Skip to main content
  1. Home
  2. Computing
  3. News

Torrenting app denies it’s ‘secretly’ mining Bitcoins

Add as a preferred source on Google

You do carefully check all of the user agreements that flash before your eyes before clicking OK, don’t you? Well, you should — even if most of us don’t — and this weekend’s furore over popular torrenting software uTorrent is the most recent reminder why.

With a little help from users, Trusted Reviews first found out that the new uTorrent update came with a Bitcoin mining tool called Epic Scale. According to disgruntled forum members, this software installed itself without permission alongside uTorrent, taking up CPU cycles on users’ computers and earning some extra revenue for the developers.

Recommended Videos

BitTorrent, which owns uTorrent, responded with a statement: “Like many software companies, we have partner offers in our install path and our policy is that they are strictly optional. We aim to work with partners that would appeal to our tech-forward user base. This is the case with Epic Scale, they are litecoin based and charity-focused.”

“We have reviewed the issue closely and can confirm there is no silent install happening. We are continuing to look at the issue. But this is most likely these users accepted the offer during install.”

That’s backed up by a step-by-step walkthrough of the install process carried out by Trusted Reviews, which reveals there is indeed a confirmation window asking users if they want to install Epic Scale. Either the members posting in the uTorrent forums didn’t see it, or they’ve got their hands on rogue versions of the installation app.

Third-party bundled tools are a key way that developers of free software can try and get some financial return from their efforts, but some of these third-party apps are more sinister than others. Epic Scale seems to be one of the more benign applications out there — much of the ‘mining’ it does goes towards helping charities and research projects — but it’s a timely reminder not to click through those setup wizards too quickly.

David Nield
Former Contributor
Dave is a freelance journalist from Manchester in the north-west of England. He's been writing about technology since the…
Asus reveals ROG Strix XG129C, a tiny secondary monitor chasing Elgato’s gamer lunch
The secondary display category has been waiting for a product that combines a proper screen, real color accuracy, and gaming ecosystem integration in one tidy package.
Strix XG129C secondary display.

If you’ve ever wished your work desk had a dedicated screen for reviewing your system’s performance, chat windows, or streaming controls, so that you don’t have to disturb your main monitor, Asus has heard you. 

The ROG Strix XG129C is a 12.3-inch secondary display with a touchscreen, designed to sit beneath your primary monitor and handle everything that could be a distraction on your main screen, and it costs $199. 

Read more
Intel’s turnaround is one for the ages, without having much to show for it
Wall Street is betting big on Intel before the results arrive
Logo

Intel’s comeback has become one of the market’s biggest surprises. Its stock has risen nearly 490% over the past year, pushing the company back into record territory and reviving confidence in a chipmaker many had written off.

The problem is that Intel still has little product success to justify that excitement.

Read more
Apple’s Continuity features are so good, they make Windows and Android feel incomplete
Android and Windows try, but Apple's ecosystem is on a whole different level.
Mac iPad iPhone with blurred background

Windows and Android platforms have been trying to catch up to Apple's ecosystem. And honestly, in some areas, they have succeeded. But replicating a feature here and there is very different from pulling off what Apple has built. The seamless, almost invisible way all of Apple's devices work together is genuinely hard to replicate.

Apple calls these Continuity features. You can use these features to seamlessly transition from one device to another, unlock devices without entering passwords, transfer files, and much more. 

Read more