Does your code have vulnerabilities? FIND OUT!! Snyk your code: https://ntck.co/3yibeFN
💡💡Commands + Walkthrough: https://ntck.co/291 💡💡
🥧Buy a Raspberry Pi: https://geni.us/aBeqAL
🔥🔥Become a NOOB!! (join the noob army): https://ntck.co/Premium 🔥🔥
In this video, NetworkChuck shows you how to become a Mysterium Network node runner using a Raspberry Pi and some spare internet bandwidth. You will learn how to set it up on your own Raspberry Pi and how to start earning Mysterium’s Cryptocurrency MYST token while you sleep.
**Sponsored by Snyk
FOLLOW ME EVERYWHERE
Join the Discord server: http://bit.ly/nc-discord
0:00 ⏩ Intro
1:04 ⏩ What do you need?
2:08 ⏩ What the junk is Mysterium?
13:48 ⏩ STEP 1 – Bake your Pi (Raspberry Pi setup)
17:34 ⏩ STEP 2 – Setting up your MYST account and installing Mysterium
23:00 ⏩ STEP 3 – Setting up your node runner
27:59 ⏩ Outro
I found the best way to mine cryptocurrency and all you’ll need is a raspberry pie and extra internet bandwidth. The stuff you’re not even using the stuff you don’t care about. Now, this is not financial advice, but this is a profitable way to mine cryptocurrency on a raspberry pie. It sounds awesome. Right? So in this video, I’m gonna show you the Mysterium network, a decentralized BP and some, which yeah, sounds cool enough by itself. But when you and your raspberry pie participate in this decentralized VPN, you can earn crypto currency. So if you love raspberry pies and the idea of mining some cryptocurrency, this is pretty cool. You should do this right now. I’ll walk you through every step from setting up our raspberry pie, to getting the raspberry pie set up on the mysterious network as a node runner, a lot of stuff, but I’ll walk you through is very quick and very fun.
Oh, and also if you don’t have a raspberry pie, no sweat. You can do this on anything. A windows, computer, a Lennox, VM, a Docker container anywhere. So
It could be a Docker container. It could even be your computer. The one you’re watching this video on right. A windows PC or a, a Mac Lenox of course. And of course any Lenox based machine in the cloud. Now this should go without saying, but you’ll also need some spare internet bandwidth. So for example, if your internet is already just dying right now, playing this video, then you probably shouldn’t share your bandwidth cuz you don’t have anything to share. But if you’re like me, you’ve got a gigabit connection or two 50 or 500 or whatever then yeah, you got some spare stuff to use. And finally like everything in technology, including blockchain and crypto, you’re gonna need some coffee, especially this kind of stuff. You need coffee network, check.coffee. Now, before you can start mining with your extra internet bandwidth, it’s probably a good idea to figure out how that’s actually going to work.
Like what is this mysterious thing? And kind of sounds mysterious. It’s in the name.
Not being able to see what I’m doing either because they would love to know what I’m doing and then sell to somebody. But we don’t wanna do that. Right? You wanna keep it hidden, stay anonymous. Now this right here is great and you should definitely use a VPN, but it’s not all rosy. There are a few flaws with this. One of the main glaring ones is that it’s not decentralized. It’s centralized. Which what does that mean? It means that this VPN provider is one company. We’ll call it one company. And this one company has control of all the servers they offer to you. They have control of this server. I’m connecting to which means if you think first they know who I am because it had to get an account and it had to pay for it. So they have my banking information. They know what I’m visiting my internet logs.
And yes, many providers will say they do not keep track of logs. And we have a good reason to trust them for that. But you never know. In theory, all of my logs, all of the, the list of things I’m visiting are in one central location. And if the government wanted to find out what I’m doing, they could bust down a door and get the information. And this is where decentralized VPN shines. It’s actually pretty cool. Check this up with decentralized VPN like Mysterium. There are no centralized servers to connect to. They don’t have any. Instead we’re connecting to Deb and her computer and her house and Boston. You see Deb here has a raspberry pie in her house operating as a Mysterium node runner. So when I connect to my VPN using Mysterium, I’m actually connecting to you the raspberry pie inside her house.
