{"id":3457,"date":"2018-01-04T00:00:00","date_gmt":"2018-01-04T00:00:00","guid":{"rendered":"https:\/\/crypto-economy.com\/2018\/01\/04\/the-furtive-mining-of-monero-in-the-navigators-is-still-around\/"},"modified":"2023-03-13T17:15:08","modified_gmt":"2023-03-13T17:15:08","slug":"the-furtive-mining-of-monero-in-the-navigators-is-still-around","status":"publish","type":"post","link":"https:\/\/crypto-economy.com\/the-furtive-mining-of-monero-in-the-navigators-is-still-around\/","title":{"rendered":"The furtive mining of Monero in the navigators is still around"},"content":{"rendered":"
It is already known the propagation of certain malware that is installed in the Chrome browser and executes a Monero<\/strong> miner<\/a> in the computers with Windows operating system of the victims. This malware is spread through social networks such as Facebook, specifically through the Messenger of that social network.<\/p>\n Stealth mining<\/strong> is a new innovation to generate income online that has been abused and used in a very unethical way. It became known in high profile in September 2017 when it was discovered that a popular torrent site, The Pirate Bay, used Coinhive’s Monero JavaScript mining software<\/a><\/strong> to secretly take the CPU power of site visitors to extract the monero cryptocurrency without the consent of visitors.<\/p>\n Mining cryptography is traditionally done on the computer itself. Those who continue to abuse this method of mining without the consent of individuals install mining software on many computers without their owners knowing it, thus increasing the power of hash and using those machines (and their electricity) to ensure the rewards en bloc they are credited to the abuser’s account. Literally it’s like having slaves, making others work for you without compensating them.<\/p>\n