Bitmain: Antminer firmware upgrade statement

Bitmain: Antminer firmware upgrade statement

Recently, the news that the Antminer firmware can remotely terminate the mining of the miner has caused controversy. The code for this function was designed and written by the Antminer firmware team. This firmware has always been open source software and has no malicious intent.
We hereby declare that the original intention of designing this function is for customers who host their mining machines in mining farms. When the mining machines are stolen or detained without permission, miners can use this function to remotely shut down the mining machines, and provide more tracking clues for law enforcement agencies. Just like the remote deletion and remote shutdown functions provided by many smartphone manufacturers, Bitmain will never use this function on its mining machines without the permission of the miners. In more than one incident of mining farm theft or negligence of mining farm staff, this function is particularly important:
In 2014, a mining factory in Shenyang, China, secretly detained 1,000 mining machines from its customers.
In 2015, more than 2,000 mining machines were seized from Georgian mines.
In 2017, a Canadian mining farm detained Bitmain’s mining machines hosted at its mining farm without consent.
However, this feature was never developed. We had this idea when we were producing the S7 miner and planned to release it with the S9 miner. We hoped that this feature would greatly benefit our customers. However, due to technical problems, we were unable to complete the development of this feature and shut down the server used for testing in December 2016. But we made a mistake: we did not delete the code for this unfinished feature. The fierce debate about the future direction of Bitcoin was ongoing, and this vulnerability was pointed out, which caused great misunderstanding in the community. We are deeply sorry.
This vulnerability affects the following products:
Antminer S9
Antminer R4
Antminer T9
Antminer L3
Antminer L3+
This vulnerability may allow MITM (man-in-the-middle attack) and DNS hijacking to take advantage, resulting in security risks for customers. We deeply apologize for this. It should be noted that the existing stratum protocol is also very vulnerable to MITM and DNS attacks. The entire mining community needs to unite to jointly design a new generation of mining protocols to resist potential risks.
We have released the latest open source code through GitHub and added new firmware on the website to fix this vulnerability. We recommend that all miners update this firmware and strongly recommend not to use software from third parties to avoid firmware malfunction or phishing attacks.
Antminer S9 firmware
Antminer T9 firmware
Antminer R4 firmware
Antminer L3 firmware
Antminer L3+ firmware
Source code on GitHub
Open source code for S9, T9 and R4:
https://github.com/bitmaintech/bmminer-mix
Open source code for L3 and L3+:
https://github.com/bitmaintech/setup-A8 It contains:
https://github.com/bitmaintech/ltc_frimware
In addition, we recommend that mine owners who use Antminer modify the DNS resolution configuration file in the miner: /etc/hosts, and resolve the auth.minerlink.com domain name to: 127.0.0.1. The change method is as follows:
Use ssh to login to the miner
Run command: echo “127.0.0.1 auth.minerlink.com” >> /etc/hosts
Run command: sync
We are paying close attention to the problems that may be caused by this vulnerability pointed out by the community, and we will work hard to continuously improve and solve related problems. For this, we sincerely thank the community for pointing out this vulnerability. At the same time, we would like to express our gratitude to the community for its contribution to the open source code of Antminer. We also take this opportunity to express our firm belief in the open source community and our determination to improve the quality of code and the rigor of the testing process.
We will continue to develop this feature to provide effective remote control technology services for miners who host mining machines. We will install a switch for this feature and turn it off by default. Customers can even set their own remote authentication server address. Before the development of this feature is completed, we will not apply the code of the related function to any production mining machine.

<<:  Is Technological Centralization Destroying Bitcoin?

>>:  Litecoin officially locks in SegWit and is about to enter the activation phase

Recommend

NBA Kings install Bitcoin mining machine at stadium

The NBA's Sacramento Kings have installed a B...

Is it good for a woman to have a flat brow bone? What does it mean?

People's brow bones are the bones above our e...

Bitbays platform stock OkDice completes a new round of dividends

OkDice, launched by Bitbays Exchange, carried out...

Coin Zone Trends: Bitcoin Price Trends Based on Big Data This Week (2016-07-14)

Try to buy on dips in the short term, and wait pa...

48% of respondents believe Bitcoin will be worth more than $500 by 2016

Bitcoin enthusiasts are once again bullish on the...

Which women will marry rich men?

Everyone hopes that their married life will be go...

It's a very cliché story, but it still touched me!

There is a small town on the edge of the Gobi Des...

Physiognomy teaches you how to win over a man!

Love is a repetitive alternation of emotions, wav...

The four best luck signs

The four best luck signs Different parts of the f...

The red birthmark grows on the back of the neck. It depends on the gender.

Birthmarks are something that many people hate, b...

Ethereum founder joins Toronto Stock Exchange to explore blockchain technology

The Toronto Stock Exchange is currently investiga...

How will Web3 change the future of humanity?

Web3 has been a very popular term this year, espe...