AEON mining

AEON Mining Tutorial for Windows / Linux (CPU / GPU)

AEON mining

In this tutorial you will learn how to mine AEON on Windows and Linux (Ubuntu and Fedora) with CPU and or GPU.

Basics of AEON Mining

AEON mining uses the algorithm CryptoNight-Light v7.

CryptoNight-Light v7, sometimes referred to as aeon7, is ASIC resistant. Making both CPU and GPU mining possible.

Generate an AEON wallet.

Both online wallets and hardware wallets have their pros and cons.

AEON Wallet Generator : This was created by MoneroMooo, a XMR core developer. Save your wallet information in a safe place. Copy your public key and seed to a safe place. The seed can be used to restore a wallet.

Generate AEON wallet instantly.

Official AEON Wallet : The safest way to store your AEON. The fastest way is to download the wallet, then connect to a remote node. Alternatively, you can run a local node by syncing the blockchain on your computer. Running a local node is the most anonymous method.

AEON Mining Software

XMR-Stak setup instructions

Download: AMD, Nvidia and CPU (all in one)

Run xmr-stak.exe as administrator and on first start we will configure the miner. After the first start, the miner settings will be saved.

Port: Network port for web monitoring, this is optional. ex: 8000

Currency:  aeon7

Pool address:

Username: ADDRESS.PAYMENT-ID+FixedDifficulty


Fixed Difficulty setting is optional. If you are sending to an Exchange, Payment ID is not optional.

Password: WORKER:Email

SSL support:  y

Do you want to use Nicehash: n

Do you want to use multiple pools: n

When you see the line logged into mining pool you are officially mining!

These settings are saved in the same folder as xmr-stak.exe: cpu.txt, nvidia.txt, amd.txt, pools.txt and config.txt. We will be fine tuning these in a later blog.

AEON Mining Pools

Monitor workers and earnings

Use public key to track live hash rate stats, view payments, set minimum payout levels, and manage email alerts. mining dashboard.

Happy Mining!

How to setup AEON node on VPS

This tutorial will be pretty quick. We are going to be setting up an AEON node on our Ubuntu 16.04 VM from DigitalOcean.

I spun up a 4GB RAM, 2 Core, 80GB SSD VM to host my node. You will need at least enough SSD to hold the blockchain. RAM and CPU are good for the initial blockchain sync time.

Let’s jump right into it. We will be doing this the easy way, rather than compiling ourselves.

Step 1)

Create a folder for AEON, download the latest release, extract the latest release. I will try to keep this line of code updated, but please keep an eye out for any newer versions. They can be found here.

mkdir aeon
cd aeon
tar -xjvf aeon-linux-x64-v0.12.5.0.tar.bz2

Step 2)

To sync your node, run the command:


This will take about a day to finish. I prefer to use screen to run the process in the background, but ./aeond –detach works just as well.

aeond initial sync

Step 3)

Launch the wallet.


You will be prompted to enter wallet name. ex: newWallet

Enter a strong passphrase.

Select your language.


Nice work! If you have made it this far, we have a full AEON node running and ready to send / receive AEON!

A simple command is: transfer ADDRESS AMOUNT PAYMENT ID

Wanna test it?

Our AEON wallet: WmsBSQqkPGYSFdz5dsftH9Pu681XtUZmmC5xep6KALCoGJXTM4F6AegS2Rx3VDhsAxche3Lij7GCpGf5iwDyzEco281qFtbvC

How to Mine Monero (XMR) with GPU and Windows 10

Mining Monero (XMR) has been very profitable ever since the hard fork that bricked ASIC miners.

Here is a step by step guide on how to get started, assuming you have already have your rigs up and running. Let’s get started, fellow miner.

Monero can be mined with both Nvidia and AMD cards

Software needed:

Monero Wallet: Windows | Linux | Other

Monero Miner: XMR-Stak (2% Dev Fee) | XMRRig Nvidia (1% Dev Fee) | XMRRig AMD (1% Dev Fee)

First we will create a Monero wallet. Download the latest version of Moneo. Save the folder to your desktop.

Start monerod.exe and let it sync with the network. This will take some time, over a day.

Next run monerowallet-cli.exe, name your wallet, secure it with a password, and you will be given your seed. Your seed is a 25 word pass phrase that allows you to recover your account. Keep this safe.

