ABSTRACT
Consider the following set-up for the plot of a possible future episode of the TV series Black Mirror: human brains can be connected directly to the net and MiningMind Inc. has developed a technology that merges a reward system with a cryptojacking engine that uses the human brain to mine cryptocurrency (or to carry out some other mining activity). Part of our brain will be committed to cryptographic calculations (mining), leaving the remaining part untouched for everyday operations, i.e., for our brain's normal daily activity. In this short paper, we briefly argue why this set-up might not be so far fetched after all, and explore the impact that such a technology could have on our lives and our society.
- bbc.co.uk. 2017. How fake news plagued 2017. (2017). http://www.bbc.co.uk/ news/world-42487425Google Scholar
- Neil Burger (directed by). 2011. Limitless. (2011). http://www.imdb.com/title/ tt1219289/ref_=tt_urv.Google Scholar
- businessinsider.com. 2017. Firefox browser maker Mozilla is taking on fake news. (2017). http://www.businessinsider.com/ mozilla-new-initiative-counter-fake-news-2017--8IR=TGoogle Scholar
- coinhive.com. 2017. A Crypto Miner for your Website. (2017). https://coinhive. comGoogle Scholar
- Niall J Conroy, Victoria L Rubin, and Yimin Chen. 2015. Automatic deception detection: Methods for finding fake news. Proceedings of the Association for Information Science and Technology 52, 1 (2015), 1--4. Google Scholar
Digital Library
- engadget.com. 2016. Clickbait, fake news and the power of feeling. (2016). https://www.engadget.com/2016/11/21/ clickbait-fake-news-and-the-power-of-feeling/Google Scholar
- engadget.com. 2017. Advertisers are upset with Safari's new antitracking features. (2017). https://www.engadget.com/2017/09/16/ advertisers-are-upset-with-safaris-new-anti-tracking-features/Google Scholar
- Mark N. Gasson. 2010. Human Enhancement: Could you become infected with a computer virus. In 2010 IEEE International Symposium on Technology and Society (ISTAS). 61--68.Google Scholar
Cross Ref
- hackerbits.com. 2017. What is cryptojacking (2017). https://hackerbits.com/ programming/what-is-cryptojackingGoogle Scholar
- Richard E Kopelman. 1977. Merit Rewards, Motivation and Job Performance. Research Management 20, 3 (1977), 35--37.Google Scholar
Cross Ref
- mashable.com. 2010. New App Rewards Shoppers for Scanning Barcodes. (2010). https://mashable.com/2010/09/27/checkpoints/#9xXa8zt8LsqIGoogle Scholar
- Ellen M. McGee and Gerald Q. Maguire. 2007. Becoming Borg to Become Immortal: Regulating Brain Implant Technologies. Cambridge Quarterly of Healthcare Ethics 16, 3 (2007), 291--302.Google Scholar
Cross Ref
- Deborah Minors. 2017. Can you read my mind (2017). https://www.wits.ac.za/ news/latest-news/research-news/2017/2017-09/can-you-read-my-mindGoogle Scholar
- Nerve. 2016. (2016). http://www.imdb.com/title/tt3531824/. Official Website: http://www.playnerve.com.Google Scholar
- Neuralink. 2016. (2016). https://www.neuralink.comGoogle Scholar
- shopkick.com. 2017. User-Friendly Apps That Pay You for Scanning Barcodes. (2017). https://www.shopkick.com/blog/ user-friendly-apps-pay-you-scanning-barcodes/Google Scholar
- Chris Stokel-Walker. 2018. Are you making cryptocurrency for crooks New Scientist 237, 3161 (2018), 16.Google Scholar
- support.apple.com. 2017. How to use your Apple Watch without your iPhone nearby. (2017). https://support.apple.com/en-us/HT205547Google Scholar
- Eugenio Tacchini, Gabriele Ballarin, Marco L. Della Vedova, Stefano Moret, and Luca de Alfaro. 2017. Some like it hoax: Automated fake news detection in social networks. arXiv preprint arXiv:1704.07506 (2017).Google Scholar
- Desney Tan and Anton Nijholt. 2010. Brain-Computer Interfaces and HumanComputer Interaction. Springer London, London, 3--19.Google Scholar
- telegraph.co.uk. 2018. YouTube shuts down hidden cryptojacking adverts. (2018). http://www.telegraph.co.uk/technology/2018/01/29/ youtube-shuts-hidden-crypto-jacking-adverts/Google Scholar
- theguardian.com. 2017. Billions of video site visitors unwittingly mine cryptocurrency as they watch. https://www.theguardian.com/technology/2017/dec/13/video-site-visitorsunwittingly-mine-cryptocurrency-as-they-watch-report-openload-streamangorapidvideo-onlinevideoconverter-monero. (2017).Google Scholar
- theguardian.com. 2018. Huge cryptojacking campaign earns just $24 for hackers. (2018). https://www.theguardian.com/technology/2018/feb/14/ cryptojacking-campaign-24-dollars-hackers-cryptocurrency-salonGoogle Scholar
- thehackernews.com. 2018. Thousands of Government Websites Hacked to Mine Cryptocurrencies. (2018). https://thehackernews.com/2018/02/ cryptojacking-malware.htmlGoogle Scholar
- time.com. 2016. How Your Smartphone is Ruining Your Relationship. (2016). http://time.com/4311202/smartphone-relationship-cell-phone/Google Scholar
- John B Trimper, Paul Root Wolpe, and Karen S Rommelfanger. 2014. When I becomes we: ethical implications of emerging brain-to-brain interfacing technologies. Frontiers in neuroengineering 7 (2014), 4.Google Scholar
- Vitality. 2017. Make every step count with an activity tracker. (2017). https: //www.vitality.co.uk/rewards/partners/activity-tracking/Google Scholar
- Vitality. 2017. Vitality motivates members to get more active with Apple Watch Series 3. (2017). https://www.vitality.co.uk/media/ vitality-extends-active-rewards-with-apple-watch-series-3Google Scholar
- William Yang Wang. 2017. Liar, Liar Pants on Fire: A New Benchmark Dataset for Fake News Detection. arXiv preprint arXiv:1705.00648 (2017).Google Scholar
- wccftech.com. 2017. The Pirate Bay Is Cryptojacking Its Visitors' Computers to Mine for Monero. (2017). https://wccftech.com/ the-pirate-bay-cryptojacking-mine-monero/Google Scholar
- wired.com. 2016. Ad Blockers Are Making Money Off Ads (and Tracking, Too). (2016). https://www.wired.com/2016/03/ heres-how-that-adblocker-youre-using-makes-money/Google Scholar
Index Terms
-
MMM: May I Mine Your Mind
-
Recommendations
-
MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense
CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications SecurityA wave of alternative coins that can be effectively mined without specialized hardware, and a surge in cryptocurrencies' market value has led to the development of cryptocurrency mining ( cryptomining ) services, such as Coinhive, which can be easily ...
-
Digging into Browser-based Crypto Mining
IMC '18: Proceedings of the Internet Measurement Conference 2018Mining is the foundation of blockchain-based cryptocurrencies such as Bitcoin rewarding the miner for finding blocks for new transactions. The Monero currency enables mining with standard hardware in contrast to special hardware (ASICs) as often used in ...
-
An Analytical Study on Frequent Itemset Mining Algorithms
MIKE 2013: Proceedings of the First International Conference on Mining Intelligence and Knowledge Exploration - Volume 8284Data mining is the process of collecting, extracting and analyzing large data set from different perspectives. Fundamental and important task of data mining is the mining of frequent itemsets. Frequent itemsets play an important role in association rule ...
Comments