• What is a hidden miner and how to make money using minergate? Hidden miner minergate

    A hidden miner is an opportunity to be carried out at the expense of secondary users. That is, the total power leads to an increase in the production of one of the cryptocurrencies. To do this, you will need to select a pool, register and attach the necessary software to the program, in the form of a virus. But there is a slight difference from a virus in a program that allows you to retain part of the power of other users. According to the principle of operation, such software is a malicious Trojan (miner), which allows you to significantly increase profits during mining.

    Hidden mining is best done using minergate, since here you can use the features of this service, which you should study first.

    Main features of minergate

    Mining on minergate is combined, that is, you can use various methods. Both and the use of the program are available in minergate. This service has a lot of features compared to other similar ones, but we can highlight the main list, which is the most important:

    • with software mining, you only need to install one program on your computer, which is perfect for various currencies;
    • cloud mining in minergate is possible directly through the browser. This type of mining is relatively slow, but no software is required. That is, after connecting and registering, you can go to the site and click start;
    • It is possible to use the smart mining function, which allows the program to switch to the most profitable cryptocurrency at the moment. To do this, you need a normal power-on mode and start of the miner.

    To successfully earn virtual money, in addition to personal professionalism and the amount of investment, the correct choice of place of work is of great importance. Organizers of pools for mining one or more altcoins earn commissions from each generated block.

    Pools differ in power, number of miners, mining algorithm and principle of remuneration. There are openly fraudulent projects and simply organizations of losers, contacting which will only waste your time and resources.

    The minergate multi-currency pool does not belong to this category. Owners and users of personal computers who want to earn a little extra money can work comfortably and profitably at minergate.

    Minergate is a multi-currency server for coin mining:

    • Bitcoin;
    • Litecoin;
    • Ethereum;
    • Ethereum Classic;
    • Monero;
    • Monero Classic ;
    • Zcash;
    • Bitcoin Gold;
    • Bytecoin;
    • DigitalNote;
    • Aeon coin;
    • Fantomcoin.

    The pool supports 19 communication languages, including Russian, there are many additional options, such as:

    • Minergate xFast program with a convenient graphical interface.
    • Cloud mining service.
    • Cryptocurrency exchange.
    • Calculator for preliminary calculation of profit.
    • Monitoring panel and Android application for remote process control.

    A complete list of services provided to workers in the “mining industry” is contained on the minergate official website, the sheer number of built-in languages ​​of which speaks volumes about the scale of the service’s activities.

    How to use MinerGate

    Some drawback of the pool is the need for registration; in many crypto mining mines you can do without it. However, there are a number of reliable and trusted sites ( Suprnova, F2Pool, MinerGate), where this procedure is required.

    Profile registration and activation

    To register on the pool, go to the minergate official website and click the button “ Registration" In the welcome window that appears, the user is prompted to create an account. Enter email And password, agree with the terms of service and put a tick in the box: “ I'm not a robot" At this stage, verification is not required. Install Minergate xFast, or take the settings for standard miners and start mining.

    But, to protect your account from hacking, it is recommended to enable two-factor authentication . There are many petty thieves in the Internet space, always ready with a few crypto coins from a careless miner. To make their life more difficult, a two-factor system was invented. Most often this is verification from Google Authenticator, but there is an option to confirm via email.

    How to download the Minergate miner

    Those wishing to install Minergate xFast need to go to the download section and select the required version of the miner.

    There are separate options for GPUs AMD And Nvidia, with a graphical and text interface, as well as applications that work with Mac OS And Ubuntu.

    How to install correctly

    Mining farms do not install antivirus, and the defender firewall is disabled. If minergate is installed on a regular PC, it must be added as an exception to the security settings, otherwise it will be blocked and deleted. This applies to all programs for mining cryptocurrency.

    Settings

    After launch, you need to enter your credentials into the miner program. The utility has a smart function, when activated, Minergate xFast is adjusted to the most profitable(at the moment) the algorithm automatically starts the mining process.

    Independent minergate setup consists of choosing an altcoin and the amount of power involved. If the computer is used not only for mining, 75% is enough, for example, six processor cores out of eight.

