{"id":31562,"date":"2020-11-11T07:00:56","date_gmt":"2020-11-11T05:00:56","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=31562"},"modified":"2025-08-28T04:19:51","modified_gmt":"2025-08-28T01:19:51","slug":"how-to-safeguard-privacy-and-security-in-bitcoin-mining","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/how-to-safeguard-privacy-and-security-in-bitcoin-mining\/","title":{"rendered":"How to safeguard privacy and security in Bitcoin mining"},"content":{"rendered":"<p>In the early days of Bitcoin mining, it was truly open and accessible. Anyone could simply download free software onto their computer and start earning.<\/p>\n<p><!--more--><\/p>\n<p>However such a low barrier to entry did not last long. By the end of 2010, mining with a <span data-descr=\"Central Processing Unit (CPU) \u2014 electronic block or integrated circuit that executes machine instructions (program code), the main part of computer hardware or a programmable logic controller. Sometimes called microprocessor or simply processor.\" class=\"old_tooltip\">CPU<\/span> lost competitiveness due to the appearance of <span data-descr=\"Graphics Processing Unit (GPU) \u2013 a device comprising a microchip or chip that is part of a video adapter (video card) or motherboard.\" class=\"old_tooltip\">GPU<\/span>. This trend led to the creation of Slush Pool in November of the same year, which allowed CPU miners to earn a stable income again.<\/p>\n<p>When ASIC devices entered the market in 2013-2014, they quickly revolutionised the industry. The demand for specialised mining hardware sharply raised the entry barrier, and it remains high to this day. However, not all was lost.<\/p>\n<p>At least, if you were able to obtain several SHA-256 ASICs and affordable electricity, nothing prevented you from mining. Unfortunately, nowadays even this right may not belong to everyone.<\/p>\n<p>As governments and regulators study Bitcoin, their attempts to regulate or even directly control mining seem inevitable.<\/p>\n<p>What can be done to keep mining as accessible as possible? Slush Pool explains.<\/p>\n<h2 class=\"wp-block-heading\">Network security<\/h2>\n<p>Would you like your internet provider to know everything you do online? Probably not. One of the ways internet users have partially restored privacy in recent years is by moving from HTTP to HTTPS. The latter has already become the standard for all websites.<\/p>\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"638\" height=\"214\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/image4-92.png\" alt=\"How to safeguard privacy and security in Bitcoin mining\" class=\"wp-image-116050\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/image4-92.png 638w, https:\/\/forklog.com\/wp-content\/uploads\/image4-92-300x101.png 300w\" sizes=\"auto, (max-width: 638px) 100vw, 638px\" \/><\/figure>\n<p>The &#8216;S&#8217; in HTTPS stands for &#8216;Secure&#8217; \u2014 an abbreviation of Secure Sockets Layer (SSL) \u2014 the Secure Sockets Layer. In essence, this means your internet service provider knows which websites you visit, but not what you do on them.<\/p>\n<p>On websites without SSL certificates your internet provider can track all your activity, including usernames, passwords and even payment details. Obviously, HTTPS is a more acceptable protocol for users.<\/p>\n<p>Most Bitcoin miners still use the mining equivalent of HTTP \u2014 Stratum V1. Miners and mining pools constantly exchange data in JSON format (a human-readable format), and, if no additional precautions are taken, internet providers can see all the details of this data transfer.<\/p>\n<p>In other words, ISPs, based on the data at their disposal, can easily see that someone is mining Bitcoin. Worse still, a malicious ISP employee could steal hashrate (and thus Bitcoins) without your knowledge. Even your neighbour could carry out a hashrate hijack attack if the ISP does not isolate clients from one another properly.<\/p>\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"606\" height=\"514\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/image3-142.png\" alt=\"How to safeguard privacy and security in Bitcoin mining\" class=\"wp-image-116051\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/image3-142.png 606w, https:\/\/forklog.com\/wp-content\/uploads\/image3-142-300x254.png 300w\" sizes=\"auto, (max-width: 606px) 100vw, 606px\" \/><\/figure>\n<p>To prevent this, miners can use the industry equivalent of HTTPS: Stratum V2. While V1 data transfer is unencrypted and readable by humans, Stratum V2 uses authenticated encryption with associated data (AEAD) to ensure the privacy of data transmission between miners and pools.