Has anyone run a network sniffer on these things while they are running. There is a lot more network noise than the S1's made. I am not talking about share request/response, I am talking about calls to hosts and socket connection responses(causing extra beep sounds), kind of like a bot.
I have the gift of always thinking the worst of people. Would it be possible a % of the hash power is utilized/reserved for an internal process named "4bitmainpool"?
Maybe its some debug/diagnose thing they forgot to take out?
I first used Fiddler to sniff but setting up a Unix VM for better tools now.
Imagine, what if they could take 2-4% hash power from every S3 miner on-line.............
Process list from the unit...
PID USER VSZ STAT COMMAND
1 root 1372 S /sbin/procd
2 root 0 SW [kthreadd]
3 root 0 SW [ksoftirqd/0]
5 root 0 SW< [kworker/0:0H]
7 root 0 SW< [khelper]
8 root 0 SW [kworker/u2:1]
60 root 0 SW< [writeback]
62 root 0 SW< [bioset]
64 root 0 SW< [kblockd]
89 root 0 SW [kworker/0:1]
94 root 0 SW [kswapd0]
139 root 0 SW [fsnotify_mark]
152 root 0 SW< [ath79-spi]
230 root 0 SW< [deferwq]
231 root 0 SW [kworker/0:2]
241 root 0 SW [khubd]
327 root 0 SWN [jffs2_gcd_mtd3]
381 root 880 S < ubusd
382 root 768 S /sbin/askfirst ttyATH0 /bin/ash --login
418 root 0 SW [kworker/u2:2]
456 root 0 SW< [cfg80211]
530 root 1492 S /sbin/netifd
574 root 1516 S /usr/sbin/crond -f -c /etc/crontabs -l 5
585 root 1156 S /usr/sbin/dropbear -F -P /var/run/dropbear.1.pid -p 22
636 root 1500 S udhcpc -p /var/run/udhcpc-br-lan.pid -s /lib/netifd/dhcp.script -f -t 0 -i br-lan -C
637 root 1500 S udhcpc -p /var/run/udhcpc-eth1.pid -s /lib/netifd/dhcp.script -f -t 0 -i eth1 -H antMinerS3 -C
656 root 1152 S /usr/sbin/uhttpd -f -h /www -r antMiner -x /cgi-bin -t 60 -T 30 -k 20 -A 1 -n 3 -N 100 -R -p 0.0.0.0 80
684 nobody 956 S /usr/sbin/dnsmasq -C /var/etc/dnsmasq.conf -k
848 root 1596 S wpa_supplicant -B -P /var/run/wifi-wlan0.pid -D nl80211 -i wlan0 -c /var/run/wpa_supplicant-wlan0.conf
879 root 1508 S udhcpc -p /var/run/udhcpc-wlan0.pid -s /lib/netifd/dhcp.script -f -t 0 -i wlan0 -H antMinerS3 -C
951 root 1500 S /usr/sbin/ntpd -n -p 0.openwrt.pool.ntp.org -p 1.openwrt.pool.ntp.org -p 2.openwrt.pool.ntp.org -p 3.open
976 root 42780 R cgminer --bitmain-options 115200:32:8:18:218.75:1106 -o stratum+tcp://
/ -O
995 root 1220 S /usr/sbin/dropbear -F -P /var/run/dropbear.1.pid -p 22
996 root 1508 S -ash
1104 root 1496 R ps w
Bit unwise to make it capable of being hijacked if any old person can shell into the unit and play around, they'd be caught pretty quickly. More likely the traffic you're seeing could be from the ntp daemon.