And now, and this is really strange. I, I get it. It really is. Now when I visit places on the internet like YouTube or Twitter, they think I am Deb. They see Deb’s IP address instead of mine, or maybe I connect to Bernard hack. Well over here in London, cuz I wanna watch some shows that aren’t available to me in the us. So using mysterious, I could connect to Bernard hack Wells rasp high over here in London and suddenly I’m using his IP address and YouTube, Netflix and all the websites think that I am him hiding my identity and giving me access to things that maybe I couldn’t access cuz a geoblock content. Now at first glance, this sounds like normal centralized VPN, right? Because every other VPN provider has an option to select country and unlocked. Geo lock thinks you can go to Frances.
You can go to England, Russia, wherever. But the difference here is that these servers are owned by one person. They’re owned by a bunch of people. You see if this were centralized, Mysterium would have all the servers they’d have control of every server. They would have control of all the logs and, and know where you’re going all the time, both decentralized VP in, they don’t have that. Which means that if the government or some other company or whatever wants to come at Mysterium and say, Hey, we wanna see what network Chuck’s been doing. We think he’s been buying some illegal coffee. We wanna find out what he’s been doing, but Mysterium can’t give him anything cause they don’t. They don’t have it. I haven’t been connecting to Mysterium servers. I’ve been connecting to Debs and Bernard Awell servers. Now this is cool for a few other reasons too.
I ran this when I was on my road trip and I was using one of those normal centralized VPN providers. I would connect to their server and they have a list of IP addresses that they use that are pretty well known. So one company, that’s the name of our fictional VPN company. They have a list of IPS. And when I connect to them, I will end up using one of those IPS. And what I ran into is when I was trying to watch HBO, max, get my Harry Potter on. I was being blocked. HBO was like, Hey, you can’t use that. We block access to our site from known VPN provider, uh, IP addresses, both decentralized VPN HBO, max. Can’t do a dang thing about that because when we’re using mysterion VPN, we’re not connecting to one provider with a list of no one IP addresses.
We’re connecting to Deb’s house. We’re connecting to Bernard hack wall’s house. And those are residential IP addresses. They’re not on any list. I don’t think they are. And from HBO’s perspective or whatever I connect to is perspective. I’m just Deb, regular old person with my residential IP address, my regular internet connection accessing their services. So what this unlocks is true. Geo unblocking, all these streaming providers or any other provider, can’t just start blocking residential IP addresses. So this unlocks something pretty cool. That’s one thing I love about decentralization, whether it’s with finance and currency or the internet, people can’t control it. They can’t control what we have access to. And that’s the freedom that this kind of stuff opens up. And they’ll one more cool thing about this. As far as using it, before I start talking about becoming a node runner and that’s, it’s pretty dang anonymous.
Can I spell anonymous on my first try anonymous? I think I did.
It’s using wire guard and open VPN to encrypt my stuff and then to make it truly anonymous. The way you pay for it is with crypto cryptocurrency and it’s pay as you go. You only pay for what you use and it’s wicked cheap. It’s like 0.0, zero five. Missed tokens. Talk about that here in a bit per hour and 0.0 9, 1 3 missed per gigabyte. And right now missed token is equal to 50 cents. U S D so wa a sheet. So now let’s talk about becoming a node runner. Now this question may have popped up into your head. If you’re paying to use this VPN service, who’s the money going to cause you’re not using the central lies servers of the VPN provider. You’re using someone else’s server. That’s where becoming a node runner is pretty stinking cool. Most of what you’re paying to use that VPN is going straight into Deb’s pocket, going straight into Bernard hacker’s pocket.
