{"id":372,"date":"2026-03-03T00:55:18","date_gmt":"2026-03-03T00:55:18","guid":{"rendered":"https:\/\/blog.vipor.net\/?p=372"},"modified":"2026-03-04T17:42:39","modified_gmt":"2026-03-04T17:42:39","slug":"initverse-ini-backdoors-blacklists-stolen-pow-pool-lockout-centralized-mining","status":"publish","type":"post","link":"https:\/\/blog.vipor.net\/tr\/initverse-ini-backdoors-blacklists-stolen-pow-pool-lockout-centralized-mining\/","title":{"rendered":"InitVerse (INI): Backdoors, Blacklists, Stolen PoW &amp; Pool Lockout &#8211; Centralized Mining"},"content":{"rendered":"<figure class=\"wp-block-pullquote has-text-align-left\"><blockquote><p><em>We carried out this analysis using only publicly available node source code and on-chain data. Some of what we found is <strong>indisputable<\/strong> (e.g. code and chain state anyone can verify); other conclusions may be disputable but we believe they are well supported. We welcome anyone who wants to correct us or challenge our findings \u2014<\/em> please <a href=\"https:\/\/discord.gg\/WxJrvp9aN6\" data-type=\"link\" data-id=\"https:\/\/discord.gg\/WxJrvp9aN6\">join our discord<\/a> and reach out.<\/p><\/blockquote><\/figure>\n\n\n<div class=\"markdown-block\"><p>Like other pools such as <a href=\"https:\/\/x.com\/K1Pool\/status\/2003034217324642544\">K1Pool<\/a>, we\u2019re always on the lookout for new coins to support. We came across InitVerse (INI), were genuinely interested, and started digging \u2014 only to find the backdoors, blacklist, stolen algorithm, and centralized control we document below. We\u2019re publishing this so the community and exchanges can see what\u2019s in the code and on the chain.<\/p>\n\n<p>&#8212;<\/p>\n\n<h2>What Is InitVerse?<\/h2>\n\n<p>InitVerse claims to be a decentralized PoW blockchain using their &#8220;VersaHash&#8221; algorithm. They sell ASIC miners (Pinecone INIBOX, 850 MH\/s), cloud mining hashrate (inimining.cloud), and raised 500 BTC (~$50M) from investors. INI trades on MEXC and XT.COM at ~$0.12.<\/p>\n\n<p>What we found after analyzing their node source code, on-chain data, and miner binary tells a very different story.<\/p>\n\n<p><strong>For a recent video overview:<\/strong> <a href=\"https:\/\/www.youtube.com\/watch?v=Y4wZNe5yx_A\">Rabid Mining on YouTube<\/a> \u2014 InitVerse (INI) breakdown and Nexa2InitVerse (proof that INI uses NexaPoW and the pool blocks GPU miners).<\/p>\n\n<p>&#8212;<\/p>\n\n<h2>Finding 1: VersaHash Is NexaPoW (Rebranded)<\/h2>\n\n<p>Their &#8220;proprietary&#8221; VersaHash algorithm is cryptographically identical to NexaPoW \u2014 same double SHA-256, same Schnorr signature (secp256k1, RFC 6979), same <code>Schnorr+SHA256<\/code> tag, same final SHA-256. They took Nexa&#8217;s algorithm, renamed it, and called it their own. Independent proof: <a href=\"https:\/\/github.com\/Hazelmeow\/Nexa2InitVerse\">Nexa2InitVerse<\/a> mines INI using standard NexaPoW (Rigel) via an adapter that speaks YatesPool; the chain accepts the blocks, confirming algorithm identity. The privacy and homomorphic-computing features they market (e.g. data processing for hospitals or labs) are not present in the node code; the chain is a fork of Binance Smart Chain (itself a fork of Ethereum), with nothing meaningfully new on-chain.<\/p>\n\n<p>They have two whitepapers. The <a href=\"https:\/\/media.inichain.com\/docs\/InitVerse_Technical_White_Paper.pdf\">Technical White Paper<\/a> describes Proof of Resources (POR) with validators and an 86% \/ 10% \/ 4% block split, halving at 1 year then every 3 years \u2014 the live chain does not implement that. The one they link on their site, the <a href=\"https:\/\/resource.inichain.com\/whitepaper.pdf\">INIChain Whitepaper<\/a>, matches the current narrative: PoW, VersaHash, DDA, team &#8220;mining address&#8221; for &#8220;community building and airdrops,&#8221; weekly halving \u2014 same as the <a href=\"https:\/\/docs.inichain.com\/initverseinichain\/project-introduction\/tokenomics\/tokenomics\">tokenomics page<\/a>. So the &#8220;official&#8221; story is the INIChain whitepaper; the catch is that VersaHash in it is just NexaPoW (same algorithm, rebranded). The Technical White Paper&#8217;s POR design is unimplemented.<\/p>\n\n<p>&#8212;<\/p>\n\n<h2>Finding 2: YatesPool Is Effectively the Only Pool \u2014 and They Control Who Can Produce Blocks<\/h2>\n\n<p>InitVerse publicly says anyone can mine with GPUs and run nodes. In practice, they control who can produce blocks and have designed the pool protocol to block GPU miners.<\/p>\n\n<p><strong>Block producer whitelist.<\/strong> They maintain a whitelist of addresses that can produce blocks. As <a href=\"https:\/\/x.com\/K1Pool\/status\/2003034217324642544\">K1Pool have reported<\/a> ve <a href=\"https:\/\/github.com\/Hazelmeow\/Nexa2InitVerse\">Nexa2InitVerse<\/a> demonstrates: only official wallet addresses can serve as nodes, and even if someone finds a block, they can&#8217;t add it to the chain. So they define who can actually mine blocks \u2014 not just who can transact.<\/p>\n\n<p><strong>YatesPool<\/strong> is the only mining pool that works for INI. When a miner connects, the pool sends a Ping that only an inibox (their ASIC) can decode. If the miner fails to respond with the correct Pong, it is disconnected. This blocks anyone from submitting shares using standard NexaPoW miners or GPU software like Rigel \u2014 even though the underlying algorithm <em>is<\/em> NexaPoW.