How to create Monero wallet from monero wallet-cli

Copy your Monero address somewhere, we will need it for our miner settings.

To create a Monero address automatically you can use

For this tutorial we will use XMR Stak, that file is the pre-compiled version from the developer. Default fee is 2%, which can be changed if you compile the source yourself.

The first time you run XMR Stak you will be asked for information that will automatically create the config files needed to mine.

You will be asked which pool to mine on, here are a list of our favorites:

Now let’s fire up xmr-stak.exe and see how we are hashing.

Mining Monero on Windows with XMR Stak

Congratulations! You are now mining Monero with your GPU’s on Windows 10!

Things to note:

Where to trade XMR –

Solo mining will take forever to find blocks. Use a pool to increase profits/coins mined.

Not all GPU’s are created equal, AMD’s are better than Nvidia for CryptonightV7.

If you have any questions or comments please leave them below!

Find this tutorial helpful, please Share with your crypto friends!

Any donations or tips are greatly appreciated!

XMR – 41kZdWtRWXhLH7FSkNBZhreDqZWaJC7iDCh9dxHmhxF5HzwmsrgypZyhq8GEASvoa1HLSeEQrJ7K57JQTGnNJZpe4ENdZnn



Help Defend Internet Privacy Rights

Hi there,

Congress voted to strip Americans of their privacy rights by voting for SJR34, a resolution that allows Internet Service Providers to collect, and sell your sensitive data without your consent or knowledge.

Not on our watch! We are committed to defending and protecting the privacy of EVERYONE.

But if we want to win this fight, we need you to join the fight.

ItusVPN is running a month long fundraising campaign. This campaign will allow us to continue providing a free VPN service.

Here’s how you can help – Visit to contribute with BTC, ETH or PayPal.

ALL funds will go directly towards funding ItusVPN. Anything you can spare is greatly appreciated.

Thank you,


ItusVPN Owner


CCMiner .Bat Config Files for Yiimp and ZPool – Mining XVG

Hey everyone,


There was a huge response on our last blog post, How to Mine Verge on Windows, that we thought we would follow up with another Crypto Tutorial.

Many new miners are switching to Verge, a privacy currency that fixes many of Bitcoins flaws. Verge is also more miner friendly and levels the playing field between GPUs and ASIC hardware. ASIC’s using Scyrpt algorithm are essentially nerfed. So, when mining using the x17/lyra2v2 algorithm, GPUs stand a chance.

We are assuming that everyone knows how to open notepad and save as .bat.

Here are our config files for different pools: – Fee 2% – Current Hash Rate: 1.9GH/s

ccminer-x64.exe -a x17 -o stratum+tcp:// -u DNxmULTQWa5H2gGkZgYCTtirbEwTdoZnTi -p c=XVG -i 20 – Fee 2% – Current Hash Rate: 76.5GH/s

ccminer-x64.exe -a x17 -o stratum+tcp:// -u DNxmULTQWa5H2gGkZgYCTtirbEwTdoZnTi -p c=XVG -i 20

Lyra2v2 Algo (Faster than x17 for some GPUs)

ccminer-x64.exe -a lyra2v2 -o stratum+tcp:// -u DNxmULTQWa5H2gGkZgYCTtirbEwTdoZnTi -p c=XVG -i 20 – Fee 2% – Current Hash Rate: 52.7GH/s
Port 3737

ccminer-x64.exe -a x17 -o stratum+tcp:// -u DNxmULTQWa5H2gGkZgYCTtirbEwTdoZnTi -p c=XVG -i 20

Port 3777

ccminer-x64.exe -a x17 -o stratum+tcp:// -u DNxmULTQWa5H2gGkZgYCTtirbEwTdoZnTi -p c=XVG -i 20

The -p c=XVG is telling the pool exactly what coin your address is. The -i is intensity. If the program crashes, lower the number by one and try again.

Here is where to download CCMiner:

Donate to ItusVPN: XVG – DNxmULTQWa5H2gGkZgYCTtirbEwTdoZnTi

Where to Buy XVG – Binance

7 mine-verge-xvg-windows

How to Mine Verge (XVG) on Windows 10 Nvidia GPU’s

Please refer to our Monero Mining Tutorial. We no longer recommend mining Verge to our audience.

