ASIC malware is a true and rising menace. Destructive firmware can redirect your hash amount to an attacker’s pool, lock you out of the world wide web interface, or brick the miner solely.NAND flash corruption — on miners devoid of SD cards, the onboard flash memory can degrade. We reflash or change the NAND chip.In simple use, Pine… Read More


The design is deliberately compact and serviceable, pairing a person-helpful interface for straightforward set up and distant monitoring with predictable scaling behavior throughout a number of units, so operators mining Equihash cash like Zcash and its derivatives achieve a mid-variety benchmark gadget that balances performance, efficiency and ope… Read More