<\/p>\n\n<p>Independent researchers built <a href=\"https:\/\/github.com\/Hazelmeow\/Nexa2InitVerse\">Nexa2InitVerse<\/a> to prove the point: by connecting an inibox to the adapter, they can impersonate an inibox and mine INI using NexaPoW (Rigel) on the other side. The adapter decodes the Ping, responds with the correct Pong, and forwards shares. Without an inibox to spoof, GPU miners are locked out.<\/p>\n\n<p><strong>Reports from others state:<\/strong> Their official GPU mining software runs at roughly one-twentieth of normal speed to appear different from NexaPoW. On their pool, GPU hashrate is capped at 10 MH\/s display unless you buy an inibox. The inibox itself is very likely a modified Dragonball Nexa ASIC miner \u2014 same algorithm, locked to their pool. So: one pool (YatesPool), a whitelist of who can produce blocks, protocol-level blocking of GPU miners, and a strong incentive to buy their hardware.<\/p>\n\n<p>As of March 2, 2026, we attempted connecting with a GPU and CPU per <a href=\"https:\/\/docs.inichain.com\/initverseinichain\/inichain\/mining-mainnet#gpu\">their mining guide<\/a> and could not even connect at all even using their exact example run command (and our own address).  This leads us to believe they have completely disabled GPU and CPU mining<\/p>\n<p>&#8212;<\/p>\n\n<h2>Finding 3: 77% of Blocks From Four Addresses<\/h2>\n\n<p>We scanned the last 2000 blocks. Only 6 addresses produce blocks:<\/p>\n\n<ul><li><strong>0xd843&#8230;5b27<\/strong> \u2014 26.6%, 54.8M INI, 11 outgoing txs (Unknown whale)<\/li>\n<li><strong>0xFDd8&#8230;c893<\/strong> \u2014 21.6%, 5.3M INI, 742,540 outgoing txs (YatesPool)<\/li>\n<li><strong>0x989f&#8230;3A26<\/strong> \u2014 21.6%, 41.3M INI, 13 outgoing txs (Unknown whale)<\/li>\n<li><strong>0x9ABD&#8230;4432<\/strong> \u2014 20.0%, 44.8M INI, 2 outgoing txs (Unknown whale)<\/li>\n<li><strong>0x55D4&#8230;f8af<\/strong> \u2014 9.1%, 25.7M INI, 20 outgoing txs (Unknown whale)<\/li>\n<li><strong>0x1f0c&#8230;8edA<\/strong> \u2014 1.1%, 1.8M INI, 370,113 outgoing txs (Genesis miner)<\/li><\/ul>\n\n<p>The four whales hold <strong>~167M INI combined<\/strong> (~$20M) and have made a grand total of <strong>46 outgoing transactions<\/strong> between them. They are NOT pools \u2014 pools make payouts (YatesPool has 742K outgoing txs). These wallets just accumulate block rewards.<\/p>\n\n<p>They are all regular wallets (EOAs), not smart contracts. They received <strong>zero incoming transactions ever<\/strong> \u2014 their only source of funds is mining rewards. No public pool or mining service maps to these addresses.<\/p>\n\n<p>&#8212;<\/p>\n\n<h2>Finding 4: All Whales Send to the Same Batch Payout Contract<\/h2>\n\n<p>Using the INIScan explorer API, we traced every outgoing transaction from every whale and unknown miner. <strong>They all send to the same contract: <code>0xcFe5D32a0BA122016303Cb12e4BC73a2f61897Cc<\/code><\/strong><\/p>\n\n<p>This contract uses method <code>0xe59f33b0<\/code> \u2014 a batch distribution function that takes lists of addresses and amounts. It has 226 incoming transactions, zero outgoing (distributes via internal txs).<\/p>\n\n<p>Senders to this contract: WHALE-1, WHALE-2, WHALE-3, WHALE-4, UNKNOWN-A, UNKNOWN-B (via intermediary), UNKNOWN-C (via intermediary). <strong>Every insider mining address uses the exact same distribution infrastructure.<\/strong> This is a single operation, not independent miners.<\/p>\n\n<p><strong>What the payout contract actually does (traced from public data):<\/strong> We pulled all internal transactions from the contract via the INIScan API. The contract has <strong>15,091 internal transfers<\/strong> (outgoing) and <strong>226 incoming<\/strong> txs. An <strong>operator address<\/strong> <code>0x841f16b0e2e4769d790b1c4e7816deb9fd3a760f<\/code> is the one calling the contract 200+ times; whales fund intermediaries that fund this operator. Payouts are <strong>equal per batch<\/strong> \u2014 e.g. one tx sent 638 INI each to 10 addresses, 50 times in a single batch (31,900 INI per recipient). That&#8217;s not proportional like pool payouts; it&#8217;s fixed-amount batches to lists of addresses.<\/p>\n\n<p>Their <a href=\"https:\/\/docs.inichain.com\/initverseinichain\/project-introduction\/tokenomics\/tokenomics\">tokenomics page<\/a> <em>does<\/em> say the official team retains &#8220;a mining address&#8221; and that &#8220;all tokens mined through this address will be fully allocated for community building and <strong>airdrops<\/strong>.&#8221; So the batch distribution we see is <strong>consistent with that narrative<\/strong> \u2014 they publicly describe airdrops. What they don&#8217;t provide is (1) which address or contract is &#8220;the team&#8217;s,&#8221; (2) who receives airdrops or by what criteria, or (3) any claim flow. And they say &#8220;<strong>a<\/strong>&#8221; mining address (singular); on-chain we see <strong>four whale addresses<\/strong> plus unknowns, all feeding the same operator and the same payout contract. So either the whole operation counts as &#8220;the team&#8217;s mining&#8221; or the docs are understating the setup. <em>(Charitable read: this could be airdrops as in the whitepaper; we can&#8217;t verify who recipients are from public data. The algorithm and centralization findings stand either way.)