Hello everyone! So we just finished setting up our new cryptocurrency miner and are mining Verge as we type. So, we thought we would share some knowledge with the community.

Now, lets get started mining XVG. We are assuming you already have the correct graphic card drivers for your cards. We are using the latest Nvidia Drivers.

Software needed:

ccminer – We used “v2.2.1 Windows CUDA 9 binaries”

Electrum-XVG wallet – Download whichever OS version you need.

How to install needed software:

Start with your wallet first. After you have downloaded your XVG wallet, run the program and go through the setup process. Next, click on Tools > Network > Change the server to and set port at 50001 and uncheck Use SSL. You can play around with these settings but these are what worked for us.

Electrum XVG Wallet Connection settings

Now your wallet should be syncing and online.

Next up is setting up the miner:

CCMiner – Download 7zip file (GitHub is linked above), we used the x64 version.

ccminer for windows download

Now extract the folder to somewhere you will remember. We put ours on the desktop inside of a folder labeled ccminer.

ccminer extract

The next step is setting up our .bat file to run the miner. Inside of your ccminer folder, right click and hit New > Text Document. Now inside of the new text document paste this:

Lyra2v2 on ZPool

ccminer-x64.exe -a lyra2v2 -o stratum+tcp:// -u DNxmULTQWa5H2gGkZgYCTtirbEwTdoZnTi -p c=XVG

x17 on Yiimp

ccminer-x64.exe -a x17 -o stratum+tcp:// -u DNxmULTQWa5H2gGkZgYCTtirbEwTdoZnTi -p c=XVG

You will have to edit this to include your own wallet address. To find your wallet address, go to Electrum-XVG wallet > Address > Right Click > Copy Address.

Electrum XVG Wallet Address

Here is the options you can configure yourself, be sure to actually read the README file.

  -a, --algo=ALGO       specify the algorithm to use
                          bastion     use to mine Joincoin
                          bitcore     use to mine Bitcore's Timetravel10
                          blake       use to mine Saffroncoin (Blake256)
                          blakecoin   use to mine Old Blake 256
                          blake2s     use to mine Nevacoin (Blake2-S 256)
                          bmw         use to mine Midnight
                          cryptolight use to mine AEON cryptonight (MEM/2)
                          cryptonight use to mine XMR cryptonight
                          c11/flax    use to mine Chaincoin and Flax
                          decred      use to mine Decred 180 bytes Blake256-14
                          deep        use to mine Deepcoin
                          dmd-gr      use to mine Diamond-Groestl
                          equihash    use to mine ZEC, HUSH and KMD
                          fresh       use to mine Freshcoin
                          fugue256    use to mine Fuguecoin
                          groestl     use to mine Groestlcoin
                          heavy       use to mine Heavycoin
                          jha         use to mine JackpotCoin
                          keccak      use to mine Maxcoin
                          lbry        use to mine LBRY Credits
                          luffa       use to mine Joincoin
                          lyra2       use to mine CryptoCoin
                          lyra2v2     use to mine Vertcoin
                          lyra2z      use to mine Zerocoin (XZC)
                          mjollnir    use to mine Mjollnircoin
                          myr-gr      use to mine Myriad-Groest
                          neoscrypt   use to mine FeatherCoin
                          nist5       use to mine TalkCoin
                          penta       use to mine Joincoin / Pentablake
                          quark       use to mine Quarkcoin
                          qubit       use to mine Qubit
                          scrypt      use to mine Scrypt coins
                          scrypt:N    use to mine Scrypt-N (:10 for 2048 iterations)
                          scrypt-jane use to mine Chacha coins like Cache and Ultracoin
                          s3          use to mine 1coin (ONE)
                          sha256t     use to mine OneCoin (OC)
                          sia         use to mine SIA
                          sib         use to mine Sibcoin
                          skein       use to mine Skeincoin
                          skein2      use to mine Woodcoin
                          skunk       use to mine Signatum
                          timetravel  use to mine MachineCoin
                          tribus      use to mine Denarius
                          x11evo      use to mine Revolver
                          x11         use to mine DarkCoin
                          x14         use to mine X14Coin
                          x15         use to mine Halcyon
                          x17         use to mine X17
                          x17         use to mine X17
                          vanilla     use to mine Vanilla (Blake256)
                          veltor      use to mine VeltorCoin
                          whirlpool   use to mine Joincoin
                          wildkeccak  use to mine Boolberry (Stratum only)
                          zr5         use to mine ZiftrCoin

  -d, --devices         gives a comma separated list of CUDA device IDs
                        to operate on. Device IDs start counting from 0!
                        Alternatively give string names of your card like
                        gtx780ti or gt640#2 (matching 2nd gt640 in the PC).