    How to mine

    Installed and configured Minergate xFast, the best option for learning the basics of crypto mining.

    You can run mining on a GPU and a processor or separately on one of these devices. Properly distributing the performance of the equipment, you can Minergate xFast work immediately with several coins, without loss of hashrate. To control production, the site has a Dashboard tab and the MinerGate mobile application.

    How to withdraw money from your MinerGate wallet?

    • Earned funds are transferred to your account balance.

    How to withdraw from minergate? For each crypt mined on the pool, withdrawal of funds is possible upon reaching the minimum payout threshold. For example, on ether, a classic is 0.001 coins. Most currencies except ETC, Bytecoin and Aeon are only listed on Freewallet. To withdraw money to your wallet, you will need to create a personal account on this service. The minergate pool imposes a commission on withdrawals, which should be taken into account if you need a round sum.

    There are several output options:

    1. Through an exchanger.
    2. To the stock exchange.
    3. To an electronic wallet.
    4. To another service.

    How to withdraw from minergate to the deposit of a cryptocurrency exchange? Those wishing to transfer the reward into Bitcoin, Ether or American dollars are offered to withdraw money to the wallet of the HitBTC exchange, or exchange on the Changelle service.

    Cloud mining on MinerGate

    Mining in the cloud is launched through the corresponding section of the minergate website. You need to select the altcoin you are interested in (BTC or XMR) in the Could Mining section and purchase the hashrate. Payment is made from the account balance on the pool, and the mined coins also go there.

    As of December 2018, the cloud mining feature is disabled for new clients.

    Mining on mobile devices

    The minergate mobile miner application and monitoring of the mining service were removed from August 29, 2018 Google Play store. MinerGate’s Remote Control is available for download on the official minergate website ( mining function disabled).

    Hidden miner

    The hidden miner program is designed for mining cryptocurrency on the minergate service using a central processor. Available in three versions: full, lite, enterprise, supports many versions of the algorithm Cryptoniht (Lite, Heavy, V7, V8). For successful mining, you need at least a two-core processor, while 25% of the power will be mined by the developer. The utility is easy to install, does not require additional settings, and starts on reboot.

    The program brings additional income to the owner, without compromising the main operation of the computer.

    The hidden miner is vulnerable to antiviruses, so you need to add the program to the exclusion list. The full version cannot be removed without reinstalling the operating system. You can download the application on the MinerGate forum.

    Profitability calculator

    On the official website you can test the performance of your equipment and use the minergate calculator to calculate your future income. The calculation is divided into four subgroups, according to the mining algorithms, each of which includes the corresponding coins. The minergate calculator shows the equivalent of hourly, daily and weekly earnings in BTC or USD.

    • Information about exchange rates comes from the exchanger Changelly.
    1. The launcher program starter_0.06a is designed to start mining in a relatively hidden mode. Can work with ANY console miners on ANY pools. Installs on any computer running Windows 7, 8, 10 with x32 and x64 bit depth.

      The starter_0.06a program can be installed in computer sales rooms, in classrooms, in corporate networks and government agencies, on servers, on client computers in service centers and workshops. In this case, all responsibility for using the program on devices that do not belong to you falls solely on you.

      The program has two modes:

      1. Miners are launched while the user is inactive. The time from the last user activity to the start of miners is set in the config. If the user returns to work, the miner turns off, and so on until the next period of user inactivity. The mode is better suited for weak computers.
      2. Miners are launched in parallel with the user's work. This mode is suitable for more powerful computers that will not “feel” that one or two processor cores or part of the video card resources are busy.
      By installing the program, you can add absolutely any console miner that you consider the most profitable and productive. The path to it, the name of the miner file and the configuration line are written in the config of the launcher program.

      The program is distributed absolutely free of charge, but during operation about 10% of the profit is transferred to the author. This happens slightly differently in different modes. In the first mode, approximately every 10th launch of the miner works for the author, in the second mode, 6 minutes in every hour (the same 10%) the miner works with the author’s config.