<\/em><\/p>\n\n<p>Additionally, WHALE-4 and UNKNOWN-A both sent funds to the same intermediary address <code>0xAfd9...a02c<\/code>, directly linking them. And YatesPool sent 1.28 INI directly to WHALE-2 \u2014 an on-chain link between the &#8220;public pool&#8221; and an insider whale.<\/p>\n\n<p>&#8212;<\/p>\n\n<h2>Finding 5: They Control Who Can Mine \u2014 Backdoors and Blacklist<\/h2>\n\n<p>We reviewed the full <a href=\"https:\/\/github.com\/Project-InitVerse\/chain\">ini-chain node source<\/a> (a fork of go-ethereum\/BSC). We audited a clone at <strong>commit <code>7712e4e<\/code><\/strong>; snippets below are from that tree so they remain valid if upstream changes or removes code. They define who can participate:<\/p>\n\n<p><strong>Address Blacklist Contract<\/strong> (<a href=\"https:\/\/iniscan.com\/address\/0x000000000000000000000000000000000000C001\"><code>0x000000000000000000000000000000000000C001<\/code><\/a>): A single admin can blacklist any wallet from sending or receiving. The contract exposes <code>addBlacklist<\/code>, <code>getBlacksFrom<\/code>, <code>getBlacksTo<\/code>ve <code>isBlackAddress<\/code>; 286 addresses have been blacklisted, zero ever removed. First blacklists started Nov 23, 2025. Anyone can verify the blacklist on-chain via the <a href=\"https:\/\/iniscan.com\/address\/0x000000000000000000000000000000000000C001\">explorer<\/a> or by calling the contract&#8217;s view functions.<\/p>\n\n<p><strong>Hidden Difficulty Divisor<\/strong> (<a href=\"https:\/\/github.com\/jj-twa\/biq\"><code>biq<\/code><\/a> library): The chain imports <code>github.com\/jj-twa\/biq<\/code>. That library overrides <code>SetBytes()<\/code> so that instead of setting the integer from the byte slice (as in standard <code>math\/big<\/code>), it <strong>divides<\/strong> the value decoded from the slice by <code>z.Int<\/code> (which can be supplied by a smart-contract call such as <code>checkValid<\/code>). So the node can make mining N times easier for any specific address \u2014 a stealth difficulty reduction invisible to anyone not reading the source. (Researchers have reported up to ~500x for favored addresses.) We preserve the code below; the repo may change or remove it.<\/p>\n\n<p><strong>P2P Network Whitelist<\/strong>: Whitelisted nodes get priority block propagation and don&#8217;t forward transactions. Two-tier network. (See <a href=\"https:\/\/github.com\/Project-InitVerse\/chain\">chain repo<\/a> <code>p2p\/<\/code> and related config.)<\/p>\n\n<p><strong>Commented-Out PoW Verification<\/strong>: The <code>verifySeal<\/code> check is commented out in <code>verifyHeader<\/code>, so header validation can pass without running PoW seal verification. Code snapshot below.<\/p>\n\n<p><em>Code evidence \u2014 ini-chain @ commit <code>7712e4e<\/code><\/em> (and <code>biq<\/code> library). All snippets preserved so they can\u2019t be removed upstream.<\/p>\n\n<p><strong>1. Blacklist contract and <code>checkValid<\/code><\/strong> \u2014 <code>consensus\/inihash\/systemcontract\/abi.go<\/code>:<\/p>\n\n<p><div class=\"code-block-wrapper language-go\" data-code=\"AddressListContractName = &quot;address_list&quot; AddressListContractAddr = common.HexToAddress(&quot;0x000000000000000000000000000000000000C001&quot;) ValidMethod = &quot;checkValid&quot;\"><pre style=\"line-height:1.1!important;font-size:15px!important;\"><code class=\"language-go\" style=\"line-height:1.1!important;background:none!important;font-size:15px!important;\">AddressListContractName = &quot;address_list&quot; AddressListContractAddr = common.HexToAddress(&quot;0x000000000000000000000000000000000000C001&quot;) ValidMethod = &quot;checkValid&quot;<\/code><\/pre><\/div><\/p>\n\n<p><strong>2. Chain uses <code>biq<\/code> for \u201cdifficulty\u201d<\/strong> \u2014 <code>common\/big.go<\/code>:<\/p>\n\n<p><div class=\"code-block-wrapper language-go\" data-code=\"import ( &quot;github.com\/jj-twa\/biq&quot; ... ) var ( ... NewBig = biq.NewInt(1) )\"><pre style=\"line-height:1.1!important;font-size:15px!important;\"><code class=\"language-go\" style=\"line-height:1.1!important;background:none!important;font-size:15px!important;\">import ( &quot;github.com\/jj-twa\/biq&quot; ... ) var ( ... NewBig = biq.NewInt(1) )<\/code><\/pre><\/div><\/p>\n\n<p><strong>3. Commented-out PoW seal check in header verification<\/strong> \u2014 <code>consensus\/inihash\/consensus.go<\/code> in <code>verifyHeader<\/code>:<\/p>\n\n<p><div class=\"code-block-wrapper language-go\" data-code=\"\/\/ Verify the engine specific seal securing the block \/\/if seal {  \/\/ if err := inihash.verifySeal(chain, header, false);  err != nil {    \/\/ return err \/\/  }  \/\/}\"><pre style=\"line-height:1.1!important;font-size:15px!important;\"><code class=\"language-go\" style=\"line-height:1.1!important;background:none!important;font-size:15px!important;\">\/\/ Verify the engine specific seal securing the block \/\/if seal {\n  \/\/ if err := inihash.verifySeal(chain, header, false);\n  err != nil {\n    \/\/ return err \/\/\n  }\n  \/\/\n}<\/code><\/pre><\/div><\/p>\n\n<p><strong>4. Difficulty divisor from blacklist contract<\/strong> \u2014 In <code>Finalize<\/code>, the node calls <code>checkValid(header.Coinbase)<\/code> on contract <code>0x...C001<\/code> and passes the return value into PoW verification (<code>consensus\/inihash\/consensus.go<\/code>):<\/p>\n\n<p><div class=\"code-block-wrapper language-go\" data-code=\"bigUtil := common.NewBig.Copy() if chain.Config().IsNewTon(...) {  abi := systemcontract.GetInteractiveABI()[systemcontract.AddressListContractName] data, err := abi.Pack(systemcontract.ValidMethod, header.Coinbase) \/\/ ... msg := core.NewMessage(systemcontract.AddressListContractAddr, ...) result, err := vmcaller.ExecuteMsg(msg, state, header, ...) \/\/ ... bigUtil.SetUint64(ret[0].