  -i, --intensity=N[,N] GPU threads per call 8-25 (2^N + F, default: 0=auto)
                        Decimals and multiple values are allowed for fine tuning
      --cuda-schedule   Set device threads scheduling mode (default: auto)
  -f, --diff-factor     Divide difficulty by this factor (default 1.0)
  -m, --diff-multiplier Multiply difficulty by this value (default 1.0)
      --vote=VOTE       block reward vote (for HeavyCoin)
      --trust-pool      trust the max block reward vote (maxvote) sent by the pool
  -o, --url=URL         URL of mining server
  -O, --userpass=U:P    username:password pair for mining server
  -u, --user=USERNAME   username for mining server
  -p, --pass=PASSWORD   password for mining server
      --cert=FILE       certificate for mining server using SSL
  -x, --proxy=[PROTOCOL://]HOST[:PORT]  connect through a proxy
  -t, --threads=N       number of miner threads (default: number of nVidia GPUs in your system)
  -r, --retries=N       number of times to retry if a network call fails
                          (default: retry indefinitely)
  -R, --retry-pause=N   time to pause between retries, in seconds (default: 15)
      --shares-limit    maximum shares to mine before exiting the program.
      --time-limit      maximum time [s] to mine before exiting the program.
  -T, --timeout=N       network timeout, in seconds (default: 300)
  -s, --scantime=N      upper bound on time spent scanning current work when
                        long polling is unavailable, in seconds (default: 5)
  -n, --ndevs           list cuda devices
  -N, --statsavg        number of samples used to display hashrate (default: 30)
      --no-gbt          disable getblocktemplate support (height check in solo)
      --no-longpoll     disable X-Long-Polling support
      --no-stratum      disable X-Stratum support
  -q, --quiet           disable per-thread hashmeter output
      --no-color        disable colored output
  -D, --debug           enable debug output
  -P, --protocol-dump   verbose dump of protocol-level activities
  -b, --api-bind=port   IP:port for the miner API (default:, 0 disabled
      --api-remote      Allow remote control, like pool switching, imply --api-allow=0/0
      --api-allow=...   IP/mask of the allowed api client(s), 0/0 for all
      --max-temp=N      Only mine if gpu temp is less than specified value
      --max-rate=N[KMG] Only mine if net hashrate is less than specified value
      --max-diff=N      Only mine if net difficulty is less than specified value
      --max-log-rate    Interval to reduce per gpu hashrate logs (default: 3)
      --pstate=0        will force the Geforce 9xx to run in P0 P-State
      --plimit=150W     set the gpu power limit, allow multiple values for N cards
                          on windows this parameter use percentages (like OC tools)
      --tlimit=85       Set the gpu thermal limit (windows only)
      --keep-clocks     prevent reset clocks and/or power limit on exit
      --hide-diff       Hide submitted shares diff and net difficulty
  -B, --background      run the miner in the background
      --benchmark       run in offline benchmark mode
      --cputest         debug hashes from cpu algorithms
      --cpu-affinity    set process affinity to specific cpu core(s) mask
      --cpu-priority    set process priority (default: 0 idle, 2 normal to 5 highest)
  -c, --config=FILE     load a JSON-format configuration file
                        can be from an url with the http:// prefix
  -V, --version         display version information and exit
  -h, --help            display this help text and exit

Scrypt specific options:
  -l, --launch-config   gives the launch configuration for each kernel
                        in a comma separated list, one per device.
      --interactive     comma separated list of flags (0/1) specifying
                        which of the CUDA device you need to run at inter-
                        active frame rates (because it drives a display).
  -L, --lookup-gap      Divides the per-hash memory requirement by this factor
                        by storing only every N'th value in the scratchpad.
                        Default is 1.
      --texture-cache   comma separated list of flags (0/1/2) specifying
                        which of the CUDA devices shall use the texture
                        cache for mining. Kepler devices may profit.
      --no-autotune     disable auto-tuning of kernel launch parameters

CryptoNight specific options:
  -l, --launch-config   gives the launch configuration for each kernel
                        in a comma separated list, one per device.
      --bfactor=[0-12]  Run Cryptonight core kernel in smaller pieces,
                        From 0 (ui freeze) to 12 (smooth), win default is 11
                        This is a per-device setting like the launch config.