<\/p>\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"609\" height=\"607\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/image1-368.png\" alt=\"How to safeguard privacy and security in Bitcoin mining\" class=\"wp-image-116053\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/image1-368.png 609w, https:\/\/forklog.com\/wp-content\/uploads\/image1-368-300x300.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/image1-368-150x150.png 150w\" sizes=\"auto, (max-width: 609px) 100vw, 609px\" \/><\/figure>\n<p>Switching from JSON to binary in Stratum V2 significantly reduces the size of transmitted data, so encrypted messages in V2 are about 50% lighter than unencrypted messages in V1. The miner&#8217;s data load will not increase after switching to V2.<\/p>\n<p>Your internet service provider should not know that you mine Bitcoin. Using Stratum V2 helps avoid this. But this is only part of the solution.<\/p>\n<h2 class=\"wp-block-heading\">Total privacy<\/h2>\n<p>Your internet service provider can still see which websites you visit. A great deal can be learned about a person even from the list of URLs.<\/p>\n<p>For ordinary web browsing a VPN can be handy. A VPN masks your public IP address so your ISP does not know what you do on the internet and does not track your actions. Bitcoin miners can also use VPN services, but this introduces network latency, which can be quite costly in a business where every millisecond counts.<\/p>\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"723\" height=\"431\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/image2-226.png\" alt=\"How to safeguard privacy and security in Bitcoin mining\" class=\"wp-image-116054\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/image2-226.png 723w, https:\/\/forklog.com\/wp-content\/uploads\/image2-226-300x179.png 300w\" sizes=\"auto, (max-width: 723px) 100vw, 723px\" \/><\/figure>\n<p>Bitcoin miners can achieve the same level of privacy with a DNS proxy without significantly increasing network latency.<\/p>\n<p>This <a href=\"https:\/\/github.com\/DNSCrypt\/dnscrypt-proxy\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">dnsscrypt-proxy<\/a> provides a local service that can be used directly on a local resolver or as a DNS forwarder, encrypting and authenticating queries using the DNSCrypt protocol and passing them to an upstream server. The DNSCrypt protocol uses high-speed elliptic-curve cryptography with strong protection, which is similar to DNSCurve, but aimed at ensuring the security of the connection between the client and its first-level resolver.<\/p>\n<p>Information that is usually open is also encrypted via a DNS proxy, which means your internet provider cannot determine which sites you visit.<\/p>\n<p>Miners can use any DNS proxy that supports encrypted DNS protocols, such as DNSCrypt v2 and DNS-over-HTTPS, to achieve much greater privacy. In combination with Stratum V2 this is equivalent to browsing the web with a VPN and visiting only HTTPS domains.<\/p>\n<h2 class=\"wp-block-heading\">Hiding your energy use \u2014 that&#8217;s another problem<\/h2>\n<p>If you are using only one or a few ASIC devices, the measures described will help you make mining private and secure. Large-scale mining, however, leaves a thermodynamic footprint that is hard to hide.<\/p>\n<p>The best you can do with software is to ensure that no one, including your ISP, can eavesdrop on your mining or steal your hashrate.<\/p>\n<p>Subscribe to ForkLog&#8217;s news on Telegram: <a href=\"https:\/\/t.me\/forklogfeed\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">ForkLog Feed<\/a> \u2014 the full news feed, <a href=\"https:\/\/telegram.me\/forklog\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">ForkLog<\/a> \u2014 the most important news and polls.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the early days of Bitcoin mining, it was truly open and accessible. Anyone could simply download free software onto their computer and start earning.<\/p>\n","protected":false},"author":1,"featured_media":31563,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[1144],"tags":[1137,1111,915],"class_list":["post-31562","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-longreads","tag-cryptocurrency-mining","tag-cybersecurity","tag-slush-pool"],"aioseo_notices":[],"amp_enabled":true,"views":"35","promo_type":"1","layout_type":"1","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/31562","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=31562"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/31562\/revisions"}],"predecessor-version":[{"id":31564,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/31562\/revisions\/31564"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/31563"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=31562"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=31562"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=31562"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}