Bitcoin, Litecoin, Dogecoin: A Guide to Crypto-Currency Mining
Bitcoins and other crypto-currencies are mined by special computers and stored ter digital wallets. Reuters
At the latest Satoshi Square event te the City of London, it wasgoed said that 2014 will be the year for bitcoin mining, spil the crypto-currency is soon to reach a tipping point where creating it will no longer be possible for the average user.
Amid the hugely volatile price, its use for buying Class A drugs, and multimillion-dollar cyber heists, it’s sometimes effortless to leave behind where bitcoin came from, and how it and other crypto-currencies are created.
Mining is the term given to the process of producing virtual currencies like bitcoin and litecoin, where computers solve mathematical equations and are rewarded with coins for their efforts.
When bitcoin launched five years ago coins could be lightly mined using a huis pc or laptop, but the currency is pre-programmed to make mining more difficult overheen time, resulting te a situation now where only specially-made computers can mine efficiently.
Bitcoin may have grabbed all the crypto-currency headlines te 2013, but it’s far from alone. Litecoin is widely regarded spil the silver to bitcoin’s gold, and with a price of around £20 to £30 vanaf coin, it is substantially cheaper than the £500-plus bitcoin.
But with dozens of crypto-currencies available – including dogecoin – there are slew of options to choose from. And while some might be overlooked for being almost worthless – one dogecoin is equal to less than £0.01 – the comeback on any investment made te the currency could be yam-sized.
The Neptune can mine up to $Two,000 worth of bitcoins every day. It sells for $13,000. KnCMiner
When bitcoin wasgoed launched ter 2009, any regular laptop could be used to mine it. The process of solving mathematical equations wasgoed performed by the computers’ CPU (central processing unit), but spil the difficulty enhanced, mining through the CPU became unlikely and instead users recruited the toegevoegd power of their GPU (graphical processing unit).
From then on an arms wedstrijd developed, spil miners scrambled to produce more and more powerful computers with rows of graphics cards, such spil the high-end Radeon HD 7950 and Radeon 290X.
When creating your mining machine, feel free to bulk it up with reserve GPUs, but reminisce they can be very power requesting – with numerous graphics cards running at once, the right power supply will be significant to keep everything stable and running spil efficiently spil possible.
Other than a basic motherboard and spil many graphics cards spil you can afford, there isn’t much more to think about spil far spil hardware is worried, add a hard drive (but recall, your mined coins are not necessarily stored on here) and you’re good to go.
Spil the mining equipment has bot assembled from scrape, an operating system needs to be installed. This commonly means Windows, but Microsoft’s software is not best-suited to crypto-currency mining – and some members of the bitcoin community consider it to pose too much of a security risk to be trusted.
Instead, miners should consider the Linux operating system, for which a number of mining-optimised builds already exist, such spil BAMT and LinuxCoin – the former only works with litecoin, but both come with mining software included te the operating system.
For other mining software – for Windows, Linux and Mac – visit bitcoin’s own Wikipedia-style webstek.
Once an operating system and mining programme have bot chosen and installed, next you will need a wallet te which to store your coins once they have bot mined. Rather than storing coins spil lumps of gegevens – like a digital photograph – you store encryption keys which give you access to the coins.
Instead of a hard drive containing, say, 100MB of bitcoins, you actually store a private key which tells the trading network how many coins you have – what your balance is.
It is the private key – a long list of letters and numbers – that is stored te your wallet, or written down on paper if you choose. If your private key is lost or stolen, then access to your coins is also gone forever.
Example of a bitcoin card-wallet, produced by DealCoin. IBTimes UK
Hot Wallet vs Cold Storage
A ‘hot wallet’ refers to a coin wallet which is connected to the internet – either by desktop pc or smartphone – while cold storage refers to wallets kept on devices not connected to the internet, like a USB thumb drive.
Hot wallets are instantly available to the user, while cold storage wallets cannot be accessed or hacked into remotely overheen the web. Keeping a hot wallet with the private key to a large sum of bitcoins would be like walking outside with a giant wad of contant te your pocket – it’s safer to leave your money ter the bankgebouw and your bitcoin keys ter an offline ‘cold’ wallet.
Wallets can be made ter three places – on your rekentuig spil an application, spil a mobile app on your smartphone, or on the web, where it is stored by a third party.