They’re letting you use their extra bandwidth and their IP dress and you’re paying them some missed tokens, effectively mining cryptocurrency with your extra bandwidth. So let’s focus on that. Why should you become a node runner? What are the benefits in the downsides? Cuz there, there are some things you have to consider. So the obvious no brainer reason why you should do this is because you can make some extra money. What stuff you’re not even using anyway. Now how much money you can make. It depends like everything in life, but here’s their leaderboard. And here’s what the top earners made based on what country they’re in. And again, this is from doing nothing, but just letting someone else use your internet. Another cool thing is that while you are mining crypto and that’s normally seen as a thing like killing the planet, you’re using a to of, of electricity and you’re killing everything.
This is actually saving the planet in a way you’re sharing what you are not using and you already have it. And in the process you’re fighting censorship. You’re helping people all over the world, get access to information that should be freely available to them. And it’s my opinion that an internet that is more open and sensor free is a better internet. So you’re helping create a or internet. Now I know it sounds kind of corny, but it is kind of what you’re doing. Now. I could talk about the benefits of this and how cool it is all day, but let’s focus on some realities here. Some of the maybe downsides and things you have to know about when you take the steps into doing this first, you may not be allowed to do this. Your is P or your internet service provider may not like you doing this.
You’re essentially rating a VPN in service inside of your house. And some ISPs have a problem with that. So what do you do? You gotta be careful. Maybe find out if your ISP cares or not send a letter, email chat message. Myster does have some information below on how you can find out if your ISP cares and if they do, I don’t know what it’ll happen. If it’s a slap on the wrist or they cancel your service. I don’t know. So I can’t give you that advice. All I can say is be careful. And then speaking of being careful,
But when they go out to you, weird stuff, dot com, they see your IP address as the one accessing it. So that can be a cause for concern. But thankfully there are mitigations put into place to help you with that. First Mysterium does have a white list of things that are allowed and black list of things that aren’t allowed on their network. So they do keep a lot of the weird stuff out and also coming down the pipe pretty soon for Mysterium, they’ll implement a thing called network slicing, where you can choose exactly what kind of network traffic you want coming across your internet, whether you only want social media stuff coming across only streaming stuff. You can choose that, but that’s T B D. Now beyond these risks, it’s pretty much only upsides, just a cool thing to get involved with. And you can make some money.
You can actually have profitable mining on your, a raspberry pie, which is a really cool thing to think about. But I want to tell you don’t get too crazy because as it stands now and probably won’t change, you can only have one Myster note runner per public IP address, which means if you’re thinking, oh, I’m gonna load up 50 raspberry pies in my house. I’m gonna mine and become a millionaire. Sorry.
It’s a very cool thing. And it’s a lot more than VPN actually. They’re enabling a lot more with what they call the open network protocol, I think, right? Yeah, I think so. And the VPN portion is just one of their DS or decentralized apps. That’s a crypto thing. So now
Now, you know, what’s scary about that. Code can be hacked. I mean, you know that, right? We talk about it here on the channel all the time. We do some hacking stuff and there are a ton of vulnerabilities out there, SQL injections, remote code executions, all kinds of stuff. And while they’re fun to hack ethically, of course, they’re not fun to have inside your own code inside your own. That’s where a company like sneak comes in. They’re kind of like Grammarly for your code, which is kind of cool. Sneak will auto magically scan your code dependencies containers, configs, and we’ll find and fixed vulnerabilities in real time. Let me show you how easy it is. I got a link below sneak.com/network check, check it out here. I’m gonna have sneak check on at hack Well’s code super easy to sign up. I’m gonna click on, sign up with GitHub.
And once I’ve connected, sneak to my GitHub, I can start the process. I’ll have it scan some of my repos here, important scan and dang with the moments. Look at this. I found a ton of stuff, but thankfully stuff that sneak can fix right away for either my Docker container or my code. All I’ll have to do is click on fixed vulnerabilities. Just one little click. It will automatically open up a fixed pull request, telling me all the issues is gonna fix a lot. Look at all the stuff. And then all I have to do is click on open a fix PR. And if you’re wondering what a pull request is, we’re actually gonna do that here in this video later. So buckle your seatbelts and bam, just like that. Sneak has a fix for 69 vulnerabilities. And all I have to do is merge this pull request with my code.
