Hmm interesting, this should be done with all top 50 coins
or use common sense ?
..ALL of these stupid pyramid schemes coins have an advantage exploited by so called "devs"
i have watched so many different ways i have lost count..
modding the source code is simply ONE way of doing it and it's the easy way too !
it takes more skill to exploit an unfair advantage with out using code advantages / exploits.
clearing the code alone is nothing but a small piece of the puzzle in determining if a coin is legit.
and i even pointed this out by quoting the OP from another topic..
this OP here considers himself to be a little guru of IPO's and they are scams.
it's a scammers fight going on for ages.. they have been battling each other for a long time
and it's only going to get worse i predicted long ago..
as these guys destroy the scene they go at each others throats for the dwindling amount of remaining suckers willing to buy their clone coins..
this guy wants to prop up his own shitty coins using a different "advantage" and make others competing look bad.
and he wants to make money of you guys doing it and come off like a hero..
take my money right ?
i should write a book titled. "Making money for dummies" - "How to Github for fast cash"
point is he aptly demonstrated a vector where the units amount can be made to appear as one thing when it is in fact different.
call that what you want : an "output" a "problem with the explorer" - i call it " an attack vector" -
and with the serious lack of education in the general market place i'd say its a very serious matter if you take into account the FACT that a 51% attacker can achieve a similar result.
i donated no worries happy to do it - this has brought massive attention to this issue, there may well be other little gems hiding in the client code, this encourages analytical development , this use to be done by the Bitcoin core developers , but they are probably too occupied with building ASICs maybe to worry about a silly thing like the security of the cryptocurrency ?
TL;DR
this is an attack vector the currency is unimportant, if you had of shown this i would have contributed to you.
It will lead to more attention to analyzing the code, and maybe there a other little gems hiding in there?