(*big.Int).Uint64()) \/\/ divisor from contract}if err := inihash.verifySeal(chain, header, false, bigUtil);err != nil {  ...}\"><pre style=\"line-height:1.1!important;font-size:15px!important;\"><code class=\"language-go\" style=\"line-height:1.1!important;background:none!important;font-size:15px!important;\">bigUtil := common.NewBig.Copy() if chain.Config().IsNewTon(...) {\n  abi := systemcontract.GetInteractiveABI()[systemcontract.AddressListContractName] data, err := abi.Pack(systemcontract.ValidMethod, header.Coinbase) \/\/ ... msg := core.NewMessage(systemcontract.AddressListContractAddr, ...) result, err := vmcaller.ExecuteMsg(msg, state, header, ...) \/\/ ... bigUtil.SetUint64(ret[0].(*big.Int).Uint64()) \/\/ divisor from contract\n}\nif err := inihash.verifySeal(chain, header, false, bigUtil);\nerr != nil {\n  ...\n}<\/code><\/pre><\/div><\/p>\n\n<p><strong>5. PoW check uses <code>bigUtil.SetBytes(result)<\/code><\/strong> \u2014 In <code>verifySeal<\/code>, the mining hash is \u201cchecked\u201d via the same <code>bigUtil<\/code> (a <code>biq<\/code> type). Standard <code>SetBytes<\/code> would set the value; <code>biq.SetBytes<\/code> <strong>divides<\/strong> by <code>bigUtil<\/code>, so a contract-returned divisor makes the check easier (<code>consensus\/inihash\/consensus.go<\/code>):<\/p>\n\n<p><div class=\"code-block-wrapper language-go\" data-code=\"target := new(big.Int).Div(two256, header.Difficulty) if bigUtil.SetBytes(result).Cmp(target) &gt; 0 {  return errInvalidPoW}\"><pre style=\"line-height:1.1!important;font-size:15px!important;\"><code class=\"language-go\" style=\"line-height:1.1!important;background:none!important;font-size:15px!important;\">target := new(big.Int).Div(two256, header.Difficulty) if bigUtil.SetBytes(result).Cmp(target) &gt; 0 {\n  return errInvalidPoW\n}<\/code><\/pre><\/div><\/p>\n\n<p><strong>6. <code>biq<\/code> library: <code>SetBytes<\/code> divides instead of setting<\/strong> \u2014 <a href=\"https:\/\/github.com\/jj-twa\/biq\/blob\/d3ef6a5ef1e8263a76329469eea0b934fc1f6fed\/biq.go\">jj-twa\/biq @ commit <code>d3ef6a5<\/code><\/a>:<\/p>\n\n<p><div class=\"code-block-wrapper language-go\" data-code=\"func (z *Int) SetBytes(buf []byte) *big.Int {  if z.Int == nil {    z.Int = big.NewInt(1)  }  if z.Int.Int64() == 0 {    z.Int = big.NewInt(1)  }  z.Int.Div(big.NewInt(0).SetBytes(buf), z.Int) \/\/ \u2190 divides hash by z.Int, not Set return z.Int}\"><pre style=\"line-height:1.1!important;font-size:15px!important;\"><code class=\"language-go\" style=\"line-height:1.1!important;background:none!important;font-size:15px!important;\">func (z *Int) SetBytes(buf []byte) *big.Int {\n  if z.Int == nil {\n    z.Int = big.NewInt(1)\n  }\n  if z.Int.Int64() == 0 {\n    z.Int = big.NewInt(1)\n  }\n  z.Int.Div(big.NewInt(0).SetBytes(buf), z.Int) \/\/ \u2190 divides hash by z.Int, not Set return z.Int\n}<\/code><\/pre><\/div><\/p>\n\n<p>They can also shut down the network. On 2026-02-04, wallets couldn&#8217;t load INI balances, miners couldn&#8217;t connect to the pool, the official block explorer was down, and exchange INIChain integrations showed errors. As one researcher put it, they can run their network however they want.<\/p>\n\n<p>So: they can block any wallet, favor specific miners via a hidden difficulty backdoor, gate who effectively participates, and take the network offline. Combined with the YatesPool protocol that blocks GPU miners, they control who can mine.<\/p>\n\n<p>&#8212;<\/p>\n\n<h2>Finding 6: The Difficulty &#8220;Dial&#8221; \u2014 They Control Profitability At Will<\/h2>\n\n<p>We sampled difficulty across the entire chain history. The whales can turn mining profitability up or down like a switch:<\/p>\n\n<p><strong>September 2025: The Whale Vacation<\/strong><\/p>\n<ul><li>Sep 17: Difficulty 17.3T, Yates 25%, Whales 35%<\/li>\n<li>Sep 19: Difficulty 11.6T, Yates 50%, Whales 0% \u2014 WHALES TURN OFF<\/li>\n<li>Sep 20: Difficulty 9.4T, Yates 75%, Whales 0%<\/li>\n<li>Sep 25: Difficulty 10.4T, Yates 75%, Whales 0%<\/li>\n<li>Sep 30: Difficulty 7.6T, Yates 50%, Whales 0% \u2014 DIFFICULTY CRASHED 55%<\/li>\n<li>Oct 1: Difficulty 10.1T, Yates 25%, Whales 50% \u2014 WHALES RETURN<\/li>\n<li>Oct 7: Difficulty 14.6T, Yates 15%, Whales 80%<\/li><\/ul>\n\n<p>The whales completely disappeared for 12 days, difficulty crashed 55%, YatesPool miners suddenly looked very profitable. Then Oct 1, they came back and difficulty immediately spiked. This is not natural PoW behavior \u2014 legitimate independent miners don&#8217;t all simultaneously stop and restart in unison.