Now it doesn’t all this right from your existing tools, workflows, IDE CLI repo pipelines, Docker hub, everywhere. You can do it everywhere and it’s free.
I love it because you can get it on Mac Linux and of course windows everywhere. Love it. And by the way, if you already have raspberry pie OS on your raspberry pie, then you can skip ahead. If not, let’s keep going. Now first we’ll choose our OS or our operating system. Go ahead and click on that. And from here, we’re gonna go raspberry pie OS other, and we’ll pick the raspberry pie OS light 32 bit. Now keep in mind. OS is a light version, which means it only has command line, no gooey, which is fine for our purposes in this video. If you care about a gooey, then select something else like the full version, and then we’ll choose our storage. I’m gonna click on that and find my SD card. There he is right there. Then hold on before you click right, we gotta do one more thing.
Our super secret menu get ready, hit the keys. Control shift X woo super secret menu. What we’re doing here is setting up a headless mode for our raspberry pie. It’s got no head. What, what I mean is that we don’t need a, uh, computer monitor. We don’t need a, a comp uh, I can’t even think right now, a, uh, keyboard, a mouse to do things on this. Like you normally would check this out. I’ll walk you through it. First. You’re going to enable SSH so we can remotely access this. And then we’ll set a password for our default user pie, go and set mine. And then a very crucial part. If you’re gonna be using wifi, we can go ahead right now and configure wifi for our raspberry pie. I’m gonna plug in my S I D and password. Lemme go find this and then that’s pretty much it.
I’m gonna click on save. And now, now we’re ready to write. So go ahead and click right. Say yes. And just a slight little small, whoa, what’s going on. Okay. It’s okay. Everything’s okay guys. Coffee break time. Whew. Calm down. Okay. Mine is done. I’m gonna go grab my SD card real quick. I’ll be right back. Cool. Hot. I’m just kidding. It’s not hot, but as finished baking, if I can catch it. So we’re gonna take the SD card out and slide that sucker back into my raspberry pie. Write his little back pocket here. There we go. And then now all I have to do is plug in his power. Let that guy power up. Now with our headless install, what will happen is he’ll power up and two things will already be happening. He’ll have SSH I access, which means we can access him remotely.
I’ll show you how to do that here in a moment. And he’ll automatically connect to your wifi and get an IP address. It’s it’s amazing. I love this. Now the only kicker is that you have to know what the IP address is when he gets it. And for most home networks, the router is gonna give him a random IP address and it’s our job to now go find that. Luckily it’s not too crazy. All I have to do is log into your router and it’ll tell S so now for me, I’m using ubiquity or unify. So I’m gonna log into my router and show you what mine looks like. Now. I can’t show you what yours looks like, because there’s a lot of routers out there. I don’t know what you have, but what we’re aiming for is the clients or the host in your network.
Most routers will give you a list of that and look at the latest one. The last one that grab an IP address. And there’s my guy right there. Now I have a lot of stuff go, went on in my network. So don’t pay attention to that. But there he is. This is IP address, ten seven one one eighty two. Yours will probably be different to just find out what that is. And once you have your IP address, we can launch our terminal or CMD in windows. That’ll be terminal on Mac and Linux, and we can magically access him remotely. Check this out. The command will be, and this is across the board, all the same SSH space pie, which is our user at the IP address of your raspberry pie. Ten seven one, one eighty two is mine. And let’s do it fingerprints. Yes, I wanna accept it. And then the password we just set for our pie user, eh?
Oh, you are in. Okay, cool. Now I know you’re like here, the command line. You wanna keep going, but we’re gonna step away at your for just one second. I know. I know. It’s okay. First we have to set up an account with mist or missed nodes.com. So go ahead and fire up your favorite web browser from bring a window over here and navigate out to mist nodes, ah, dot com. And first of all, if I haven’t already sold you on this, then earn while you sleep. Come on. That’s a great tagline anyways.
