Dear IT people:
If you were watching ip acess to your company what would an S9 miner look lke? Would it be easy to see on the network?
Dear IT people:
If you were watching ip acess to your company what would an S9 miner look lke? Would it be easy to see on the network?
Only from its behaviour, so it would depend on what was being watched.
Asking for a friend?