shitton of people shared your concerns. In fact there were so many negative, sceptical reactions that OhGodACompany have chosen to make any future versions devfee rather than free. (Thanks for that, you know who you are) I'd advise watching this interview with @OhGodAGirl https://www.youtube.com/watch?v=ZLTRYp_kCYg and this https://www.youtube.com/watch?v=DuBX2gEthVUMy TLDW; if the devs wanted to fuck you over why would they clearly identify themselves, openly interact with the community, and invite security vetting? There would be much easier (and more rewarding) ways to completely destroy their professional reputations.
|
|
|
|
reb0rn21
Legendary
Offline
Activity: 1901
Merit: 1024
|
|
May 08, 2018, 11:01:05 PM |
|
I've read through the thread (though I admit not every bit of it) and I'm very surprised to see nobody has been concerned about whether this executable does any funky things like ever connect to the Internet at any point, read any files off disk, etc? Has anyone monitored it (long enough) for any of those things?
Looks nice, but all of a sudden someone anonymous just deciding to help everyone by providing a closed source executable should normally raise just a healthy dose of suspicion.
I heard ver said it is killing babies
|
|
|
|
jimmykl
|
|
May 08, 2018, 11:03:01 PM |
|
I've read through the thread (though I admit not every bit of it) and I'm very surprised to see nobody has been concerned about whether this executable does any funky things like ever connect to the Internet at any point, read any files off disk, etc? Has anyone monitored it (long enough) for any of those things?
Looks nice, but all of a sudden someone anonymous just deciding to help everyone by providing a closed source executable should normally raise just a healthy dose of suspicion.
I heard ver said it is killing babies Poor Rog
|
|
|
|
66mhz
Newbie
Offline
Activity: 27
Merit: 0
|
|
May 08, 2018, 11:32:11 PM |
|
I've read through the thread (though I admit not every bit of it) and I'm very surprised to see nobody has been concerned about whether this executable does any funky things like ever connect to the Internet at any point, read any files off disk, etc? Has anyone monitored it (long enough) for any of those things?
Looks nice, but all of a sudden someone anonymous just deciding to help everyone by providing a closed source executable should normally raise just a healthy dose of suspicion.
Multiple users have confirmed the process is accessing two IPs (2.21.242.213/2.21.242.237) over encrypted connection. Not sure why this is necessary.
|
|
|
|
cryptoyes
Member
Offline
Activity: 297
Merit: 10
|
|
May 08, 2018, 11:43:12 PM |
|
I've read through the thread (though I admit not every bit of it) and I'm very surprised to see nobody has been concerned about whether this executable does any funky things like ever connect to the Internet at any point, read any files off disk, etc? Has anyone monitored it (long enough) for any of those things?
Looks nice, but all of a sudden someone anonymous just deciding to help everyone by providing a closed source executable should normally raise just a healthy dose of suspicion.
You really did skim read it in that case. A shitton of people shared your concerns. In fact there were so many negative, sceptical reactions that OhGodACompany have chosen to make any future versions devfee rather than free. (Thanks for that, you know who you are) I'd advise watching this interview with @OhGodAGirl https://www.youtube.com/watch?v=ZLTRYp_kCYg and this https://www.youtube.com/watch?v=DuBX2gEthVUMy TLDW; if the devs wanted to fuck you over why would they clearly identify themselves, openly interact with the community, and invite security vetting? There would be much easier (and more rewarding) ways to completely destroy their professional reputations. Thanks for those links. She seems cool. I read the first 3 pages of posts of this thread (no concerns expressed there) and skim-read the rest. So what's the dev fee for the -r2 version tha is now available?
|
|
|
|
jimmykl
|
|
May 09, 2018, 12:06:56 AM |
|
I've read through the thread (though I admit not every bit of it) and I'm very surprised to see nobody has been concerned about whether this executable does any funky things like ever connect to the Internet at any point, read any files off disk, etc? Has anyone monitored it (long enough) for any of those things?
Looks nice, but all of a sudden someone anonymous just deciding to help everyone by providing a closed source executable should normally raise just a healthy dose of suspicion.
You really did skim read it in that case. A shitton of people shared your concerns. In fact there were so many negative, sceptical reactions that OhGodACompany have chosen to make any future versions devfee rather than free. (Thanks for that, you know who you are) I'd advise watching this interview with @OhGodAGirl https://www.youtube.com/watch?v=ZLTRYp_kCYg and this https://www.youtube.com/watch?v=DuBX2gEthVUMy TLDW; if the devs wanted to fuck you over why would they clearly identify themselves, openly interact with the community, and invite security vetting? There would be much easier (and more rewarding) ways to completely destroy their professional reputations. Thanks for those links. She seems cool. I read the first 3 pages of posts of this thread (no concerns expressed there) and skim-read the rest. So what's the dev fee for the -r2 version tha is now available? No worries, some of that 'shit-ton' may have been from reddit, youtube and github… No dev fee on the current version. But they have said new versions (hopefully for all nvidia cards) will have a dev fee. OhGodACompany are flat out finishing a miner (due May 25) so it could possibly be integrated into that.
|
|
|
|
WBF1
|
|
May 09, 2018, 01:17:31 AM |
|
EVGA 1080 TI SC2
Core: -150 Mem: +1000
Claymore 11.6
Hashrate 54.6-56.9
Thanks!!!