And it should take you to a well started page. And here I told you we have some options. You can pretty much put Mysterium on anything, but what we care about right now is our raspberry pie. So I’ll go ahead and select that guy right here, again with the options. I know
Super cool. Now over here on the right is pretty much the steps we’re going to follow, but not exactly cuz they did forget. One thing that I hit and it was super annoying. So just hang tight. Good news is, and we’ve already done. Step one and step two, bam. Knock that sucker around step three is where it gets a bit tricky, but don’t worry. We’ll walk through it together. So real quick with me right now, we’re gonna grab all of these commands here. Just go ahead and grab it, highlight it, copy it. Open up your terminal. And then just paste that in there. Right here and hit enter. Now it might sound like I lied. Cuz like there’s no air. It looks good. Like we’re fine, Chuck. I’m fine. Hold on a second. Let’s go back to our term or back to the uh, instructions here.
We knocked out step three, but now step four is where things get a little hairy. We’re gonna run this command here. Pseudo a P T update. Let’s try it out. Pseudo a PT update. Now what we’ll do just in case, you’re wondering actually first, what do we do up here? Up here. We added a new repository to our list of repositories. What’s a repository. It’s a list of stuff we’re allowed to install or we can install to be able to install mist. We have to have this repository here. So with that command, we added it now with the pseudo a B T update command. We’re gonna go, whoa. Hey new repository. Can I give a list of everything you have? So we’re gonna do that right now. Go hit, enter and get ready for some pain. This’s gonna give you an error. I know what’s coming cuz it seems like everything’s going well, but it’s not.
Ah, there it is. I hope because I warranty it. Wasn’t so bad, but check it out. The big scary error we have right now is the following signatures could not be verified because the public is not available. Blah, blah, blah. Basically we added that new repository and the raspberry pie is like, Hey, I don’t trust that guy. I don’t know him. I couldn’t verify who he is. What we have to do is tell the raspberry pie. Hey, Hey it’s okay. I know this guy. He’s fine. Here’s his public key. Let’s add that real quick. One simple actually two simple commands. It’s not that scary trust. So here we go. Here’s the first command going copy and paste from below piece. Another right there. Now what’s happening here is we’re downloading the public key for this guy right here. Notice how we’re referencing him down here in this command.
Let’s go ahead and enter to download that. Got it. And one more thing we have to do. We’ll get a copy and paste. The second command paste that in here, this will actually add that key to our list and we should be good. That was pretty harmless. Pretty painless right now. Now we could do pseudo a PT update once more and fingers crossed. Hold my coffee, take a sip. We’ll be fine. Oh no errors. I love that. Okay, now we’re good to go. Now looking back at our miss sucker here with just one, one more command. We can finish this out. Pseudo a PT install, mist. Let’s go ahead and type it in together. Ready? Pseudo a PT. Ah, not pat.
Yeah, here we go. Hit enter. Oh, here we go. Now hang tight here for a second. I’m gonna go ahead and drink some coffee while it’s doing this. It’s gonna prompt you with one more thing. Mm ah, see, I told you go ahead and hit tab and enter for the okay. Except everything. All terms and conditions blindly like always. Yes. And then we’re solid. It’s installing. All we have to do now is just wait for it. So, um, I’m actually gonna go eat some more coffee. I’ll be right it back. I’ll see you here in a bit. Oh, ah, just burn my tongue. Ah, too hot anyways. Oh it finished. Awesome. So if you see that sucker successfully finished right there, then you’re good. God, I can’t my tongue, my taste buds are gone.
This may work for you from here. We can click on claim node and it may just find it for you once you’ve you’ve completed all the steps. So click on claim node and it’s gonna search you as long as the computer you’re using and your raspberry PI are the same network, the same subnet. It should find you and automatically go, boom, let’s set you up now for me. I’m getting impatient. I don’t wanna wait. I’m gonna click on claim node manually. And this actually gives us a chance to access our raspberry pie directly. Cuz he does have a gooey or a web gooey. We can access. Check this up. I’ll open up a new tab. Come on. There we go and navigate out to 10, 7 1 1 8 2, the IP address of my raspberry pie. And then I’ll do colon 4, 4, 9 or port or four nine. Here we go.
