429
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
this post was submitted on 05 Aug 2023
429 points (100.0% liked)
Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ
54746 readers
203 users here now
⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.
Rules • Full Version
1. Posts must be related to the discussion of digital piracy
2. Don't request invites, trade, sell, or self-promote
3. Don't request or link to specific pirated titles, including DMs
4. Don't submit low-quality posts, be entitled, or harass others
Loot, Pillage, & Plunder
📜 c/Piracy Wiki (Community Edition):
💰 Please help cover server costs.
Ko-fi | Liberapay |
founded 1 year ago
MODERATORS
I'm talking about the firewall which is network handling only.
Most host firewalls only block incoming traffic.
All you have to do is get all mining data by making outgoing web connections to some random proxy, which can optionally have a domain to look more legit.
Firewall won't care, and unless you're pouring over the logs or looking at active connections, you won't find it either.
Since it's mining software, the fastest giveaway would be high usage or running an anti-virus to find sketchy executables.
I'm assuming OP is on windows which means the installer asked for admin perms to install to program files which is a really easy way to hide your mining executable assuming it hasn't been fingerprinted by popular anti virus yet.