<\/p>\n\n<p>During the &#8220;vacation,&#8221; other insider addresses (UNKNOWN-C) took over ~24% of blocks, so insider control never actually went to zero \u2014 they just rotated addresses.<\/p>\n\n<p>&#8212;<\/p>\n\n<h2>Finding 7: The Timeline Tells Everything<\/h2>\n\n<ul><li>Jan 2025: Chain launches, only YatesPool + genesis miner<\/li>\n<li>Apr\u2013Jun: Whale addresses appear one by one<\/li>\n<li>Jul 3: INI listed on MEXC \u2014 can now sell tokens<\/li>\n<li>Jul 2025: INIBOX ASIC goes on sale \u2014 hardware revenue begins<\/li>\n<li>Jul 24: BitcoinTalk post from new account promoting INI cloud mining<\/li>\n<li>Sep 9: WHALE-2 sends 30M INI to distribution address<\/li>\n<li>Sep 19\u201330: Whales turn off \u2014 difficulty drops 55%, mining looks profitable<\/li>\n<li>Oct 1: Whales return full force, squeeze public miners to ~15%<\/li>\n<li>Oct 23: All whales move huge sums to intermediary addresses<\/li>\n<li>Nov 23: Mass blacklisting begins (286 addresses)<\/li>\n<li>Nov 24: Whales call batch payout contract \u2014 distribute tens of millions of INI<\/li>\n<li>Nov 25: InitVerse raises 500 BTC (~$50M) from investors<\/li><\/ul>\n\n<p>The MEXC listing is the key. Before July 3, the token had no market. After, they can sell. The September &#8220;vacation&#8221; where mining looked profitable? Perfect timing to sell ASICs and cloud mining contracts.<\/p>\n\n<p>&#8212;<\/p>\n\n<h2>Finding 8: The Revenue Machine<\/h2>\n\n<p>This is a vertically integrated operation:<\/p>\n\n<ul><li><strong>Built the chain<\/strong> \u2014 forked BSC\/geth, stole NexaPoW, renamed it<\/li>\n<li><strong>Control ~77% of mining<\/strong> \u2014 through insider whale wallets<\/li>\n<li><strong>Sell ASIC hardware<\/strong> \u2014 Pinecone INIBOX, real USD<\/li>\n<li><strong>Sell cloud mining<\/strong> \u2014 inimining.cloud, real USD<\/li>\n<li><strong>Control who participates<\/strong> \u2014 blacklist contract, P2P whitelist, block producer whitelist<\/li>\n<li><strong>Control profitability<\/strong> \u2014 difficulty dial via whale hashrate<\/li>\n<li><strong>Distribute tokens<\/strong> \u2014 batch payout contract to hundreds of wallets (creates appearance of broad distribution)<\/li>\n<li><strong>Got exchange listings<\/strong> \u2014 MEXC, XT.COM (thin liquidity, incentivized trading rewards)<\/li>\n<li><strong>Raised investor money<\/strong> \u2014 500 BTC (~$50M)<\/li>\n<li><strong>$746M market cap on $1.3M daily volume<\/strong> \u2014 price held up by thin order books<\/li><\/ul>\n\n<p>Every layer exists to make the next layer look legitimate. The batch distribution to hundreds of wallets creates the <em>appearance<\/em> of decentralization \u2014 exactly what an exchange due diligence team wants to see.<\/p>\n\n<p>&#8212;<\/p>\n\n<h2>Whitepaper vs Reality<\/h2>\n\n<p>They publish <strong>two<\/strong> whitepapers. The one linked on their site is the INIChain ecosystem whitepaper; the other is an older Technical White Paper that describes a different, unimplemented protocol.<\/p>\n\n<p><strong>A. Technical White Paper (POR \u2014 not implemented)<\/strong><\/p>\n<p><a href=\"https:\/\/media.inichain.com\/docs\/InitVerse_Technical_White_Paper.pdf\">InitVerse Technical White Paper<\/a><\/p>\n\n<ul><li><strong>Konsens\u00fcs<\/strong>: Proof of Resources (POR) \u2014 validators and cloud service providers jointly create blocks. Providers are challenged (Merkle-tree workload proofs); validators verify. Mining probability = f(pledged tokens, PoR quota). No hash mining.<\/li>\n<li><strong>Token distribution (Section 3.4)<\/strong>: Block reward split <strong>86% provider<\/strong>, <strong>10% validator<\/strong>, <strong>4% technical team<\/strong>. 50% immediate, 50% vested (1% daily). Tx fees to black hole. <strong>Halving<\/strong>: 1 year, then every 3 years.<\/li>\n<li><strong>Ecosystem<\/strong>: UDS, verifiable market, ProviderFactory \/ AuditorFactory \/ ValidatorFactory, SDL.<\/li><\/ul>\n\n<p><strong>Reality:<\/strong> The live chain does not use POR or the 86\/10\/4 split. This document describes an unimplemented design.<\/p>\n\n<p><strong>B. INIChain Whitepaper (site-linked \u2014 current narrative)<\/strong><\/p>\n<p><a href=\"https:\/\/resource.inichain.com\/whitepaper.pdf\">INIChain Whitepaper<\/a> (linked on inichain.com)<\/p>\n\n<ul><li><strong>Consensus \/ mining<\/strong>: PoW with <strong>VersaHash<\/strong> (&#8220;multi-stage hash module&#8221;) and <strong>Dual Dynamic Adjustment (DDA)<\/strong> \u2014 high-privacy blocks vs standard blocks, dynamic difficulty. TfhEVM, TFHE, parallel block generation.<\/li>\n<li><strong>Tokenomics (Section 6)<\/strong>: Matches the <a href=\"https:\/\/docs.inichain.com\/initverseinichain\/project-introduction\/tokenomics\/tokenomics\">tokenomics page<\/a>: 6B cap, all from block production; <strong>team retains &#8220;a mining address&#8221;<\/strong> and allocates to <strong>&#8220;community building and airdrops&#8221;<\/strong>; <strong>weekly halving<\/strong> (~20,160 blocks), initial block reward 729.166665 INI; pool fees as extra community rewards.<\/li>\n<li><strong>Ecosystem<\/strong>: SaaS, INICloud, Testnet, ObsSwap, Clown Wallet, INIScan, Candy.