How does foreign universities govern "mining"?

Author:China Education Network Time:2022.07.28

In recent years, with the price of virtual currencies, the global "mining" behavior has intensified and spread in various fields. In the field of education, being driven by the interests of virtual currency economic interests, many foreign universities actively "mining" and passive "mining" activities abound. At the same time Essence

For "mining", some foreign universities prohibit teachers and students from using the school's public resources to "mine"; some require teachers and students to stay away from "mining". Although the degree of different degrees, most of them exclude "mining" activities to enter the campus.

University of Michigan: "Mining" behavior violated university policy

The University of Michigan asked students to stay away from "mining" in the notice of computing safety, saying that this move violated university policies and was no different from "theft". The notice requires that university resources (including computer hardware, network services, and power resources, etc.) are prohibited on campus on campus.

Ravi Pendse, Vice President and Chief Information Officer of Michigan University, said that his team found the "occasional" Bitcoin "mining" activity in the university system. Essence

"In some cases, the attacker uses the Internet fishing technology to lift the victim to click the link to load the 'mining' code, or use a malicious code to infect the browser website." Pendse said. "The only sign that the victim can notice is the computer. Performance decreases, so the 'mining' attack is difficult to detect. "

PENDSE emphasizes that the need for education on the entire university community needs to be educated. "Each member of the university community needs to have relevant consciousness. We will regularly make reminders, alerts and propaganda materials to continuously remind our community members what means to maintain network security."

PENDSE not only monitor "mining" of cryptocurrencies, but also monitor the network attacks and threats that may subvert the campus system. He once said: "The university is almost different from any other entities. We are a school, a research institution, and a place for students to provide students with medical care and sports entertainment activities. The most important thing is that we must always provide an open environment while providing an open environment. , Protect our institutional data and assets. "

Kenane College: It is forbidden to use the use of on -school resources for "mining"

Kenane College issued relevant statements and policies on the official website, stating that the use of resources in schools was prohibited from digging virtual currencies. This ban is applicable to all members of the Kenien community and any visitors, suppliers or partners who use Kenien Network, Calculation or Electricity Resources.

At the same time, the Cunan Academy explained the reason for the ban. It said that as a non -profit organization, the resources on the school cannot be used for business purposes or personal economic interests.

First of all, the use of Kenien resources for the "mining" of virtual currencies violated the school's non -profit status, and had a negative impact on the college's participation in the federal financial assistance programs and gift funds.

Secondly, the "mining" of virtual currencies on Kenien's computer will reduce the performance of computers for legitimate use. Some "mining" software is used by hackers, leaving "back doors" in computers or networks, bringing extra work to IT personnel, and they must investigate these performance and security issues.

Finally, the large amount of power use of cryptocurrencies "mining" has a negative impact on the goals of the college's sustainable development and responsible use of resources.

At the same time, Kenien College emphasizes the harm caused by passive "mining": hackers sometimes use online fishing technology to set code in the website. When the user opens the website, the code runs automatically, and the user device will be reduced to zombie mining machines, and the website owner is used to dig virtual currency. Except for the slower performance of the computer, it is difficult for users to notice other changes, but all private information on the user device will face the risk of being leaked at any time.

Stanford University: School resources must not be used to seek private interest

When Stanford University noticed that the university system was increasing by hackers, it also warned students, emphasizing that school resources must not be used to seek personal economic benefits.

Michael Duff, Chief Information Security Officer of Stanford University, said in a blog post: "When the calculation cost is minimized, the virtual currency 'mining' is the most favorable. And the cost of campus power costs greatly increased. "

Therefore, Stanford University issued relevant policies in January 2018 to prohibit students from using school equipment to "mine". In addition, in order to reduce the risk of students' computer systems, Stanford University provides students with a network security guide manual and reminds students to update the software regularly.

Organ: Wang Yajing

- END -

Sihong, Jiangsu: Technology helps companies empower high -quality development

Recently, Sihong County, Jiangsu Province held the development of a crystal silico...

New energy vehicles supplement energy; Xiaopeng and Weilai each have their own thousand autumn

The picture comes from Canva.Under the joint influence of various factors such as ...