Wildkeccak specific:
  -l, --launch-config   gives the launch configuration for each kernel
                        in a comma separated list, one per device.
  -k, --scratchpad url  Url used to download the scratchpad cache.


After you have your configuration the way you want it, hit Save As > start.bat (Select all files)

save .bat mining script

Now all that is left is to fire up the start.bat file and make it is working!

ccminer successfully mining XVG

Congratulations! You are now mining Verge with your Nvidia GPU’s on Windows 10!

Things to note:

Where to trade XVG –

Verge (XVG) is currently $.06 so you will not see profit unless(until) XVG goes up in price.

Solo mining will take forever to find blocks. Use a pool to increase profits/coins mined.

Not all GPU’s are created equal, as you can see, ours suck.

If you have any questions or comments please leave them below!

Find this tutorial helpful, please Share with your crypto friends!

Buy us a coffee?

XVG – DLnj82LrVxYzLaSN3vuFxkNQ27rvLuV64b



The inside story on the search for the worlds most wanted man – Edward Snowden

This talk was given at a local TEDx event, produced independently of the TED Conferences. “We now know, thanks to Edward Snowden- that all of us, Greek citizens, Brits, Americans are being spied and that all of our data – whether its text messages, selfies, G-allocation data from our iPhones that we carry around with us – is being collected. Luke thinks that Snowden has done the world a great service by revealing this and thinks it’s got profound implications for democracy – and for all of us – for anyone who uses Facebook or Google or downloads videos from Youtube and so on.

So that’s the big picture. On a micro level what we can do about this as citizens?”


What is encryption and why it is critical?

In most straightforward definition, encryption implies changing over the information into unintelligible shape while exchanging to another gadget or for capacity purposes. It is very clear that encryption is done to avoid unapproved access to the information. All sort of delicate data and information is put away in scrambled shape; it ensures associations, organizations and even people from extortion and different traps.

How VPN encryption functions?

VPN activity is scrambled by the sender and decoded by the recipient; this conclusion to end encryption ensures the information exchanging by means of VPN stays classified. The technique utilized for encryption and decoding relies upon the VPN convention you are utilizing.

Obviously sender and recipient must have the regular encryption key so they can see each other. Without the encryption key, even the blocked information has no an incentive to the programmer who has accessed the activity.

Different types of VPN encryption

There are various sorts of VPN encryption and each of those accompanies diverse advances and characteristics like execution, security, accessibility and others.


Blow is a long time past encryption strategy that has been being used since pre-2000 time. This uses 64-bit hinders that mean it encounters issues while encoding bigger information like more than 32Gb. OpenVPN utilizes Blowfish encryption technique.


3DES is as old as Blowfish however it is a result of Federal organization which is the fundamental distinction between these techniques. Blowfish is additionally speedier than 3DES. It is likewise utilized by OpenVPN.


AES-128 is far more secure than Blowfish and its better execution improves it a possibility for OpenVPN convention. It is for the most part prevalent in light of similarity.


IPSec gives end to end encryption between the sender and collector. IPSec is predominantly utilized for L2PT associations and as the name recommends, it encodes information on IP bundle level.


MPPE alludes to Microsoft Point to Point Encryption; it is basically utilized as a part of dial-up associations and PPTP associations. MPPE offers interface encryption amongst sending and accepting switches.


Camellia is utilized with 128-piece information obstructs with 128, 192 and 256-piece keys. It is created by NTT and Mitsubishi. It is very like Blowfish in term of execution. Camellia is utilized by OpenVPN.


AES-256 is principally utilized by OpenVPN, SSTP and IKEv2 VPN convention. It is a standout amongst the most secured encryption measures and US government utilizes this encryption for abnormal state correspondences.

For what reason do we require encryption?

Encryption is imperative since it enables us to secure our information, data and even web activity so no other gathering can get to its substance. Associations and organizations everywhere throughout the globe utilize encryption to ensure their privileged insights and characterized data. Then again, people utilize encryption to secure their character to avert data fraud, extortion and other digital wrongdoings. Encryption executed by VPN ensures you stay unknown on the web and nobody could see your web exercises and also your genuine character.