<\/li><\/ul>\n\n<p><strong>Reality:<\/strong> This is the narrative that aligns with the live chain (PoW, team mining \u2192 airdrops, weekly halving). The gap: they present <strong>VersaHash<\/strong> as their &#8220;multi-stage hash&#8221; innovation; we&#8217;ve shown it is <strong>NexaPoW<\/strong> (same algorithm, rebranded). DDA \/ high-privacy vs standard blocks may or may not be implemented as described; the mining we analyzed is standard hash PoW.<\/p>\n\n<p><strong>What the live chain actually does<\/strong><\/p>\n\n<ul><li><strong>Konsens\u00fcs<\/strong>: Classic PoW \u2014 NexaPoW (rebranded as &#8220;VersaHash&#8221;). Hash-based mining; no POR. ASICs (e.g. INIBOX) mine blocks.<\/li>\n<li><strong>Block reward<\/strong>: <strong>100%<\/strong> to miner (coinbase). No on-chain 86\/10\/4 or vesting.<\/li>\n<li><strong>Halving<\/strong>: Per tokenomics \/ INIChain whitepaper \u2014 ~7-day cycle (20,160 \/ 60,480 blocks after IIP-003).<\/li>\n<li><strong>Distribution<\/strong>: Team &#8220;mining address&#8221; \u2192 on-chain we see whale miners \u2192 intermediaries \u2192 operator \u2192 batch payout contract \u2192 many recipients (equal-per-batch, airdrop-style). Consistent with &#8220;community building and airdrops&#8221; in the site whitepaper and tokenomics.<\/li><\/ul>\n\n<p><strong>Charitable interpretation: &#8220;Could this just be them doing what the whitepaper says?&#8221;<\/strong><\/p>\n\n<p><strong>Airdrops.<\/strong> The whitepaper and tokenomics say the team keeps &#8220;a mining address&#8221; and allocates to &#8220;community building and airdrops.&#8221; On-chain we see: mining addresses \u2192 one operator \u2192 batch contract \u2192 many recipients, equal amounts per batch. That <strong>is<\/strong> the shape of an airdrop (fixed amounts to lists of addresses). So yes \u2014 the <strong>mechanism<\/strong> could be &#8220;team mining revenue being distributed as airdrops&#8221; as stated. The gap is that they never say <strong>which<\/strong> address or contract is the team&#8217;s, <strong>who<\/strong> gets airdrops, or <strong>what the criteria<\/strong> are. So we can&#8217;t tell &#8220;community airdrop&#8221; from &#8220;insider\/partner list&#8221;; the implementation could match the narrative but the narrative is too vague to verify.<\/p>\n\n<p><strong>Staking.<\/strong> The INIChain whitepaper (Section 6) mentions staking for governance (&#8220;voting rights&#8221;) and &#8220;staking of INI tokens for liquidity provider fees,&#8221; but it <strong>does not<\/strong> describe how to stake, which contract to use, or how staking rewards are paid. If some of the batch recipients were stakers, that would be an <strong>undocumented<\/strong> program. Typical staking rewards are proportional to stake; our batches are equal per recipient (e.g. 638 INI each to 10 addresses), which fits airdrop or &#8220;fixed reward per participant&#8221; more than proportional staking. So: staking is mentioned in the whitepaper but not specified; the payouts we see look more like airdrop batches than like staking reward distributions.<\/p>\n\n<p><strong>&#8220;One&#8221; mining address vs several.<\/strong> They could be counting the whole operation as &#8220;the team&#8217;s mining&#8221; (multiple keys or wallets, one logical &#8220;address&#8221; for the narrative). That would make the multi-whale \u2192 one-contract flow consistent with &#8220;we use our mining for airdrops.&#8221; It would still understate the setup (they say &#8220;a&#8221; address, we see four+ plus intermediaries).<\/p>\n\n<p><strong>What doesn&#8217;t survive the charitable read.<\/strong><\/p>\n<p>(1) <strong>VersaHash<\/strong> \u2014 the whitepaper presents it as their invention; it&#8217;s NexaPoW. That&#8217;s not &#8220;implementing the whitepaper,&#8221; it&#8217;s misrepresenting the algorithm.<\/p>\n<p>(2) <strong>Decentralization<\/strong> \u2014 even if the team legitimately runs &#8220;their&#8221; hashrate for airdrops, 77% in a few wallets, a difficulty dial, blacklists, and a block producer whitelist mean the <strong>network<\/strong> is not permissionless or decentralized as claimed.<\/p>\n<p>(3) <strong>Transparency<\/strong> \u2014 a charitable &#8220;they&#8217;re doing airdrops&#8221; doesn&#8217;t explain why recipients and criteria aren&#8217;t public, or why the operator\/contract aren&#8217;t named in the docs.<\/p>\n\n<p><strong>Bottom line.<\/strong> It&#8217;s <strong>plausible<\/strong> that the batch payouts are airdrops (or similar) as in the whitepaper. What we can&#8217;t do from public data is confirm <em>who<\/em> those recipients are or whether the program is as open as the wording implies. What we <strong>can<\/strong> say is that the algorithm is not theirs, the chain is highly centralized, and the docs overstate both innovation and decentralization \u2014 regardless of whether the distribution is &#8220;legit&#8221; airdrops or something else.<\/p>\n\n<p><strong>Conclusion.<\/strong> The INIChain whitepaper (and tokenomics) describe a fair, decentralized PoW chain with an innovative hashing algorithm and a single team mining address used for community airdrops. On-chain and in the node source we see:<\/p>\n<p>(1) <strong>No innovation in the algorithm<\/strong> \u2014 VersaHash is NexaPoW, renamed.