May 18, 2026

Capitalizations Index – B ∞/21M

Supminer ccMiner fork for RavenCoin (RVN) X16r Mining

Crypto Mining Blog
Supminer ccMiner fork for RavenCoin (RVN) X16r Mining

Supminer ccminer fork for ravencoin (rvn) x16r mining

Another open-source fork of ccMiner called supminer (source) is now available, an optimized version from the operator of the Suprnova mining pools that promises up to 10% better performance than the recently released nevermore ccminer fork. The supminer ccMiner fork comes with with no developer fee, but you can show your support by mining Ravencoin (RVN) on Suprnova’s RVNCoin Pool. There is an official 32-bit Windows binary release available compiled with CUDA 9.1, so make sure you have up to date video drivers on your mining rigs. The code is compatible with Linux as well, though you will need to compile it yourself (make sure you have CUDA 9.1 installed to compile from source).

In theory the supminer should be faster than the other available ccminer forks with X16r support, but you should test and compare the different releases and see what works and performs best on your hardware. Feel free to report hashrates and stability on your mining rigs and how supminer compares to the nevermore and enemy miners. When comparing hashrates make sure you compare on the same algorithm, because hashrate varies depending on the currently switched to algorithm. Do note that the performance optimizations should not work only on the X16r algorithm, but should also help improve performance on other chained algorithms supported by ccminer.

To download and try the 32-bit Windows binary of the supminer X16r Nvidia miner…

Previous Article

Best Websites for Cryptocurrency Beginners, Buying Cryptos Safe and Easy

Next Article

Coinbase Reverses Statement, To Support ERC20 Tokens.

You might be interested in …

Cyber-Security Hero Who Stopped WannaCry Attack Arrested in Las Vegas

Marcus Hutchins, the British security researcher who aided ailing Wannacry malware victims, including the UK’s National Health Service, arrested by the FBI in Las Vegas.


The security researcher who stopped the Wannacry malware attack by registering an internet domain that the malware communicated with has reportedly been arrested at an airport. According to emerging reports, Hutchins was arrested in Las Vegas as he was leaving the country after attending the Blackhat and Def Con conventions which are held annually for security researchers.

Friends of Hutchins who were with him at the conventions say they do not know his whereabouts and have not heard from him for 18 hours. The US Department of Justice, however, released the following statement:

Marcus Hutchins… a citizen and resident of the United Kingdom, was arrested in the United States on 2 August 2017, in Las Vegas, Nevada, after a grand jury in the Eastern District of Wisconsin returned a six-count indictment against Hutchins for his role in creating and distributing the Kronos banking Trojan.

Confusion and Coincidence Amid Arrest Details

Members of both cryptocurrency and cyber security communities have taken to Twitter to express their disbelief and confusion:

//platform.twitter.com/widgets.js

Others were quick to rush to the 23-year-old security researcher’s defense:

//platform.twitter.com/widgets.js

//platform.twitter.com/widgets.js

Motherboard was the first to break the story, where there still seemed to be confusion about quite what had happened. In an e-mail to the publication, a U.S. Marshals spokesperson stated:

My colleague in Las Vegas says this was an FBI arrest. Mr. Hutchins is not in U.S. Marshals custody.

Ironically, hours after Hutchins was arrested, more than $130,000 worth of the bitcoin ransom taken by the creators of WannaCry appear to have been tumbled through a mixer for withdrawal. This marks the first movement of the coins on the bitcoin network since the attack.

It is important to note that there is absolutely nothing to suggest that the withdrawal is in any way connected to Hutchins’ arrest.

 

The Kronos Malware

Bitcoin Wallet Malware

The Kronos malware was spread through emails with malicious attachments, hijacking credentials such as internet banking passwords and other such sensitive information. Malware such as Kronos and Wannacry are increasingly getting media attention and look set to be at record numbers in 2017 if statistics released by antivirus companies are to be believed.

What are your thoughts on this? Is Marcus Hutchins’ arrest possibly only a case of guilt by association? Let us know in the comments below.


Images courtesy of Shutterstock

The post Cyber-Security Hero Who Stopped WannaCry Attack Arrested in Las Vegas appeared first on Bitcoinist.com.

Yahoo Japan acquiert 40% de l’exchange BitARG

JournalduCoin.com Yahoo Japan acquiert 40% de l’exchange BitARG Z corporation est une filiale de Yahoo! Japan Corporation – l’annexe japonaise d’Altaba (l’ancien Yahoo!). L’entreprise a récemment confirmé qu’elle était sur le point de devenir actionnaire […]