Why Our Bounty System Pays You More for Using a PowerBook G4

Published: (February 24, 2026 at 10:14 PM EST)
8 min read
Source: Dev.to

Source: Dev.to

RustChain Bounty System Overview

Most bug‑bounty programs work like this:

  1. Find a vulnerability.
  2. Write a report.
  3. Wait ~3 months, argue about severity, and maybe get paid in fiat after signing an NDA.

The payout has no connection to the infrastructure you used to find the bug.
A researcher running Burp Suite on a $3,000 MacBook Pro gets the same reward as someone who reverse‑engineered the protocol on a 2002 PowerBook G4.

How RustChain differs

  • Bounties are GitHub issues denominated in RTC tokens.
  • Researchers are paid from a transparent community fund with a capped budget.
  • Mining on vintage hardware earns more – a PowerBook G4 earns 2.5× what a modern laptop earns.
  • No portal, no sign‑up, no intermediary taking a cut.

This is not a metaphor. We literally pay more for older computers.

How to Claim a Bounty

StepAction
1Open a GitHub issue in Scottcjn/rustchain-bounties.
2Read the scope (title = target, body = reward in RTC).
3Do the work.
4Submit a PR or write‑up.
5Receive RTC tokens in your miner wallet.

Reference rate: 1 RTC = $0.10 USD.
A 200 RTC bounty equals $20 – modest by HackerOne standards, but designed for independent researchers rather than corporate red teams. Tokens can appreciate as the network grows.

Current Active Bounties

BountyTargetRewardDifficulty
Ledger IntegrityForge or tamper with transaction history200 RTCHard
Consensus AttacksBreak RIP‑200 round‑robin, forge attestations200 RTCHard
Epoch SettlementManipulate reward calculation or distribution150 RTCMedium
Pending TransfersExploit the pending transfer queue150 RTCMedium
API AuthBypass admin authentication or escalate privileges100 RTCMedium
Ergo AnchorForge or replay Ergo blockchain anchors100 RTCMedium

Total: 6 active bounties900 RTC (≈ $90 at the reference rate).

These are real, scoped attack surfaces derived from a security audit.

Case Study: BuilderFred (Feb 2026)

A researcher named BuilderFred performed a comprehensive audit of the RustChain node, discovered 6 valid vulnerabilities, and was paid 150 RTC (the first bounty payout on the network).

Findings

  1. VM Fingerprint Bypass – Server trusted self‑reported "passed": true for hardware checks.
    Fix: Server now requires raw evidence data and validates it independently.

  2. Antiquity Spoofing – Modern CPUs could claim to be a G4 PowerBook and get the 2.5× multiplier.
    Fix: Cross‑validate SIMD feature sets; real G4s report AltiVec capabilities that x86 CPUs cannot produce.

  3. Mock Signature Mode – Testnet flags TESTNET_ALLOW_MOCK_SIG and TESTNET_ALLOW_INLINE_PUBKEY were still enabled, allowing forged signatures.
    Fix: Both flags disabled in production.

  4. Inline PubKey Hijack – With inline pubkeys enabled, an attacker could bind any wallet address without proving key ownership.
    Fix: Disabled.

  5. SQL Schema Mismatch – Inconsistent field naming (model, arch vs. device_model, device_arch) caused all x86 miners to hash to the same hardware ID.
    Fix: Accept both naming conventions and include MAC addresses in the hardware hash.

  6. Hardware Binding Bypass – Without MAC addresses in the hardware‑ID computation, different machines with the same CPU model produced identical IDs.
    Fix: Include IP and MAC addresses in the SHA‑256 hardware hash.

The payout demonstrated that the audit process works and that independent researchers can be paid without bureaucracy.

Proof‑of‑Antiquity Mining & VM Resistance

Bounties are funded by Proof‑of‑Antiquity mining, which uses hardware fingerprinting to ensure one real CPU = one vote. Mining rewards cannot be gamed by VM farms.

Required Checks (all must pass for a miner to earn rewards)

CheckWhat It MeasuresWhy VMs Fail
Clock‑Skew & Oscillator DriftCrystal oscillator imperfections (500‑5000 samples)VMs use host clock, no real oscillator
Cache Timing FingerprintL1/L2/L3 latency harmonics across buffer sizesHypervisor virtualizes cache → too uniform
SIMD Unit IdentityAltiVec/SSE/AVX pipeline timing asymmetryEmulators flatten all instructions to same latency
Thermal Drift EntropyHeat curve samples across cold/warm/saturated/relaxedVirtual CPUs have no thermal physics
Instruction Path JitterCycle‑level jitter across integer, branch, FPU, load/storeHypervisor interrupt injection creates periodic artifacts
Anti‑Emulation DetectionDMI vendor strings, hypervisor CPU flag, virtual SCSIQEMU/VMware/VirtualBox leave filesystem traces

A detected VM receives a weight of 0.000000001× (one‑billionth) of a real CPU – effectively zero for rewards, though still logged for monitoring.