<\/p>\n<p>(2) <strong>Heavy centralization<\/strong> \u2014 a handful of unidentified miners and one distribution operator, with coordinated hashrate (difficulty dial) and shared payout infrastructure.<\/p>\n<p>(3) <strong>Documentation understatement<\/strong> \u2014 &#8220;a&#8221; mining address vs multiple whale addresses all feeding the same system; &#8220;permissionless&#8221; and &#8220;decentralized&#8221; vs blacklists, block producer whitelist, and a hidden difficulty backdoor. So: the <strong>narrative<\/strong> (whitepaper + tokenomics) is consistent with &#8220;PoW + team mining \u2192 airdrops,&#8221; but the <strong>implementation<\/strong> contradicts the whitepaper&#8217;s claims about innovation (VersaHash), decentralization, and permissionless participation. Our conclusion is that the chain is <strong>centralized in practice<\/strong>, the <strong>algorithm is not their invention<\/strong>, and the <strong>official docs<\/strong> (including the whitepaper) <strong>overstate<\/strong> both.<\/p>\n\n<p>&#8212;<\/p>\n\n<h2>Key On-Chain Evidence (Verifiable by Anyone)<\/h2>\n\n<ul><li><strong>Blacklist contract (AddressList):<\/strong> <a href=\"https:\/\/iniscan.com\/address\/0x000000000000000000000000000000000000C001\"><code>0x000000000000000000000000000000000000C001<\/code><\/a> \u2014 view blacklisted addresses and admin on the explorer or via RPC (<code>getBlacksFrom<\/code>, <code>getBlacksTo<\/code>, <code>checkValid<\/code>).<\/li>\n<li><strong>Admin:<\/strong> <code>0xad1E145b11b65E779f23683387938DA8B51cAeAC<\/code><\/li>\n<li><strong>Payout contract:<\/strong> <a href=\"https:\/\/iniscan.com\/address\/0xcFe5D32a0BA122016303Cb12e4BC73a2f61897Cc\"><code>0xcFe5D32a0BA122016303Cb12e4BC73a2f61897Cc<\/code><\/a> \u2014 internal txs and incoming txs visible on explorer.<\/li>\n<li><strong>RPC:<\/strong> <code>https:\/\/rpc-mainnet.inichain.com<\/code> (Chain ID 7233)<\/li>\n<li><strong>Explorer:<\/strong> <a href=\"https:\/\/iniscan.com\">iniscan.com<\/a><\/li>\n<li><strong>Node source (chain):<\/strong> <a href=\"https:\/\/github.com\/Project-InitVerse\/chain\">Project-InitVerse\/chain<\/a> (go-ethereum fork). We audited a clone at <strong>commit <code>7712e4e<\/code><\/strong>; Finding 5 embeds snippets from that tree (systemcontract C001, verifyHeader\/verifySeal, common\/big.go, inihash consensus).<\/li>\n<li><strong>Difficulty backdoor (<code>biq<\/code>):<\/strong> <a href=\"https:\/\/github.com\/jj-twa\/biq\">jj-twa\/biq<\/a> \u2014 full snippet and <a href=\"https:\/\/github.com\/jj-twa\/biq\/blob\/d3ef6a5ef1e8263a76329469eea0b934fc1f6fed\/biq.go\">permalink @ commit <code>d3ef6a5<\/code><\/a> in Finding 5.<\/li>\n<li><strong>Nexa2InitVerse<\/strong> (proof that INI uses NexaPoW, pool blocks GPU miners): <a href=\"https:\/\/github.com\/Hazelmeow\/Nexa2InitVerse\">Hazelmeow\/Nexa2InitVerse<\/a><\/li>\n<li><strong>Video (Rabid Mining):<\/strong> <a href=\"https:\/\/www.youtube.com\/watch?v=Y4wZNe5yx_A\">InitVerse \/ Nexa2InitVerse breakdown<\/a><\/li>\n<li><strong>K1 Pool (block producer whitelist):<\/strong> <a href=\"https:\/\/x.com\/K1Pool\/status\/2003034217324642544\">Twitter\/X post<\/a><\/li><\/ul>\n\n<p>All findings are reproducible from public chain data and open-source code. Where we cite external repos, we use <strong>commit permalinks<\/strong> (not <code>main<\/code>) and <strong>embed code snippets<\/strong> so the evidence remains valid if maintainers change or remove the code.<\/p>\n\n<p>&#8212;<\/p>\n\n<h2>Sonu\u00e7<\/h2>\n\n<p>InitVerse presents itself as a decentralized PoW chain with an innovative algorithm and open mining. On-chain and in the node source we see: a stolen algorithm (NexaPoW rebranded), backdoors (blacklist, hidden difficulty divisor), control over who can mine (block producer whitelist, pool protocol blocks GPUs, blacklist blocks wallets, difficulty backdoor favors insiders), and heavy centralization (four addresses, one payout pipeline, coordinated difficulty dial). As a mining pool, we&#8217;re reporting what we found. The rest is for the community and exchanges to decide \u2014 and as others have asked: why are coins like this still listed?<\/p>\n<\/div>\n\n\n<figure class=\"wp-block-pullquote has-text-align-left\"><blockquote><p>March 3, 2026 Update &#8211; Yatespool THEFT<\/p><\/blockquote><\/figure>\n\n\n\n<p>We have also learned and confirmed from multiple sources, that <strong>Yatespool is actively STEALING from miners <em>submitting valid solutions on their pool<\/em>.<\/strong>  <br><br>Any pending balances were sent in a transaction back to their pool wallet address, and some of those addresses were blocked by the INI team from sending INI as well.<br><br><strong>Yatespool is stealing<\/strong>, clear as day.