Ah, yes, almost there I think. Oh heck yeah. My little node runner. He’s ready to go. Let’s go ahead and click on start node set. And the first thing we get hit with is this a default withdrawal address? Withdrawal. That’s a hard way to say
Ah, but spell it right? I’m gonna click on that first link. I see. Cuz that’s the one I wanted to go to made a mask.io and then I’ll click on download now and what’s cool is this won’t be a download. It’ll be an extension in your browser. So if you’re using Chrome brave and I even believe, uh, Firefox. Yeah. All three of the main ones we use. It’ll have a plugin now I’m actually in brave right now, but I’ll click on installing and ask for Chrome and it should work. I think. Yeah, oddly enough. I’ll click on, add to brave at the top here and it’s gonna do its thing. Actually. Hold on, add extension. There we go. And it’s been added now let’s go ahead and click on that icon here at the top, right? Or our puzzle piece and open up, made a mask.
We’ll go through a quick, get started thing here, create a new wallet. I agree to everything. Blindly put a password in. I agree to all things blindly. Once more click next. Remind me later. And finally right here where you see account one is our Ethereum wallet. You can just click it and it’ll automatically copy to your clipboard. And if we get back to our Mysterium note runner setup, I’ll just paste that sucker in there. Ha ha. That’s it. Did I make the 20 seconds? I don’t know. I don’t know how that works. Anyways. Click on next. Now here’s where it gets a bit hairy. If you’re doing this early in the day, you might have this option not great out, totally available to you. You can register for free and don’t have to worry about a thing, but if you’re like me and you don’t have this option right now, that means they cat the number of freely available accounts for that day.
So now here’s your option here. You can either wait until tomorrow and see, you can get that free registration, which is not a big deal. I’m doing this around 3:48 PM. So I imagine if you wake up in the morning, you should have an option to, if not, you can do one of two things, either deposit this token, which is extremely difficult.
It’s not Ben. It’s not Angela it’s it’s blah, blah, blah.
Let me show you, uh, a full list. Give you a full scope of what’s going on of you all sessions and go are here. Yeah. Look at all this India, Morocco, Egypt, Saudi Arabia. That’s so cool. Iran, Algeria, Philippines, and yeah, that’s pretty much it. That’s the setup it’s done. And of course you can look at all these nodes in your dashboard. Now I have a lot going on here cause I’ve been experimenting with the cloud. Um, but you can add a bunch more
The, that is on the blockchain. If I go to ether scan, which is how you can look at, uh, all kinds of stuff on the, uh, theory of network. If I search for that, there it is. That’s my identity on the blockchain. I’m not Chuck at network, chuck.com. I’m not network Chuck or Chuck Keith or whatever. I’m an address on the blockchain. I’m anonymous. Anyways. I think this is really cool. Just the technology behind it, decentralized VPN and the fact that it’s using blockchain and you can share your bandwidth and earn cryptocurrency. That’s pretty cool. Now again, I don’t know if this is gonna go anywhere as far as like actual earning potential. This is not financial advice. I think it’s the, the tech is just cool. I wanted to try this out just cuz the tech is awesome. Anyways, let me know what you think in the comments below.
Do you think this is a neat idea? Do you think blockchain is the future? Are you gonna try out Mysterium VPN in and see how it is now on this video I showed you how to set up as a node runner. If you wanna set up mysterious VPN as a client, if you wanna access it and use it, I will include that in my bonus content. Uh, check out my free membership on network, chuck.com and you’ll be able to access it there again. It’s a free membership and I would’ve put it here, but I think the video already is out outrageously long. Cause I did not realize how much I had to explain in this. Oh boy, it’s late already. I had so much coffee and it’s late and go eat dinner.