Server‑Side Validation Example

def validate_fingerprint_data(fingerprint: dict) -> tuple:
    """Server‑side validation – requires raw evidence, not self‑reports."""
    if not fingerprint:
        return False, "no_fingerprint_data"

    checks = fingerprint.get("checks", {})

    # Anti‑emulation: reject if VM indicators present
    anti_emu = checks.get("anti_emulation", {})
    if anti_emu.get("passed") == False:
        return False, f"vm_detected:{anti_emu.get('data', {}).get('vm_indicators', [])}"

    # Clock drift: real hardware has measurable variance
    clock = checks.get("clock_drift", {})
    cv = clock.get("data", {}).get("cv", 0)
    if cv < 0.0001:
        return False, "timing_too_uniform"

    return True, "valid"

After BuilderFred’s audit, the critical change was that the server no longer trusts self‑reported data; it now validates raw fingerprint evidence.

RustChain Mining Rewards

The rewards are weighted by hardware age:

ArchitectureBase MultiplierExample Hardware
PowerPC G42.5×PowerBook G4 (2002), Power Mac G4 MDD
PowerPC G52.0×Power Mac G5 Dual (2005)
IBM POWER82.0×Power System S824 (2014)
Retro x861.4×Pentium 4, Core 2 Duo
Apple Silicon1.2×Mac Mini M2
Modern x86‑641.0×Ryzen, Intel 12th + gen

The multiplier decays over time:

aged = 1.0 + (base - 1.0) * (1 - 0.15 * chain_age_years)

After ~16.67 years all architectures converge to 1.0×. The bonus rewards the act of keeping old hardware alive, not a permanent advantage.

Why It Matters for Bounties

The community fund that pays bounties comes from the same token supply that rewards miners. The economics are circular:

  • Miners earn RTC.
  • The community fund holds RTC.
  • Researchers earn RTC from bounties.
  • Researchers can mine more RTC on the same hardware they used for research.

A security researcher with a PowerBook G4 is simultaneously mining at 2.5× and hunting for vulnerabilities.

Token Supply & Economics

ParameterValue
Total Supply8,388,608 RTC (2²³)
Premine6 % (founder allocations)
Mineable94 %
Community Fund~96,673 RTC
Epoch Reward1.5 RTC per 10‑minute epoch
Reference Rate1 RTC = $0.10 USD

No ICO. No presale. No token generation event.
The community fund was allocated at genesis and is drawn down through bounties and development grants. When a 200 RTC bounty is paid, it comes directly from the fund – visible on‑chain and auditable by anyone.

The total supply is a power of two because binary precision matters when the ledger uses integer arithmetic (amount_i64) to avoid floating‑point rounding errors. Every fraction of an RTC is accounted for exactly.

Getting Started as a Miner

# Install the miner CLI
pip install clawrtc

# Create a wallet
clawrtc wallet create

# Start mining (your hardware gets fingerprinted and earns accordingly)
clawrtc mine

# Check your balance
clawrtc wallet show

If your machine passes all 6 fingerprint checks, it earns RTC every epoch:

  • Modern x86 laptop → 1.0×
  • PowerBook G4 → 2.5×

Dust off whatever vintage hardware you have – it’s worth more on this network than on eBay.

As a Security Researcher

  1. Browse open bounties: Scottcjn/rustchain-bounties

  2. Read the scope and reward for each issue.

  3. Test against the live network:

    curl -sk https://rustchain.org/health
  4. Submit findings as a GitHub issue or PR.

  5. Get paid in RTC to your miner wallet.

As a Builder

The community fund also supports development grants beyond security bounties. If you’re building tooling, integrations, or documentation for the ecosystem:

  1. Open an issue describing the work and proposed RTC amount.
  2. Work with the fund managers to receive a grant.
  • I Built a Video Platform Where AI Agents Are the Creators
  • The Agent Internet Has 54,000+ Users
  • Proof of Antiquity: A Blockchain That Rewards Vintage Hardware
  • Your AI Agent Can’t Talk to Other Agents. Beacon Fixes That.
  • How We Made “One CPU, One Vote” Actually Work
  • I Run LLMs on a 768 GB IBM POWER8 Server

Built by Elyan Labs in Louisiana. The vintage machines mine. The researchers break things. And a PowerBook G4 from 2002 earns more than a Ryzen 9 from 2025.

0 views
Back to Blog

Related posts

Read more »

[Boost]

Profile !Vincent A. Cicirellohttps://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaw...