Slightly off-topic of mixing, but certainly adjacent to. Starting yesterday, my antivirus (Trend Micro) started wigging out when I opened the ATR website. It's flagged as "Coin Mining", for Bitcoin etc.
Anyone else ever experience this, or have info relating to it?
Edit for ppl choosing to not comb through comments: it's not malware, & ATR admin removed/is removing the coding in the website that triggered my antivirus. Is was benign anyways.
To be fair, Q has always been up front about it -- Nothing shady, just trying to keep the site supported without bowing to our ad-revenue overlords...
Thank you, sir - I didn't even remember that page was there. :)
I just wanted you to know that I still love your site and love how you have handled it. Thanks <3
Oh, shit, not you again. This is why I don't hang out in here anymore. :)
​
Seriously, thanks. I should get back on the discord, or post in here once in a while. My life had a rapid unplanned disassembly last year, and I'm still bolting everything back together.
Is it malware? Yes
Does it link to a site thats infested with viruses and hackers? yes
​
This page does a bunch of side stepping at point out what actually is happening when this trojan kicks off or what malware can actually do. Its a false representation/security theater.
​
This sentence pretty much sums it up,
> "Unfortunately, antivirus makers have decided to target everyone who uses this technology, not just the bad guys. So I get lumped in with them.
​
This is referring to
>Other websites sometimes run cryptocurrency miners secretly in the background.
​
It's not a "we need your permission first for it to run".. it kicks off as soon as you open the website.
​
The dirty part about it is that it's a 2-part revenue system. Which they are getting paid twice
1.) Ads on the site
2.) Bitmining
​
Then say, well, if you pay us, we will remove 1 of these, the other you have to go manually turn it off.
So you can pay us, while you pay us to pay us.
​
Genius, genius, genius!!! -Opera Guy from Mr. Deeds
That is scummy as fuck. Site: Banned.
It's literally the opposite of scummy.
You had to allow it for the miner to run in the first place. It was publicized and explained in full. To top that off its also no longer visible outside of the linked page, which you have to go out of your way to even see and you still have to personally decide to activate it.
Which part made you think it was scummy?
This was covered in a post. It's not malware. You can turn it off in your settings
Sorry for not doing a search before posting, and thanks.
That's sketchy af, no matter how you much people try to gloss over it.
It's sketchy in the sense that it's being flagged but the mining experiment itself was announced to everyone before it went live. It was opt-in, so you had to turn it on if you wanted.
He shut the whole thing down over a year ago. If I had to guess there's probably some code still on the page that is causing it to get flagged.
¯\_(ツ)_/¯
We have pretty stout antivirus and malware protection at work and I never get any warnings trying to access the site.
Only thing missing from the site is the ability to organize recipes into folders, and maybe possible the ability to track changes to a recipes so you can check a change log for things like ingredients added/removed or percentages adjusted, and the ability to go back to a previous edit. That way I don't need to maintain dozens of copies of recipes with version numbering in the title. I've been trying to go tobacco recipes lately and given the steep times involved I might be 70 years before I get something good worth sharing. I'd really like to learn how Fear and ChemicalBurnVictim et al do this in the time ranges they do.
Oh, and maybe one more thing. An easy way to print out all recipes at once, at least a printable summary of all recipes. Maybe something like this exists and I just don't know how to use it.
https://github.com/keraf/NoCoin - No Coin is a tiny browser extension aiming to block coin miners such as Coinhive.
Adblocker, etc
On its own, I do not think it's fraudulent or malicious since it mines only for the duration that which you are on the website, i.e. someone else's property- but it has very high potential for misuse, and it's incredibly easy to. Those abuses (javascript mining on sites) won't give it a good name, not for a long time.
It's also no longer present, and was opt-in when it was. :)
While the HTML that contains click listeners on them may no longer exist, the JS is still present at the bottom of the .js file where the jQuery library is brought in - and this is what malware scans are blocking. ATF is a great asset to the community, so as a subscriber, I just want to extend my thanks.
> It's also no longer present
If it wasn't present, then why would peoples programs activate because of it? Is it detecting a ghost protocol?
Also, users can add a filter list called NoCoin to their adblocker of choice, as /u/mixsomnia said it hasn't been updated in over a year. I recommend uBlock Origin or AdGuard (which apparently already includes this by default, according to the linked GitHub page).
FilterLists is a great reference and database if you'd like to find more lists. In addition, they can be conveniently added directly from that site by typing the keyword in the box, clicking "Details" and then "Subscribe".
Weird...I cant even get on ATF now. I've cleared my cache, restarted...I keep getting an error that ATF isnt on the server.
I had really weird error messages for awhile but it straightened itself out suddenly. Thank God. I need my ATF.
I happen to be doing some heavy site maintenance today, Google has changed the way it handles logins on me, and I ignored the warnings for too long! :)
​
On the positive side, things should be noticeably faster, I launched 2 more servers in the cluster for you all.
Coinhive is in it's development tools, round line 63941, dunno if its active, removed or dormant, but its there.
Yup...these are the scripts I was referring. I did set breakpoints inside the codeblocks of each method on the MinerUI object and nothing was being executed. Also checked the cookies to see if that "dont_mine" key was being set at all, but it was not.
False positives or random/planned execution whenever they want to be activated, i mean.. it'd be easier to prove that "yeah, we dont do that anymore" by removing it.. instead of just lip service of "yeah, it's inactive..trust us" and probably doing it anyway.
I got the trojan warning of from webminepool.com on 3 separate starts as soon I opened ATF.com, I refreshed each time 10 times, and it only activated the first 3 times. That's a controlled scenario, not random "false positives"
To say that "no, its not doing that", but a widely known ABUSED resource for mining, especially for activating javascript... is present in its code and activating several times for several users.. linking to a webminepool.com (a is a mining service allowing you to monetize your sites and applications with a JavaScript miner. Probably best coinhive alternative.)
...come on now... really?? You think we are stupid?
Oh, fiiiiiiiinne, you entitled shmooks. You guys made me get off my couch and do something - does that make you happy? :)
( Be sure to check https://alltheflavors.com/help/mining carefully. )
​
It wouldn't surprise me, these guys seem hell bent on getting cash.
It’s just one guy. Unless something changed, the last I heard he was barely breaking even. Not sure if that qualifies as “hell bent” but maybe you know something I don’t.
Aren’t you a moderator of this subreddit? I would be shocked if you were unaware that u/queuetue is a known vapelord, and cyber-crime kingpin. As someone else mentioned- all he wants is cash, and he’ll do anything to get it!
All I know is when I go there all I see is a big "upgrade" button for a sub par website. It's ok but not worth paying for. Put ads on and leave me alone.