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"260\" src=\"https:\/\/blog.vipor.net\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-03-at-11.48.06-AM-1024x260.png\" alt=\"\" class=\"wp-image-385\" srcset=\"https:\/\/blog.vipor.net\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-03-at-11.48.06-AM-1024x260.png 1024w, https:\/\/blog.vipor.net\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-03-at-11.48.06-AM-300x76.png 300w, https:\/\/blog.vipor.net\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-03-at-11.48.06-AM-768x195.png 768w, https:\/\/blog.vipor.net\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-03-at-11.48.06-AM-18x5.png 18w, https:\/\/blog.vipor.net\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-03-at-11.48.06-AM.png 1432w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><a href=\"https:\/\/iniscan.com\/tx\/0xfc06b964e2511d7055625d51dc4fd36683a6a8f905e258d3344c4acd2c221b6e\">https:\/\/iniscan.com\/tx\/0xfc06b964e2511d7055625d51dc4fd36683a6a8f905e258d3344c4acd2c221b6e<\/a><\/p>\n\n\n\n<p>In the INI Discord they have also specifically said <strong>from us<\/strong> when referring to Yatespool, which leads anybody reading this to believe that Yatespool is in fact ran by the team at INI, and they have clearly confirmed Yatespool is the <strong>ONLY<\/strong> pool.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"544\" src=\"https:\/\/blog.vipor.net\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-04-at-12.39.41-PM-1024x544.png\" alt=\"\" class=\"wp-image-406\" srcset=\"https:\/\/blog.vipor.net\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-04-at-12.39.41-PM-1024x544.png 1024w, https:\/\/blog.vipor.net\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-04-at-12.39.41-PM-300x159.png 300w, https:\/\/blog.vipor.net\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-04-at-12.39.41-PM-768x408.png 768w, https:\/\/blog.vipor.net\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-04-at-12.39.41-PM-18x10.png 18w, https:\/\/blog.vipor.net\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-04-at-12.39.41-PM.png 1144w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Discord Ban<\/h2>\n\n\n\n<p>On March 2, 2026 we were also banned from the InitVerse Discord for bringing this up, Rabid Mining was also banned without even saying anything (assumption is because of the video he posted on YouTube)<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"507\" src=\"https:\/\/blog.vipor.net\/wp-content\/uploads\/2026\/03\/initverse_ban-1024x507.png\" alt=\"\" class=\"wp-image-387\" srcset=\"https:\/\/blog.vipor.net\/wp-content\/uploads\/2026\/03\/initverse_ban-1024x507.png 1024w, https:\/\/blog.vipor.net\/wp-content\/uploads\/2026\/03\/initverse_ban-300x149.png 300w, https:\/\/blog.vipor.net\/wp-content\/uploads\/2026\/03\/initverse_ban-768x380.png 768w, https:\/\/blog.vipor.net\/wp-content\/uploads\/2026\/03\/initverse_ban-1536x760.png 1536w, https:\/\/blog.vipor.net\/wp-content\/uploads\/2026\/03\/initverse_ban-18x9.png 18w, https:\/\/blog.vipor.net\/wp-content\/uploads\/2026\/03\/initverse_ban.png 2024w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"243\" src=\"https:\/\/blog.vipor.net\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-03-at-1.27.25-PM-1024x243.png\" alt=\"\" class=\"wp-image-389\" srcset=\"https:\/\/blog.vipor.net\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-03-at-1.27.25-PM-1024x243.png 1024w, https:\/\/blog.vipor.net\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-03-at-1.27.25-PM-300x71.png 300w, https:\/\/blog.vipor.net\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-03-at-1.27.25-PM-768x183.png 768w, https:\/\/blog.vipor.net\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-03-at-1.27.25-PM-1536x365.png 1536w, https:\/\/blog.vipor.net\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-03-at-1.27.25-PM-18x4.png 18w, https:\/\/blog.vipor.net\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-03-at-1.27.25-PM.png 1556w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>We carried out this analysis using only publicly available node source code and on-chain data. Some of what we found is indisputable (e.g. code and chain state anyone can verify); other conclusions may be disputable but we believe they are well supported. We welcome anyone who wants to correct us or challenge our findings \u2014 [&hellip;]<\/p>","protected":false},"author":2,"featured_media":405,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[33,34,36,37,35],"class_list":["post-372","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-initverse","tag-backdoor","tag-blacklists","tag-centralization","tag-coin-analysis","tag-nexapow"],"_links":{"self":[{"href":"https:\/\/blog.vipor.net\/tr\/wp-json\/wp\/v2\/posts\/372","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.vipor.net\/tr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.vipor.net\/tr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.vipor.net\/tr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.vipor.net\/tr\/wp-json\/wp\/v2\/comments?post=372"}],"version-history":[{"count":13,"href":"https:\/\/blog.vipor.net\/tr\/wp-json\/wp\/v2\/posts\/372\/revisions"}],"predecessor-version":[{"id":408,"href":"https:\/\/blog.vipor.net\/tr\/wp-json\/wp\/v2\/posts\/372\/revisions\/408"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.vipor.net\/tr\/wp-json\/wp\/v2\/media\/405"}],"wp:attachment":[{"href":"https:\/\/blog.vipor.net\/tr\/wp-json\/wp\/v2\/media?parent=372"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.vipor.net\/tr\/wp-json\/wp\/v2\/categories?post=372"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.vipor.net\/tr\/wp-json\/wp\/v2\/tags?post=372"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}