Mining: Check if a page is using your system

Anyone who deals with cryptocurrencies knows that requires very powerful systems. So if you are thinking of pursuing a "sport" you must first invest in a very good computer system. Mining

Recently some websites have started to use p of the system of the users who visit them, for mining. Some of them display on the screen a that explains what will happen before it starts, while others start using your system without mentioning anything.

This publication refers to the second sites, which are starting to use the resources of their visitors' systems to gain cryprobes.

Who is mining? is a web application that has a comprehensive list of all known mining websites. It also allows you to check out a mining page without telling it to the end user.

Visit it whoismining.com and type the URL of the page that you suspect uses your browser to do mining cloaking. The web application will confirm whether your suspicions are true.

The app still has endless lists of webpages with that behavior.

If you see that a page you are interested in uses your computer, you can simply stop visiting it. If you can not again without it, you can block mining from your browser with an add-on or extension.

It's worth debating whether or not this practice is right, especially when sites choose not to reveal what they're doing. Some users of these pages have not to allow their system to be used for mining , however it should be up to the user to decide if they want to do it or not.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.081 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).