      What you need to do:

      · Add the program folder to antivirus exclusions

      What not to do:

      · You cannot delete or rename miner folders that come with the program

      · You cannot place a program on a path with Cyrillic characters

      What you can do:

      · You can rename the program file to be launched, as well as create duplicates of the miners supplied with the program and rename them

      Recently, many console miners have appeared that do not include a “bat file” (.bat file), and their parameters are specified in advanced configs (XMRig, XMR-Stak miners and others). The launcher program can also work with them. First, you need to debug the launch of the miner separately from the launcher, then in the launcher config specify the path to the miner, the name of the miner file, and leave the configuration line empty, since parameters are not passed to such miners.

      The main thread of the program starter_0.06a, as well as its previous and future versions, is located on the Kryptopila forum - it will be useful for everyone who decides to use the program in their work. It also outlines some ways to hide the operation of the program and launch it automatically. I, as an author, answer questions on all forums. I will answer them as much as possible and given time, but I will try to pay attention to everyone who needs help. At the same time, I ask you to first carefully study the descriptions and instructions so that you do not have to repeat what has already been described in detail.

    2. downloading 21MB (!!!) from a service that limits the download is still a pleasure. It’s located on file hosting service.rf, but in fact it’s downloaded from turbobit.net (there’s also a link to ) Most likely it’s an oddity of the file hosting service, but a residue remains.





      In general, everything is somehow damp and, in my opinion, useless in the form in which it is now.

    3. downloading 21MB (!!!) from a service that limits the download is still a pleasure. It’s located on file hosting service.rf, but in fact it’s downloaded from turbobit.net (there’s also a link to ) Most likely this is an oddity of the file hosting service, but a residue remains.
      Where are the sources? or should we simply believe and add the binary to the antivirus exceptions (and on all vehicles of corporate networks and government agencies)?
      To give 10% of the profit for the launcher (alpha version), it’s somehow very fat considering that the miners themselves generally allow a standard reduction of up to 1%, and by default they ask for 5%. Not to mention open source.
      And why keep (download) a pack of miners if you plan to use just one?
      Something funny: why is the project in web design?
      D:\Distrib\Programs\WEB-Design\AutoIT\Projects\!!!_StarterMinerNew\!_Relizes\starter_0.05a\MinerGate-cli-8.2-win32

      There's too much minergate in all of this, in my opinion. Minergate scam.
      There remains the feeling of a handicraft designed to collect money from those who do not know how to write a body file or ps (in fact, there are probably many of these on the Minergate forums) or Google (which is what this starter is written on).
      In general, everything is somehow damp and, in my opinion, useless in the form in which it is now.

      Click to expand...

      I will answer in the order of the questions, for which I thank you. Thank you - because you touch on points that I could have forgotten, for example.
      1. Yes, these are the oddities of the file hosting service. But I got used to it, I’ve been using it for a long time, but with others, including top-famous ones, it somehow didn’t work out for me for various reasons.
      2. There will be no source code, this is still a commercial program designed to make a profit. It’s been tested on Minergate for a year and a half, so trust has been earned, I didn’t come here with a just released program. To trust or not is a personal matter. The miners in the archive are standard, without changes.
      3. Personally, 10% does not seem like a big share to me, especially in light of the fact that whoever gets 90% will do nothing at all except spend 5 minutes on the installation.
      4. The pack of miners was born precisely at the request of users, and not because of my whim. People want to have everything in a kit at once, or almost everything.
      5. The project lies in web design, because I have several commercial programs specifically for webmasters, and traditionally everything else falls there.
      6. As for “damp” and who it’s intended for, that’s a moot point. Any product is produced not to help humanity, but to make profit. And not only seasoned specialists and advanced users want profit, but also those who have a vague understanding of mining in general, but have unlimited access to dozens of computers, for example. It is for their attention that I publish my launcher. What is it written on, whether it is raw or not - what difference does it make? The main thing is that it works, and there is nothing else like it in the foreseeable space.
      PS: I hope I answered your questions.

