Skip to main content
  1. Home
  2. Computing
  3. Legacy Archives

Student secretly used Harvard’s supercomputer to mine Dogecoin

Add as a preferred source on Google

If you have a 14,000-core supercomputer sitting around at your educational establishment, why not use it to generate coins for your favorite digital currency? That was the reasoning of an unnamed Harvard University student, who has been rumbled after using the school’s supercomputer for unauthorized Dogecoin mining purposes.

The story comes courtesy of The Harvard Crimson, which reports that the “Odyssey cluster” of Harvard’s high-powered computing network was utilized for the mining. The operation came to light via an internal email circulated to officials from the Faculty of Arts and Sciences Research Computing.

Recommended Videos

“A Dogecoin mining operation had been set up on the Odyssey cluster consuming significant resources in order to participate in a mining contest,” wrote Assistant Dean for Research Computing James Cuff in the email. “Odyssey and Research Computing resources can not be used for any personal or private gain or any non-research-related activity.”

“As a result, and as guidance and as warning to you all, I do need to say that the individual involved in this particular operation no longer has access to any and all research computing facilities on a fully permanent basis.” The student behind the endeavour has not been identified.

In an email to the Crimson, Harvard PhD graduate David Simmons-Duffin explained that the Odyssey cluster can generate the same amount of data in eight hours that a personal computer can generate in a year. “Although each individual processor isn’t much more powerful than your personal laptop, having many processors together can be a huge benefit when doing scientific computing,” he wrote.

Dogecoin is one of the more well-known and widely used virtual currencies after Bitcoin. It recently hit the headlines after helping to fund the Jamaican bobsled team at the Winter Olympics, and our own Andrew Couts has written in-depth about this emerging new currency.

David Nield
Former Contributor
Dave is a freelance journalist from Manchester in the north-west of England. He's been writing about technology since the…
Asus reveals ROG Strix XG129C, a tiny secondary monitor chasing Elgato’s gamer lunch
The secondary display category has been waiting for a product that combines a proper screen, real color accuracy, and gaming ecosystem integration in one tidy package.
Strix XG129C secondary display.

If you’ve ever wished your work desk had a dedicated screen for reviewing your system’s performance, chat windows, or streaming controls, so that you don’t have to disturb your main monitor, Asus has heard you. 

The ROG Strix XG129C is a 12.3-inch secondary display with a touchscreen, designed to sit beneath your primary monitor and handle everything that could be a distraction on your main screen, and it costs $199. 

Read more
Intel’s turnaround is one for the ages, without having much to show for it
Wall Street is betting big on Intel before the results arrive
Logo

Intel’s comeback has become one of the market’s biggest surprises. Its stock has risen nearly 490% over the past year, pushing the company back into record territory and reviving confidence in a chipmaker many had written off.

The problem is that Intel still has little product success to justify that excitement.

Read more
Apple’s Continuity features are so good, they make Windows and Android feel incomplete
Android and Windows try, but Apple's ecosystem is on a whole different level.
Mac iPad iPhone with blurred background

Windows and Android platforms have been trying to catch up to Apple's ecosystem. And honestly, in some areas, they have succeeded. But replicating a feature here and there is very different from pulling off what Apple has built. The seamless, almost invisible way all of Apple's devices work together is genuinely hard to replicate.

Apple calls these Continuity features. You can use these features to seamlessly transition from one device to another, unlock devices without entering passwords, transfer files, and much more. 

Read more