cc.Link
  • Home
  • News
  • NFT
  • Videos/Tips
  • Mining
    • How to Mine Bitcoin
    • Top Mining Software
    • Mining Articles
  • Tools
    • Live Crypto
    • Free Wallet
  • Live
  • Marketplace
  • Contact us
No Result
View All Result
cc.Link
  • Home
  • News
  • NFT
  • Videos/Tips
  • Mining
    • How to Mine Bitcoin
    • Top Mining Software
    • Mining Articles
  • Tools
    • Live Crypto
    • Free Wallet
  • Live
  • Marketplace
  • Contact us
No Result
View All Result
cc.Link
No Result
View All Result
Home Mining

Basic Threat Modeling For Bitcoin Mining At Home

ccLink by ccLink
March 31, 2022
in Mining
0
Basic Threat Modeling For Bitcoin Mining At Home
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter

Home mining is one of the best expressions of individual sovereignty available, but every retail mining operation carries a variety of risks that need to be accounted for and mitigated as much as possible.

Broadening awareness of the benefits of converting electricity into KYC-free units of censorship-resistant internet money in a basement, garage or backyard shed has been a key catalyst for the ongoing surge in at-home mining. But just like storing private keys can involve tedious operations security (OPSEC) measures and careful planning, every serious miner must also consider the risks and vulnerabilities of their home mining operations. Unlike secure storage planning, however, mining faces a significantly wider array of heightened risks.

Understanding these risks and modeling responses to prevent or react to attack scenarios is essential for long-term, at-home mining success.

Home Bitcoin Mining Vulnerabilities

Theft is the most basic and obvious vulnerability to at-home bitcoin miners. For starters, every mining operation regardless of scale involves at least one rather valuable piece of computing equipment — a bitcoin ASIC miner — built with precious metals and specialized microchips that sells for anywhere from a few hundred dollars to over $10,000 at current prices, depending on the model.

Visibility is also a concern. How conspicuous is a mining setup? Just like publicly advertising large amounts of bitcoin-denominated wealth is always ill advised, distinctly noticeable mining setups aren’t always the safest. Noise levels, heat signatures, spiking electricity bills and other signals are easy giveaways (with relatively simple mitigations) to close neighbors or utility companies that someone is probably mining bitcoin. Consider a permanent bare spot on an otherwise snowy roof or an ongoing 80-decibel fan noise as examples, and the point is made.

Custody is also a key consideration since miners are responsible for managing the security of each step in the flow of mining rewards from their pool accounts to cold storage.

The list of potential vulnerabilities goes on, and not every mining operation faces the same types or degrees of risks. But every setup has risks. Beyond just acquiring hardware, transmitting power and building efficient airflows, modeling these risks is an essential part of every miner’s planning.

Threat Model Basics For Home Bitcoin Mining

So, what is a threat model?

The term “threat model” is just a fancy way of expressing what someone is defending and who they’re defending it from. And unlike a financial model, threat models are minimally mathematical and highly intuitive and deductive in assessing what risks exist and how to mitigate them.

Consider the example of cannabis farmers who doubled as bitcoin miners outside of the U.K. city of Birmingham. Police inadvertently discovered their illegal bitcoin mine while raiding their illegal cannabis farm. It’s safe to say that the threats facing this cannabis-bitcoin venture were poorly modeled and mitigated, if at all.

For most technology companies, threat modeling usually involves code review and software changes. For most humans, day-to-day threat modeling is intuitive, which is why most people prefer well-lit walkways to dark alleys. For miners, the same sort of threat assessments affect a variety of software, firmware and hardware products.

Building A Home Bitcoin Mining Threat Model

Threat models can be as complex or simplistic as the creator wants. But a home miner can’t adequately prepare against potential threats if they don’t understand what risks they face.