    4. Fellow miners, welcome the new version of the launcher...

      What's new:

      1. Old versions were removed and new ones were introduced. This applies to all miners included in the assembly, with the exception of the console ones from MinerGate - they remained the same, since citizen developers got carried away with the new GUI miners and forgot about the console, although they promise... Personally, I advise you to use alternative ones, of which there are more than enough .
      2. High-performance JCE miner has been introduced. I advise you to take a closer look at it - it can work on Windows of any capacity, on processors and video cards, its interface is very informative, and the hashrate is higher. In the folder with the miner, I provided examples of batch files for different cryptocurrencies on different pools.
      3. The launcher icon has been changed. Now it looks exactly like the Explorer icon. This will at least slightly reduce the risk of detection.
      4. Unexpectedly, I learned that the high-performance XMRig miner can be launched with a batch file, so I placed an example in the folder with the miner - it will be useful to many.

      A little about what I want to implement in the future.
      I plan to make a semi-automatic update of miners, and for what purpose. Let’s just say that many coins, for various reasons (mainly to make mining difficult by ASICs), periodically experience changes in algorithms and, as a result, hard forks. For users of my launcher, this means: “go and rearrange the launcher on tens/hundreds/thousands of machines and configure it to work with the new miner.” At the same time, the syntax of miners rarely changes from version to version (with the exception of Minergate miners, unfortunately). Thus, it will be possible to make a semi-automatic update of the necessary miners, while the settings will be saved. This option will certainly allow you to “set it and forget it.”

    Making money using the power of software is a fairly common option for making a profit, which requires effort and depositing funds at the beginning of the entire process, and then everything is done automatically.

    The ability to mine cryptocurrency at the expense of secondary users, that is, using the power of their software, which significantly increases the production of the selected cryptocurrency.

    A peculiarity of such mining is the use of software in the form of a virus, which, after selecting a pool and registration, is attached to the program, however, it is not a virus, although it has the same operating principle as a malicious Trojan.

    The program makes it possible to retain a certain part of the computer's power. The best option for making money using a miner is the minergate service, which has all the necessary data, but is also endowed with features that need familiarization.

    The technology for creating a hidden miner, using mining on a video card as an example, is discussed in this video:

    Minergate nuances

    Using this service, it is possible to use a combined version of the miner, that is, through the program and cloud, while minergate has a number of features, the list of which is as follows:

    • If you are using the program, then it is enough to install one version of it on your computer, which is suitable for earning various cryptocurrencies;
    • it is permissible to use it immediately after registering on the site using the “Start” button, since minergate makes it possible to use the cloud through a browser, although there is a significant drawback - slow action;
    • It is possible to use smart mining, which, through analysis, switches to the most current version of the cryptocurrency at the moment. It can be launched using normal mode and the miner program.

    Important: this mining option is the most profitable and has a huge number of advantages than other platforms, since the built-in pool has the basic functions of other services.

    Withdrawing money earned in this way is quite simple, since you can attach just one wallet, for example, to which funds earned from all types of mining will fall, especially since minergate has the opportunity to increase the amount of earnings through the use of a miner.

    There are over 10 cryptocurrencies on the service. Before making a withdrawal, you need to go to the Dashboard tab, after which a full list of available options will open; you can withdraw either one type or all at once.

    Earning money using this service

    It’s quite easy even for completely inexperienced users to start earning income on minergate.

    The https://minergate.com service is English-language, it is possible to change the language, but the basis will still remain English. Important: to start earning money you need to register.

    The service has 3 ways to use the miner:

    1. A hidden miner that allows you to use software in minimal quantities; for those for whom this is relevant, this method is the most acceptable. There are instructions on how to use this option; you need to register and set the required power.
    2. If it is important not to use the power of your own equipment at all, then you need to launch the miner using a browser, but you must be prepared for a minimum amount of income.
    3. It is also possible to mine through a video card, but this requires that it meets all the requirements. Access to full functionality is possible. you will find out how much income you can get from mining on a video card.

    So, on this service, using just one program, it is possible to simultaneously launch several options for mining cryptocurrency or use one, it all depends on the power of the computer and the desire of the user.

