mining crypto with your internet?!?!

Does your code have vulnerabilities? FIND OUT!! Snyk your code: PROJECT INFO …


  1. Does your code have vulnerabilities? FIND OUT!! Snyk your code:

    ????????Commands + Walkthrough: ????????
    ????Buy a Raspberry Pi:

    ????????Become a NOOB!! (join the noob army): ????????

    In this video, NetworkChuck shows you how to become a Mysterium Network node runner using a Raspberry Pi and some spare internet bandwidth. You will learn how to set it up on your own Raspberry Pi and how to start earning Mysterium's Cryptocurrency MYST token while you sleep.

    **Sponsored by Snyk

    0:00 ⏩ Intro
    1:04 ⏩ What do you need?
    2:08 ⏩ What the junk is Mysterium?
    13:48 ⏩ STEP 1 – Bake your Pi (Raspberry Pi setup)
    17:34 ⏩ STEP 2 – Setting up your MYST account and installing Mysterium
    23:00 ⏩ STEP 3 – Setting up your node runner
    27:59 ⏩ Outro

  2. Spooky idea running strange unknown traffic over my Ip-adress. Even if there are whitelists there are plenty ways of doing shit with ChiPo*rn or other shit on whitelisted socialmedia sites. Don't do this guys!

  3. Why do data centers earn less despite working 24/7?
    Price per GiB: 0.6160 MYST
    Price per hour: 0.0002 MYST
    Service earnings: 0.0075 MYST
    Price per GiB: 0.2800 MYST
    Price per hour: 0.0002 MYST

  4. hmm, this is interesting, but some hacker can just use my ip, act as me, and then the server would think that i have done whatever things that the hacker did. Pretty unsafe. I would get some money, but still, the hacker can act like me and then i would be the culprit in the eyes of the server the hacker has exploited, 'cause its my IP.

  5. you say the id for myst is not connected to you, but you just connected your id to it by paying by credit card, or did i miss smith there?

  6. I have many RPI devices (Zero 2 W, Zero W, 3A+, 3B+, 4B, 5). What's the smallest Pi i can use for this, does it need to be a 4 or higher or can i do it with a zero w?

  7. "Intriguing concept! Loved the tutorial on mining crypto with a Raspberry Pi and Mysterium Network. Clear instructions make it accessible for anyone. Excited to explore this unique way of earning crypto while boosting privacy. Well done!"

  8. My concern with DVPN is if it is decrypted, and some illegal stuff goes through your node, you can be tracked down instead of the person who sent the illegal stuff.

  9. I wonder what would happen if I use an exit gateway pointing to a vpn(surfshark, PIA, unlimited vpn, or something)…. would the exit node be the vpn instead of me?

Comments are closed.