Mining in a browser is unprofitable

Mining in a browser is unprofitable

There are as many cryptocurrencies as there are methods for mining them. Bitcoin, for example, is most profitable to mine using ASIC adapters; Litecoin and Ethereum can be mined through a video card. In some situations, the CPU is most efficient. It is the third group that includes Monero, which often becomes the target of attackers.

Fraudsters infect websites using a special script. The user opens the site, the script starts working, and the attacker receives his treasured Monero.

It would seem that everything is fine - the scheme works. But, as recent research has shown, this browser-based mining scheme is not that profitable for scammers. Therefore, mining through a browser is unprofitable.

Even if the scale of such mining increases, it still does not bring much income. For example, in 5 minutes of mining currency on the computers of a million users, scammers will earn only $24. The same situation arises with website monetization. 

Для того, чтобы майнинг в браузере приносил хороший доход, на сайт должно заходить, как минимум, несколько десятков миллионов человек в день.

В любом случае, пользователям нужно быть очень осторожными и осмотрительными и проверять, с кем они имеют дело. Fraudsters are trying to make money on literally everything related to cryptocurrency. Let us remind you that in China you can fake ICO for only $600.


You May Also Like

162018-09-17

Robinhood accused of selling customer data or free cheese again

Investing platform Robinhood, which is rapidly gaining popularity, appears to be making up for lost profits from zero commissions by selling users' data to make a quick buck at high-speed trading firms (HFTs) on Wall Street.

Stock, Security, Investments
182018-08-31

Critical vulnerability in Apache Struts opened the door to gray miners

Security experts say the critical Apache Struts vulnerability, discovered last week, is being actively exploited to maliciously install a popular hidden cryptocurrency miner on a victim's system.

Security

Latest articles from Security category

Fresh video on our Channel