    In addition to the main functions, it is possible to change the number of cores used during operation or install a program to switch to the most optimal type of currency.

    To increase the speed itself you need to:

    • Increase the capabilities of the PC itself using a specialized program;
    • Purchase additional power;
    • Apply a hidden miner.

    How to make a hidden miner?

    The basis of a hidden cryptocurrency mining option

    The whole principle of operation of a hidden miner lies in the extraction of coins using their own and other people’s equipment, while experienced players will not overload the machine of a member of their own network, and if the user has sufficiently powerful equipment, then he will not notice that he has a mini-program installed .

    In 2011, the first reports of such computer infections appeared, and already in 2013 there was a massive attack in various parts of the world.

    The basis of the work is as follows:

    • By opening a file, a client program is installed on the user’s machine;
    • She connects to any of the pools and starts mining cryptocurrency;
    • In this case, the mining takes place in various currencies, since bitcoins are not a very profitable option for regular collateral;
    • Mining pools using the automatic mode often choose the optimal currency option on their own;
    • The withdrawal is made to the wallet of the user who installed the program;
    • At the same time, he has the right to indicate the most diverse number of connected machines, all of this with complete impunity, since no one is interested in the ownership of this security.

    Infection is available in several options:

    • Through files;
    • Direct replanting on a PC, but this is rare;
    • Through unauthorized access.

    Important: any user who is interested in reading the file can become a client of these miners, but most often these are gamers with powerful devices.

    Platform advantage and income

    Thus, minergate has many advantages over its competitors, first of all, it is the development of the platform by cryptocurrency market specialists, which minimizes any of its shortcomings and increases the chances of getting a high income.

    Secondly, using any acceptable currency mining option, adjusting the supply power, using the number of cores and increasing profitability using a hidden miner opens up great prospects for the user.

    It follows that the advantages of the platform lie in the following:

    • High profitability and versatility;
    • Ease of use and availability of various options;
    • Availability of over 10 types of cryptocurrencies;
    • The presence of additional functions to increase potential;
    • Small size of the software in the form of one program and website;
    • The service has sufficient anonymity.

    How to hide or create such a miner

    To create or use a hidden miner, you need to understand that the entire speed of cryptocurrency mining will be achieved by introducing a small Trojan into the devices of other users, while your own machine will not experience overload.

    To create a hidden miner yourself, you need to study the whole principle of this work:

    1. Register on the website and choose mining using cores.
    2. At the same time, you should not use all the cores of the machine, as overload may occur.
    3. Pay for your subscription in advance.
    4. Enter the hidden miner program, while it is possible to purchase a ready-made program or create it yourself:
    • If you purchase, you need to be prepared for the seller to receive a percentage of the program’s operation;
    • To form one yourself, you will have to spend a lot of effort and study the relevant instructions.
    1. After this, the Trojan miner is added to the builder and then mining for clients is started.

    Important: the amount of income will depend on the number of devices involved and the power of your own computer.

    How to mine Ethereum cryptocurrency and what effective mining methods exist - read.

    How to detect a hidden miner

    Important: you don’t have to rely on the fact that if the computer doesn’t slow down, it means there is no mining virus; this is wrong; today such sophisticated forms of Trojans are used that their presence is not always immediately detected.

    To fully verify the absence of malware, you need to scan the device with anti-virus programs for Trojans; this method is not an option and can even be said to be superficial.


    Hidden CPU miner (Claymore).

    Among other things, when working on the machine, you need to pay attention to the following suddenly appearing features:

    • Unusual launch option;
    • Having two processors restart each other when trying to shut down;
    • Restart the PC if you want to open files with the miner or remove it from startup;
    • Processes that prevent antivirus programs from functioning normally.

    And this is far from a complete list of signs of the existence of a foreign program on a native machine. In this case, there is no way to do without an integrated approach to solving the problem:

    • Initially, it is necessary to establish control over everything that is happening - check the temperature level of the video card and cores, as well as the degree of processor load using a special program;
    • If the indicators go off scale, you need to turn off everything you can; if the load remains, there is only one output;
    • In the same way, you can check your video card using another special program.