Watch this Ted Talk’s on Encryption:


Encrypt your entire Internet connection with ItusVPN within minutes!

Sweden and Internet Privacy / Freedom

So why does Sweden lead the pack in terms of Internet privacy and freedom?

There are no government restrictions on access to the Internet or credible reports that the government monitors e-mail or Internet chat rooms without appropriate legal authority. Individuals and groups engage in expression of views via the Internet, including by e-mail.


In the wake of the implementation of IPRED, the Swedish government additionally passed a legislative package that may grant the National Defense Radio institution (Försvarets Radio Anstalt – FRA) intensive police work power over online activities, in a trial to combat ‘external threats’6. In effect, the laws invest the national defense administrative unit with the authority and skill to watch all cross-border cable-based communication (phone-calls, e-mails and alternative net traffic, etc.) while not a warrant – together with the traffic’s content – way surpassing the scope of police work allowed at intervals the EU5. NGOs, like the Swedish Justice Centre and therefore the Norwegian division of the ICJ, have so argued that the law violates Article eight and Article thirteen of the eu Convention on Human Rights, likewise as article twelve of the Universal Declaration on Human Rights, that guarantee voters the correct to privacy and their ability to carry authorities in command of potential human rights violations. (Landes, 2009)

Similarly, a centralized block-list has been the article of disceptation. The list is issued by the authorities and later on enforced by ISPs by suggests that of an automatic DNS-filter, specifically with the intent to dam access to sites hosting pornography. Critics, like net research worker Marcin Diamond State Kaminski from the social science of Law department at city University, but kvetch that maintenance of the list isn’t in the least clear which there’s no third-party management of the lists content. Neither is there some way to de jure attractiveness a listing entry. (Geens, 2012) Amongst alternative things this implies that the choice of web sites listed is also capricious in some instances which while not more checks and balances the list could become a political play-ball. above all if an identical system would be emulated in countries with the next extent of corruption and fewer trust in state authorities than in Sweden, wherever corruption levels area unit negligible and trust within the police is comparatively high.


The problem of transparency equally extends to the arena. Whereas Sweden was one among the primary countries to supply e-government services like online tax-forms, likewise as e-identification and numerous alternative e-services, government itself has not been in the least as desperate to create public knowledge sets on the market. this can be notably attention-grabbing against the background of the alleged ‘Principle of Publicity’, AN integral a part of the Swedish constitution passed in 1766, that decrees that the final public, likewise because the mass media, ought to “be warranted AN unobstructed read of activities pursued by the govt. and native authorities”. consequently, Sweden is that the solely European country that doesn’t have a national open knowledge portal. within the list of ‘open government’ countries Sweden continues to be insulating material behind considerably[xxv].


Sweden is usually publicized as a task model for progressive political, regulation and net freedom. Governmental intervention and support for an early and swift development of an intensive and quick ICT infrastructure doubtless contributed to a solid basis for a spirited net culture – politically, socially and economically. However, as taking a better explore some debatable policy-decisions like the implementation of IPRED and therefore the passing of the FRA-law has shown, Sweden’s addressing regulation isn’t entirely simple, effort the country’s liberal image with a scratch. Likewise in matters of transparency there’s some catching-up to try to to for the Swedish government.

As Sweden definitely conjointly has AN influence on EU policy-making8, it’s necessary to contemplate in however way sure policy-decisions will solely add a specific Swedish context. continued on this thought consequently begs the question of however way policy choices continuously got to be thought of at intervals a specific constitutional context. because the example of the block list suggests, sure institutional settings likewise as trust publicly establishments and a culture of free expression area unit preconditions to stop the misuse of such policy implements for political, or alternative functions.

One of Sweden’s greatest assets, in the end, looks to be its spirited culture of dialogue} and debate concerning net policy and regulation – a culture that will to a vital extent have adult out of a robust opposition to what was perceived as dangerous political. because the country actively seeks to consolidate its role as a vital neutral and instigator in world net policy formulation processes, it’ll progressively got to mirror on however policy choices created reception probably reverberate within the international community.

Take a look at our VPN Services located in Sweden for the reasons stated above!