I think I read that mining hijacking attacks are now the number one attack type that occur on compromised cloud computing accounts. Which makes sense really.
-
-
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Based on what criteria did they make that determination? How does Lightning activity resemble “mining?”
-
My understanding is that they looked at outgoing connections. Probably the LN node established a connection to another node that was flagged as being running some mining code.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.
node as mining activity.
I was surprise (maybe not deeply) to see them investigating such activity.