Comment on AI-Generated Malware in Panda Image Hides Persistent Linux Threat
AmbitiousProcess@piefed.social 1 day agoNot whatsoever.
Practically any mining software would allow you to change a pool whenever you felt like it, and making a script that just goes "oh, x.x.x.x isn't responding anymore, I should point my hashrate to y.y.y.y now" is... not hard, to say the least.