Setting the scope of a threat model is the first and possibly most important step. Think carefully about what needs protecting (e.g., mining hardware, site access, electrical and cooling infrastructure, internet access, payout deposits and wallet storage) and who it needs protection from (e.g., friends and family, neighbors or unexpected visitors, targeted attacks). Of course, not every miner faces the same potential risks. Someone with two S9s in a suburban neighborhood deals with different risks than a landowner in the Midwest with a dozen S19s on 80 acres. But listing any possible attack scenario is key to setting the scope of the model.

The key to making this list is simply asking, “What could go wrong?” Any answer gets added to the list.

Focusing on pool accounts and payout withdrawals, for example, this aspect of a mining threat model would include pool account security and planning strategies and tools to account for vulnerabilities in password protection, two-factor authentication, payout address reuse, etc.

Likelihood and effort are two additional considerations. Take the “bad scenario” list and use basic probabilistic attack analysis to evaluate how likely each risk in the list is to happen. After ranking these scenarios, decide how much effort and preparation each item deserves. This involves two steps phrased as questions. First, what mitigatory steps are required for a particular risk? Second, based on the perceived likelihood of a given threat, how much effort is a miner willing to give to prevent it? There is no rulebook or answer key for this process. Each of these steps are up to the discretion of the miner.

“Let’s build a threat model” isn’t usually the first thought a home miner has when planning their operation, but this extra OPSEC work can avoid serious problems in the future. And threat modeling really isn’t that complex. But, like any other aspect of OPSEC, threat analysis is best thought of as an ongoing process that can always be adapted and refined, not a finished task.

Additional Resources

Nothing in this article is meant to be an exhaustive explanation of how to safeguard a home mining setup. Instead, the goal of this article is to provide a simple breakdown of what threat models are, how miners can use them and encourage home miners to begin building one of their own.

Continue reading about threat modeling and how to develop one for a mining operation with these resources:

  • The Electronic Frontier Foundation published a surveillance self-defense guide with an important chapter on developing a security plan.
  • Over a dozen security professionals published a “Threat Modeling Manifesto.”
  • Carnegie Mellon’s Software Engineering Institute published a lengthy article on available methods for successful threat modeling.
  • One of the principal security solutions architects at Amazon Web Services also published a long article about how to approach threat modeling.

Conclusion

Small miners, especially at-home operators, are mostly left to fend for themselves regarding the security and threats facing their setups. Large institutional miners always have best operational security practices and threat models in place to safeguard their mining facilities. But there is no playbook or standardized manual for at-home mining security.

Even for miners who have been hashing for years, it’s never too early or too late to create a threat model for an at-home operation of any scale. Thinking carefully about all aspects of home mining and planning to safeguard them with a custom-made threat model is key to ensuring a miner’s long-term survival.

This is a guest post by Zack Voell. Opinions expressed are entirely their own and do not necessarily reflect those of BTC Inc or Bitcoin Magazine.

View Source

Did you like this post? Consider donating to us.

[crypto-donation-box]

Related articles

CleanSpark Mines Record 697 Bitcoin In January, A 50% Increase Since December

CleanSpark Mines Record 697 Bitcoin In January, A 50% Increase Since December

February 3, 2023
Luxor Technologies Launches The First Bitcoin Mining ASIC Request-for-Quote Platform

Luxor Technologies Launches The First Bitcoin Mining ASIC Request-for-Quote Platform

February 1, 2023
Tags: BasicnftThreat
Share76Tweet47

Related Posts

CleanSpark Mines Record 697 Bitcoin In January, A 50% Increase Since December

CleanSpark Mines Record 697 Bitcoin In January, A 50% Increase Since December

by ccLink
February 3, 2023
0

CleanSpark has reported that the firm mined a record 697 bitcoin in a single month, an increase of 50% from...

Luxor Technologies Launches The First Bitcoin Mining ASIC Request-for-Quote Platform

Luxor Technologies Launches The First Bitcoin Mining ASIC Request-for-Quote Platform

by ccLink
February 1, 2023
0

Luxor has launched the first ever ASIC RFQ platform with the goal of maximized market transparency and access. Luxor Technologies,...

