{"id":6768,"date":"2018-02-20T15:03:46","date_gmt":"2018-02-20T20:03:46","guid":{"rendered":"http:\/\/www.cls-solutions.com\/blog\/?p=6768"},"modified":"2018-02-20T15:03:46","modified_gmt":"2018-02-20T20:03:46","slug":"cryptojacking-has-gotten-out-of-control","status":"publish","type":"post","link":"http:\/\/www.cls-solutions.com\/blog\/cryptojacking-has-gotten-out-of-control\/","title":{"rendered":"CRYPTOJACKING HAS GOTTEN OUT OF CONTROL"},"content":{"rendered":"<p>Cryptojacking, which exploded in popularity this fall, has an ostensibly worthy goal: Use an untapped resource to create an alternative revenue stream for games or media sites, and reduce reliance on ads. It works by embedding a JavaScript component in a website that can leverage a visiting device&#8217;s processing power to mine a cryptocurrency (usually Monero). Each visitor might only do a tiny bit of mining while they&#8217;re there, but every user lending some hash power over time can generate real money. And users might not even notice what&#8217;s happening. In theory, it can be a win-win. In practice, not so much.<\/p>\n<p>As cryptojacking has spread around the web\u2014largely thanks to the original &#8220;in-browser miner,&#8221; Coinhive, and its copycats\u2014implementations have generally not lived up to those lofty aims. Instead, the technique is used to exploit unknowing people&#8217;s resources, both their hardware and electric bills, and it is increasingly blocked as malware by scanners and ad-blockers. So far, efforts to keep cryptojacking on the straight and narrow have largely fizzled.<\/p>\n<p>https:\/\/www.wired.com\/story\/cryptojacking-has-gotten-out-of-control\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cryptojacking, which exploded in popularity this fall, has an ostensibly worthy goal: Use an untapped resource to create an alternative revenue stream for games or media sites, and reduce reliance on ads. It works by embedding a JavaScript component in a website that can leverage a visiting device&#8217;s processing power to mine a cryptocurrency (usually [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[64,21,67,22],"tags":[],"class_list":["post-6768","post","type-post","status-publish","format-standard","hentry","category-computer","category-internet","category-personal","category-softwaremarketing"],"_links":{"self":[{"href":"http:\/\/www.cls-solutions.com\/blog\/wp-json\/wp\/v2\/posts\/6768","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.cls-solutions.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.cls-solutions.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.cls-solutions.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.cls-solutions.com\/blog\/wp-json\/wp\/v2\/comments?post=6768"}],"version-history":[{"count":1,"href":"http:\/\/www.cls-solutions.com\/blog\/wp-json\/wp\/v2\/posts\/6768\/revisions"}],"predecessor-version":[{"id":6769,"href":"http:\/\/www.cls-solutions.com\/blog\/wp-json\/wp\/v2\/posts\/6768\/revisions\/6769"}],"wp:attachment":[{"href":"http:\/\/www.cls-solutions.com\/blog\/wp-json\/wp\/v2\/media?parent=6768"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.cls-solutions.com\/blog\/wp-json\/wp\/v2\/categories?post=6768"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.cls-solutions.com\/blog\/wp-json\/wp\/v2\/tags?post=6768"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}