Wallets stored on your laptop are susceptible to hacking spil they often leave your private key un-encrypted by default – spil hackers will know where to look, should they build up access to your PC, it is significant to encrypt the opstopping containing your key with a strong password.
Malware and keystroke loggers
However, a hacker using malware to track your keystrokes – and thus the passwords you inject while using your pc – could still steal your coins. Basic practice here is significant: keep your antivirus software up-to-date and keep your wits about you.
An alternative to storing your wallet on your own laptop is the web-based wallet, such spil Blockchain.informatie. Thesis wallets function te a similar way except the encryption keys are stored on the service provider’s server, rather than your own pc, thesis keys are encrypted and only accessible using your password.
Online wallets also opoffering two-factor authentication, whereby any login attempt by you (or a potential thief) requires your password, plus access to your mobile phone which is sent a code to be entered while logging ter.
Ultimately, Blockchain.informatie offers the use of a 2nd password, used for each bitcoin transaction you make (rather than the same spil used to loom into the wallet) and it is entered using your mouse and an on-screen keyboard to avoid keyloggers.
Keeping crypto-coins safe might sound like hard work, but given the dramatic rise te bitcoin’s value overheen the last 12 months, a few toegevoegd security stages will always be better than having your coins stolen with no way of getting them back.
Albeit primarily a digital currency, some physical bitcoins have also bot produced. IBTimes UK
Joining a mining pool or going it alone
Spil wij have already said, mining bitcoins is almost unlikely without a powerful, dedicated pc. Gratefully there is another option te the form of mining pools, where numerous users can contribute computing power to a single pool.
Because many computers are working together, coins are mined more quickly – but recall, the prizes will be collective across the pool.
Access to mining pools can be found at Multipool and Middlecoin, with the former taking a petite 1.5% cut of any coins you mine. Meantime, Middlecoin will use the power of your laptop to automatically mine the most valuable alternative coins, the service then converts thesis into bitcoins and transfers them to your wallet.
That’s just about it – if you’re blessed mining dogecoin or some of the lower-valued crypto-currencies, then you don’t need to spend a massive amount on mining equipment. If, however, you want to earn big money mining bitcoins, then an outlay of ems of thousands of pounds will be needed to make a healthy profit ter a relatively brief time framework.
uTorrent recently made headlines for bundling cryptocurrency-mining junkware. Out of all the junkware programs bundled with installers, cryptocurrency-miners like Epic Scale are some of the worst.
Modern malware makes money by using this mechanism to mine Bitcoin, too. Even if you don’t care about most junkware at all, cryptocurrency-mining software is something you indeed don’t want on your pc.
You’ve most likely heard of Bitcoin, the most famous cryptocurrency. It’s a digital currency, and fresh units of currency are generated by “mining.” This is a computationally intensive task, and it requires a lotsbestemming of processing power. Essentially, the laptop is rewarded for solving difficult math problems. This processing power is used to verify transactions, so all that number-crunching is required for the cryptocurrency to work. That’s an enormously basic explanation —, read our in-depth explanation of Bitcoin for more details.
Bitcoin isn’t the only cryptocurrency. The Epic Scale junkware bundled with uTorrent’s installer doesn’t attempt to mine Bitcoin —, it attempts to mine Litecoin, which wasgoed inspired by and is very similar to Bitcoin.
Mining Actually Costs You Money
Mining programs tapkast into your pc’s hardware resources and waterput them to work mining Bitcoin, Litecoin, or another type of cryptocurrency. And no, even if your hardware is used to generate money for them, you don’t get any of it. They get all the money from putting your hardware to work.
Worse yet, your desktop pc or laptop at huis just isn’t powerful enough to profitably mine Bitcoin, Litecoin, or other cryptocurrencies. Doing this profitably requires specialized mining equipments with specialized hardware and cheap electro-stimulation. So, even if you waterput your pc to work mining Bitcoin for your own profit, you’d actually lose money. You’d run up your power bill spil your pc draws more power, and you’d make back less than it would cost you ter power.
Te other words, cryptocurrency miners like the Epic Scale crapware or other malware programs that work similarly just run up your electro-therapy bill for a puny little bit of profit. The only reason they can profit is because they’re not paying the electric current bill —, you are. You pay more ter electric current so the junkware or malware authors can make a fraction of that ter profit. That’s ridiculous.
