NiceHash Miner Software enables integration of third party mining software to enable more efficient mining operations for users of the NiceHash platform. NiceHash is taking measures to establish higher security levels of the NiceHash Services, including NiceHash Services and Platform, NiceHash Miner Software and integrated Third Party Miner Software. One of the important security measures is preventing unauthorized/malicious changes of the mining software distributed to users by providing a verifiable digital signature of executable code. NiceHash is already digitally signing all of its software using Code Signing Certificate.
Taking the steps below is required in order to make a Third Party Miner Software available for use through the integration in the NiceHash Miner Software.
Authors of the Third Party Miner Software or their representative should do one of the following in order to help a Third Party Miner Software integration to the NiceHash Miner Software:
Sign the third party mining software with the according Code Signing Certificate issued by one of globally acknowledged certificate authorities.
OR
Follow the 3-step identification procedure to identify yourself as the third party mining software.
Step 1: Notification via e-mail to legal@nicehash.com
The email should contain:
name of the software and details or link to description;
official contact channel information;
name of author along with a copy of a valid identification document, such as ID card or passport;
Mining software download link or official distribution channel.
Step 2: Live chat with a NiceHash team member upon receiving an invitation.
Step 3: Exchange of public keys that will be used for a secure communication and verification of digital signatures of Third Party Miner Software hashes.
Please note that NiceHash reserves full discretion in supporting integration of any third party mining software. NiceHash is also not liable, to the maximum extent permitted by applicable law, for any damages of any kind, including, but not limited to, direct, consequential, incidental, special or indirect damages, arising out of usage of Third Party Miner Software.