Edit: Windows 10, powlim 100
|
|
|
|
Liten
Member
Offline
Activity: 89
Merit: 10
|
|
May 09, 2018, 05:52:01 AM |
|
EVGA 1080TI Water Kingpin
Mem: +750 Core: +0
Claymore 10,3
Hashrate 53-54
Windows 10, powlim 70
|
|
|
|
kyovlodik
Newbie
Offline
Activity: 3
Merit: 0
|
|
May 09, 2018, 02:59:06 PM Last edit: May 09, 2018, 03:15:04 PM by kyovlodik |
|
I've read through the thread (though I admit not every bit of it) and I'm very surprised to see nobody has been concerned about whether this executable does any funky things like ever connect to the Internet at any point, read any files off disk, etc? Has anyone monitored it (long enough) for any of those things?
Looks nice, but all of a sudden someone anonymous just deciding to help everyone by providing a closed source executable should normally raise just a healthy dose of suspicion.
Multiple users have confirmed the process is accessing two IPs (2.21.242.213/2.21.242.237) over encrypted connection. Not sure why this is necessary. Neither do I. The security concerns raised in this thread of using a seemingly random, closed-source binary which calls back to Akamai servers over an encrypted channel are legitimate. Until an explanation is provided by the developers for the usage of these two IPs, you can temporarily block your system(s) from reaching them by using the following: Windows (as Administrator): netsh advfirewall firewall add rule name="ETHlargement Callback" interface=any dir=out action=block remoteip=2.21.242.213 netsh advfirewall firewall add rule name="ETHlargement Callback" interface=any dir=out action=block remoteip=2.21.242.237
Linux (as root): iptables -A OUTPUT -d 2.21.242.213 -j DROP iptables -A OUTPUT -d 2.21.242.237 -j DROP
As far as I can tell, it has zero impact on the efficacy of the application nor the final hash rate.
|
|
|
|
xpulse
Newbie
Offline
Activity: 141
Merit: 0
|
|
May 09, 2018, 03:26:27 PM |
|
I've read through the thread (though I admit not every bit of it) and I'm very surprised to see nobody has been concerned about whether this executable does any funky things like ever connect to the Internet at any point, read any files off disk, etc? Has anyone monitored it (long enough) for any of those things?
Looks nice, but all of a sudden someone anonymous just deciding to help everyone by providing a closed source executable should normally raise just a healthy dose of suspicion.
Multiple users have confirmed the process is accessing two IPs (2.21.242.213/2.21.242.237) over encrypted connection. Not sure why this is necessary. Neither do I. The security concerns raised in this thread of using a seemingly random, closed-source binary which calls back to Akamai servers over an encrypted channel are legitimate. Until an explanation is provided by the developers for the usage of these two IPs, you can temporarily block your system(s) from reaching them by using the following: Windows (as Administrator): netsh advfirewall firewall add rule name="ETHlargement Callback" interface=any dir=out action=block remoteip=2.21.242.213 netsh advfirewall firewall add rule name="ETHlargement Callback" interface=any dir=out action=block remoteip=2.21.242.237
Linux (as root): iptables -A OUTPUT -d 2.21.242.213 -j DROP iptables -A OUTPUT -d 2.21.242.237 -j DROP
As far as I can tell, it has zero impact on the efficacy of the application nor the final hash rate. I've read through the thread (though I admit not every bit of it) and I'm very surprised to see nobody has been concerned about whether this executable does any funky things like ever connect to the Internet at any point, read any files off disk, etc? Has anyone monitored it (long enough) for any of those things?
Looks nice, but all of a sudden someone anonymous just deciding to help everyone by providing a closed source executable should normally raise just a healthy dose of suspicion.
Multiple users have confirmed the process is accessing two IPs (2.21.242.213/2.21.242.237) over encrypted connection. Not sure why this is necessary. Neither do I. The security concerns raised in this thread of using a seemingly random, closed-source binary which calls back to Akamai servers over an encrypted channel are legitimate. Until an explanation is provided by the developers for the usage of these two IPs, you can temporarily block your system(s) from reaching them by using the following: Windows (as Administrator): netsh advfirewall firewall add rule name="ETHlargement Callback" interface=any dir=out action=block remoteip=2.21.242.213 netsh advfirewall firewall add rule name="ETHlargement Callback" interface=any dir=out action=block remoteip=2.21.242.237
Linux (as root): iptables -A OUTPUT -d 2.21.242.213 -j DROP iptables -A OUTPUT -d 2.21.242.237 -j DROP
As far as I can tell, it has zero impact on the efficacy of the application nor the final hash rate. This will be useless if in code dev is using fdqn as target address, but anyway what kind of concerns might be with traffic? Yes, probably it is good to know what dev sending back to their servers, but I personally don’t care, as I have nothing saved on rigs, execpt OS and miners.
|
|
|
|
laineux
|
|
May 09, 2018, 03:36:54 PM |
|
Yeah !
great job with 3x 1080ti ETH: GPU0 53.788 Mh/s, GPU1 53.041 Mh/s, GPU2 54.494 Mh/s
|
|
|
|
NekMiner
Newbie
Offline
Activity: 1
Merit: 0
|
|
May 09, 2018, 06:17:17 PM |
|
I was Trying to message OHGODAGIRL and you write the whole message and then it says your a NEWBIE and you cant send the message. So i will try and post here. Oh OHGODGIRL hello how are you can you please contact me or email. I have a question. Thanks in Advance.
|
|
|
|
gsrcrxsi314
Member
Offline
Activity: 367
Merit: 34
|
|
May 09, 2018, 06:25:20 PM |
|
hi guys, working this on Nvidia P102-100 GPUs, bcs i have normalny 1080ti, where i have about 54,7mhs stable, but on this mining card, i cannot do over 46,7 stable.... when i make it more, then crash, thx for help
no matter how much people say it, we still have people like this that barge in without reading anything. THIS WILL NOT WORK ON YOUR P102/P104 MINING CARDS! YOUR CARDS ALREADY HAVE THE MODDED TIMINGS!
|
|
|
|
MagicSmoker
|
|
May 09, 2018, 09:49:53 PM |
|
I was Trying to message OHGODAGIRL and you write the whole message and then it says your a NEWBIE and you cant send the message. So i will try and post here. Oh OHGODGIRL hello how are you can you please contact me or email. I have a question. Thanks in Advance.
Did you ever wonder why the forum defaults to blocking newbies from sending PMs? Perhaps it's because newbies have a tendency to use PMs to ask about things clearly covered in existing threads? So unless you are trying to ask @OhGodAGirl out on a date, you should probably read this thread THEN ask your question here.
|
|
|
|
Bimmber
Newbie
Offline
Activity: 210
Merit: 0
|
|
May 10, 2018, 12:51:31 PM |
|
unless you are trying to ask @OhGodAGirl out on a date
She is taken already, her BF is here on forum
|
|
|
|
Lysak1
Newbie
Offline
Activity: 18
Merit: 0
|
|
May 10, 2018, 05:31:20 PM |
|
Gigabyte Aorus 1080ti Ex Edition
PL 65; Core +80 ; Mem 650-700 53 Mh (sometimes 51 & 54) 48-49 deg on MSI AB
|
|
|
|
thewhitezebra
Newbie
Offline
Activity: 1
Merit: 0
|
|
May 10, 2018, 10:38:56 PM Last edit: May 11, 2018, 01:49:43 AM by thewhitezebra |
|
This works great!
I went ahead and created a forum username just thank you and tell you how appreciated work like this is. And btw, I definitely don't mind at all paying a dev fee for the next enlarger release if it works like the ethlargement. Keep up the amazing work!
Thanks again,
thewhitezebra
edit: currently working for 8x 1080ti, every brand has different oc limits, no need to oc core clock
|
|
|
|
snd22
Newbie
Offline
Activity: 3
Merit: 0
|
|
May 11, 2018, 12:22:23 AM Last edit: May 11, 2018, 12:54:33 AM by snd22 |
|
hi, anybody has use it for GTX1080?? i already trying but it not works, and make my rig restarting every i click the pill.exe
i already trying with revA one by one, and still not work because freezing.
|
|
|
|
OhYeesh
Newbie
Offline
Activity: 1
Merit: 0
|
|
May 11, 2018, 02:03:25 AM |
|
Sure, it would, but sometimes people do stuff just to be nice. SGMiner-GM was released with our optimized Ethereum kernel, and we didn't slap a devfee in that.
Not everyone in the world is out to fuck you over.
Thank you for restoring my faith in humanity. This boosted my only 1080 from 26MH/s to 37Mh/s with Max mem OC in MSI Afterburner. My Linux machines with more than 1 GPU have 1070s on them so this obviously doesn't apply. Details for everyone with similar GPU: Core Voltage: Default Power limit: 60% (can be lower without affecting hash rate) Temp (gets adjusted with Power limit): 67 Core: -100 (could be lower but I use the machine also while mining) Mem: +1000 Fan: Auto (sits on 41% when temp is 60 deg C) Like my voluntary donation to CHFAST for ethminer at Github... I made donations here too - the donation is not for the tool but for the gesture and the fact that it wasn't embedded as a dev fee. Thank you for making this an option rather than a dev fee that runs inside the application (which is just pure evil BTW and yes... there is a BIG difference between taking fee and accepting donations). I am looking at you Claymore and EWBF. Yeah... you know it.
|
|
|
|
|