Feeds

Egghead dragged over coals for mining Bitcoin on uni supercomputer

$150k of compute power to trouser $10k in BTC

Securing Web Applications Made Simple and Scalable

The US National Science Foundation has suspended a researcher for using two university computers to mine Bitcoins.

In its biannual report [PDF] to the US Congress, the government agency revealed the misdoing and recommended action:

The researcher misused over $150,000 in NSF-supported computer usage at two universities to generate bitcoins valued between $8,000 and $10,000. Both universities determined that this was an unauthorized use of their IT systems. The researcher asserted that he was conducting tests on the computers, but neither university had authorized him to conduct such tests -- both university reports noted that the researcher accessed the computer systems remotely and may have taken steps to conceal his activities, including accessing one supercomputer through a mirror site in Europe.

The researcher’s access to all NSF-funded supercomputer resources was terminated. In response to our recommendation, NSF suspended the researcher government-wide.

The report – published this week – is dated March 2014, when the value of Bitcoin fell from around $660 to $460 which would indicate that about 20 Bitcoins were mined in total. The value of Bitcoin has since recovered to around the $660 mark.

The NSF describes itself thus:

The National Science foundation invests approximately $7 billion per year in a portfolio of more than 35,000 research and education projects in science and engineering, and is responsible for the establishment of an information base for science and engineering appropriate for development of national and international policy.

The fact that so much raw computing power was necessary to mine a relatively small number of Bitcoins is a reflection of how the days of using general-purpose computers, even powerful ones, to generate alt-currency are over. Bitcoin mining today needs specialist hardware.

None of which is going to help the legitimacy the Bitcoin industry is so desperately seeking, which is perhaps why so many with vested interests (OK, I’ve got three and a half) are trumpeting the comments by online tat-bazaar chief John Donahoe that eBay is planning on supporting Bitcoin. ®

HP ProLiant Gen8: Integrated lifecycle automation

More from The Register

next story
Malaysian Airlines flight MH17 claimed lives of HIV/AIDS cure scientists
Researchers, advocates, health workers among those on shot-down plane
Mwa-ha-ha-ha! Eccentric billionaire Musk gets his PRIVATE SPACEPORT
In the Lone Star State, perhaps appropriately enough
Diary note: Pluto's close-up is a year from … now!
New Horizons is less than a year from the dwarf planet
Forty-five years ago: FOOTPRINTS FOUND ON MOON
NASA won't be back any time soon, sadly
Microsoft's anti-bug breakthrough: Wire devs to BRAIN SCANNERS
Clippy: It looks your hands are shaking, are you sure you want to commit this code?
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.