We found the machines are sending back encrypted packets back to a Chinese IP address, the packets are encrypted so we are not sure weather its sending back hashes or somethig more sinister.
We have re-wrote the lketc dragon miner software our self and found the units to be hashing 10% more, so likely stealing hashes from our power.
i will release more proof and our clean dragon miner software after more tests.
I am in The Netherlands at the moment, I can't make an image of the latest firmware of the Dragon miners that are password protected.
Can someone upload an image that is password protected?
I need it ASAP, I found a Dutch sotware engineer who can reverse engineer it.
I will tip him if he finds the password and stuff that don't belong in that image.
Good luck to your engineer, I wish him luck and he's going to need it
I haven't contact the Dutch engineer, instead I try to see if it was possible to do it myself before I call help.
I had to start as a noob in Linux.
The LKETC password was not the most diffecult part, the ghost files that replace any files you have change back to the original files every time
after a reboot are.
After I found out the password, I found an easier way to change the password, simply replace the file "shadow" with your own username and password.
This is a standaard Linux trick, so next time you run into a firmware that is locked and you have control over the SD card.
Backup the SD card and replace the password and username in the file "shadow" with your own password and username.
It takes only 5 minutes instead of hours.
All the LKETC firmware use CGminer 3.9.0, the only difference between them is the languages files.
The first versions only have Chinese, the later version have English added and the last version have also Russian.
The ghost files in the latest version is more trickier than in the first version.
https://www.dropbox.com/s/14a66jqudfjkulw/Dragon_192_168_1_101.7zThis is the latest firmware with all the languages files, I change all the LKETC logo with my own and added a password protected page that I have
learn here.
https://bitcointalksearch.org/topic/m.7277745The IP of the miner is 192.168.1.101
The username of the password protected page is admin, no password, you can change that when you SSH into the Raspberry Pi with PUTTY.
The Raspberry username is pi and the password is raspberry.
Once you are logged into the Raspberry.
su root
cd /var/www
nano passwordprotect.php
Change your username and password and save it by pressing Ctrl+x
I want to write a tutorial how you can replace the ghost files with your own customize files and logo, but I am afraid I am too busy to do that
at this moment.