Wij won’t even talk about the influence on the environment from using all of that toegevoegd power. But that’s a factor that shouldn’t be disregarded.
Warmth and Voorstelling Problems
This is a bad overeenkomst so far. It would be better if you just paid a company like Epic Scale a few dollars and they avoided running up your electrical bill —, you’d save money.
But the problem isn’t just a financial one. Thesis types of software kick ter when your rekentuig is at a low-power state, putting those idle resources to work. So, instead of using a puny amount of power and running cool, your pc will run full-blast when you’re not using it, ventilatoren kicking into high gear to dissipate all that warmth. If the software isn’t programmed decently —, or if it’s just too greedy —, it may proceed running even while you’re using your pc, slowing tasks down and ensuring your rekentuig is running at total tilt all the time. Too much warmth can actually cause harm, especially if your hardware is already flaky or if your pc is packed with dust and isn’t decently ventilated.
Truly, wij can’t stress it enough —, there is no advantage to you ter running a program like Epic Scale. You get absolutely nothing from it. Epic Scale gets everything, and you have to overeenkomst with all the problems.
So How Is It Justified?
BitTorrent argues Epic Scale is entirely justified te manhandling your hardware because you agreed to it. If you clicked through the uTorrent installer and accidentally agreed to the Epic Scale suggest because it wasgoed disgused to look like a legitimate license screen, it’s only your own fault for choosing to use Epic Scale. That’s the argument from BitTorrent, Inc. If you’re not a fan of it, attempt one of thesis uTorrent alternatives (or stick with an older version of uTorrent) and send a message. Spil a toeslag, you can avoid all the junk they’ll attempt to slip onto your laptop te the future.
For their part, Epic Scale has a nice-sounding explanation of the punt on their webstek. They argue that they just want to “benefit high-impact charities” and “advance research science by providing affordable high-performance computation.” They say they “started with cryptocurrency mining spil a way to advance the very first mission.” Ter other words, for all their talk, they’re just mining cryptocurrency the same way that malware is doing right now, except te their case you have to agree to it very first.
Ultimately, this argument is belachelijk. People would be better off donating to charities than running up their violet wand bills, and a network of underpowered huis computers with installer junkware on them isn’t the best way to provide “affordable high-performance computation” for research science. Their statement sounds nice, but their methods are lachwekkend and a bit too similar to how criminals profit off of malware. The only difference is a dense EULA disguised te a software installer and a nice-sounding statement about donating the proceeds to charity. So it comes down to choice, they do give you one, unlike the malware, but it’s not a choice wij recommend.
Well, wij can say one thing about Epic Scale —, they have a better public relations strategy than Superfish does. Bravo.
Donate Directly to Charity and Skip the Middleman
No, wij’re not anti-charity. Do you want to support charities? Then donate directly to them. Five dollars donated directly to a charity every month is better than $Five reserve spent on your electro-stimulation bill with the charity only getting a fraction of that.
This scheme just doesn’t make sense for anyone except the companies that profit from it.
Indeed, this stuff is enormously bad. Even if you’re used to your Windows PC being packed with toolbars, pop-ups, and other garbage, even you might think something is wrong if your rekentuig’s ventilatoren are going full-blast all the time and it’s acting like a space heater. The Windows software ecosystem is sick, and this is how companies like BitTorrent, Inc. make their money. Yes, almost everyone is doing it —, but no, it’s still not acceptable.
Chris Hoffman is a technology writer and all-around rekentuig geek. He’s spil at huis using the Linux terminal spil he is digging into the Windows registry. Connect with him on Twitter.
Did You Know
While there have bot fresh antibiotics released to market since then, the last time a totally fresh class of antibiotics wasgoed discovered wasgoed back te the 1980s.
Best of How-To Geek
Get the HTG Newsletter
Join 100,000 other subscribers
Go after How-To Geek
More Articles You Might Like
Inject your email address to get our daily newsletter.
Join the How-To Geek Club! (It’s Free) ✕,
- Get special articles before everybody else.
- Get downloadable ebooks for free!
- Get geeky trivia, joy facts, and much more.