Blockfi to Auction off Crypto Mining Assets

Blockfi to Auction off Crypto Mining Assets

by ccLink
January 31, 2023
0

Reading Time: 2 minutes Blockfi has been given permission to auction off its crypto mining assets The bankrupt lending platform...

BlockFi gets court nod to sell crypto mining assets

BlockFi gets court nod to sell crypto mining assets

by ccLink
January 31, 2023
0

BlockFi reportedly wants to get bids in as quickly as possible, to make the most of the current market conditions....

Crypto Mining Firm Argo: Back on The Nasdaq But New Lawsuit Hits

Crypto Mining Firm Argo: Back on The Nasdaq But New Lawsuit Hits

by ccLink
January 31, 2023
0

A class-action lawsuit for misleading statements and lack of key information was brought by investors against Argo Blockchain, a crypto...

Load More
  • Trending
  • Comments
  • Latest

Bed Bath & Beyond: A Retail Revolution in Home Essentials!

February 2, 2023
Crypto exchange Gate.io to provide Pyth Network with price data

Crypto exchange Gate.io to provide Pyth Network with price data

November 25, 2021
Celsius Network Raises $400M Led by Canada’s 2nd Largest Pension Fund to Reassure Regulators

Celsius Network Raises $400M Led by Canada’s 2nd Largest Pension Fund to Reassure Regulators

November 20, 2021
You Are The Carbon They Want To Reduce

You Are The Carbon They Want To Reduce

April 11, 2022
AMC CEO Proudly Declares That the Company Now Accepts Various Cryptocurrencies as Online Payment

AMC CEO Proudly Declares That the Company Now Accepts Various Cryptocurrencies as Online Payment

0
New york city’s Incoming Mayor Wants to Be Paid in Bitcoin (At Least Temporarily)

New york city’s Incoming Mayor Wants to Be Paid in Bitcoin (At Least Temporarily)

0
International Money Laundering Watchdog Says Uh, Yeah, Better Regulate Cryptocurrency

International Money Laundering Watchdog Says Uh, Yeah, Better Regulate Cryptocurrency

0
No, Putin Isn’t Embracing Cryptocurrency Just Yet

No, Putin Isn’t Embracing Cryptocurrency Just Yet

0
CleanSpark Mines Record 697 Bitcoin In January, A 50% Increase Since December

CleanSpark Mines Record 697 Bitcoin In January, A 50% Increase Since December

February 3, 2023
Crypto Whales Believe These Altcoins Will Take the Crypto World by Storm – Find Out Why

Crypto Whales Believe These Altcoins Will Take the Crypto World by Storm – Find Out Why

February 2, 2023
Okx to Launch Okx Collective, a Metaverse Experience Powered by Manchester City Soccer Players

Okx to Launch Okx Collective, a Metaverse Experience Powered by Manchester City Soccer Players

February 2, 2023
FIO Protocol Launches NFT Domains Wrapped on Polygon

FIO Protocol Launches NFT Domains Wrapped on Polygon

February 2, 2023

Join our mailing list

Tags

ADA altcoin altcoin daily altcoins Binance bitcoin bitcoin analysis bitcoin crash bitcoin live bitcoin news bitcoin news today bitcoin prediction bitcoin price bitcoin price prediction bitcoin today Blockchain btc btc news btc price buy bitcoin Cardano Crypto crypto crash Cryptocurrency cryptocurrency news crypto market Crypto Monnaie cryptomonnaie Crypto News crypto news today DEFI Dogecoin ETH Ethereum Finance investing metaverse Money news nft Ripple Shiba inu Solana trading xrp

© 2022 CC.LINK

No Result
View All Result
  • Home
  • News
  • NFT
  • Videos/Tips
  • Mining
    • How to Mine Bitcoin
    • Top Mining Software
    • Mining Articles
  • Tools
    • Live Crypto
    • Free Wallet
  • Live
  • Marketplace
  • Contact us

© 2022 cc.Link.