Feeds

Egghead dragged over coals for mining Bitcoin on uni supercomputer

$150k of compute power to trouser $10k in BTC

Beginner's guide to SSL certificates

The US National Science Foundation has suspended a researcher for using two university computers to mine Bitcoins.

In its biannual report [PDF] to the US Congress, the government agency revealed the misdoing and recommended action:

The researcher misused over $150,000 in NSF-supported computer usage at two universities to generate bitcoins valued between $8,000 and $10,000. Both universities determined that this was an unauthorized use of their IT systems. The researcher asserted that he was conducting tests on the computers, but neither university had authorized him to conduct such tests -- both university reports noted that the researcher accessed the computer systems remotely and may have taken steps to conceal his activities, including accessing one supercomputer through a mirror site in Europe.

The researcher’s access to all NSF-funded supercomputer resources was terminated. In response to our recommendation, NSF suspended the researcher government-wide.

The report – published this week – is dated March 2014, when the value of Bitcoin fell from around $660 to $460 which would indicate that about 20 Bitcoins were mined in total. The value of Bitcoin has since recovered to around the $660 mark.

The NSF describes itself thus:

The National Science foundation invests approximately $7 billion per year in a portfolio of more than 35,000 research and education projects in science and engineering, and is responsible for the establishment of an information base for science and engineering appropriate for development of national and international policy.

The fact that so much raw computing power was necessary to mine a relatively small number of Bitcoins is a reflection of how the days of using general-purpose computers, even powerful ones, to generate alt-currency are over. Bitcoin mining today needs specialist hardware.

None of which is going to help the legitimacy the Bitcoin industry is so desperately seeking, which is perhaps why so many with vested interests (OK, I’ve got three and a half) are trumpeting the comments by online tat-bazaar chief John Donahoe that eBay is planning on supporting Bitcoin. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Bond villains lament as Wicked Lasers withdraw death ray
Want to arm that shark? Better get in there quick
Antarctic ice THICKER than first feared – penguin-bot boffins
Robo-sub scans freezing waters, rocks warming models
Your PHONE is slowly KILLING YOU
Doctors find new Digitillnesses - 'text neck' and 'telepressure'
SEX BEAST SEALS may be egging each other on to ATTACK PENGUINS
Boffin: 'I think the behaviour is increasing in frequency'
Reuse the Force, Luke: SpaceX's Elon Musk reveals X-WING designs
And a floating carrier for recyclable rockets
The next big thing in medical science: POO TRANSPLANTS
Your brother's gonna die, kid, unless we can give him your, well ...
NASA launches new climate model at SC14
75 days of supercomputing later ...
Renewable energy 'simply WON'T WORK': Top Google engineers
Windmills, solar, tidal - all a 'false hope', say Stanford PhDs
Britain's HUMAN DNA-strewing Moon mission rakes in £200k
3 days, and Kickstarter moves lander 37% nearer takeoff
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?