{"id":16905,"date":"2018-03-16T08:00:42","date_gmt":"2018-03-16T12:00:42","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=16905"},"modified":"2022-04-28T08:55:44","modified_gmt":"2022-04-28T12:55:44","slug":"block-cryptocurrency-miners-web-browser","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/block-cryptocurrency-miners-web-browser\/","title":{"rendered":"Block Cryptocurrency Miners in Your Web Browser"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Cryptocurrency miners use complex algorithms to retrieve digital coins, which can then be used to pay for goods, services or advertisements to keep a website afloat. But, this technology is sometimes used at your expense on websites fueled by cryptocurrency miners, thus using your CPU power for their benefit.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There\u2019s a number of ways to <\/span><a href=\"https:\/\/fossbytes.com\/block-cryptocurrency-mining-in-browser\/\"><span style=\"font-weight: 400;\">avoid cryptocurrency miners<\/span><\/a><span style=\"font-weight: 400;\"> from increasing their profit at your expense and here\u2019s what you should know.<\/span><\/p>\n<p><strong>Read More:\u00a0<a href=\"https:\/\/www.psafe.com\/en\/blog\/3-ways-to-protect-yourself-from-malvertising\/\" target=\"_blank\" rel=\"noopener\">3 Ways to Protect Yourself From Malvertising<\/a><\/strong><\/p>\n<p><b>Is My PC Being Used for Mining Cryptocurrency?<br \/>\n<\/b><span style=\"font-weight: 400;\">It\u2019s hard for the untrained eye to tell whether or not your computer\u2019s processing power is being used by miners to attain cryptocurrency, but one easy way to find out is by monitoring CPU usage. If your computer is <\/span><a href=\"https:\/\/www.howtogeek.com\/334018\/how-to-block-cryptocurrency-miners-in-your-web-browser\/\"><span style=\"font-weight: 400;\">acting especially slow<\/span><\/a><span style=\"font-weight: 400;\">, preventing you from using your browsers or applications effectively, you may be the victim of mining.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A way to notice this is happening is when a sudden, massive spike in CPU usage occurs for no apparent reason. Chances are it\u2019s almost certainly cryptocurrency mining going on.<\/span><\/p>\n<p><b>How Chrome Users Can Protect Themselves<br \/>\n<\/b><span style=\"font-weight: 400;\">Companies have designed a variety of add-ons and extensions on Google Chrome to combat cryptocurrency miners. One extension is called minerBlock, which blocks any activity while you surf the web.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The extension lists various websites that are known for cryptocurrency mining and stops the mining from happening. MinerBlock is constantly updated as new domains are identified with mining every day.<\/span><\/p>\n<p><b>\u2018No Coin\u2019 Is Also Effective<br \/>\n<\/b><span style=\"font-weight: 400;\">Another Chrome app worth considering is No Coin, which is a free and open-source answer to online cryptocurrency mining. The extension monitors whether or not there is mining activity on a particular website, protecting your CPU from being used in an efficient manner.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When using your browser, No Coin shows you pop-ups that detect if mining is happening, with a red symbol offering you the opportunity to block the mining. You can also use it to whitelist a website for a specific period of time.<\/span><\/p>\n<p><b>Consider Paying for Anti-Malware<br \/>\n<\/b><span style=\"font-weight: 400;\">Some anti-malware and antivirus programs are also designed to stop cryptocurrency miners in their tracks. Although the integrated Windows Defender antivirus software doesn\u2019t stop mining, there are other products on the market that do offer an alternative to protect your laptop or home computer from shady mining practices.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This practice of \u201cmining\u201d your web browser for bitcoin sounds unrelated to your online safety, but there\u2019s more to it. Discover the risks to you.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[194],"tags":[53,358,249,223],"class_list":["post-16905","post","type-post","status-publish","format-standard","hentry","category-tips-tutoriais","tag-internet","tag-protection","tag-security","tag-tips"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/16905","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=16905"}],"version-history":[{"count":1,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/16905\/revisions"}],"predecessor-version":[{"id":21246,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/16905\/revisions\/21246"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=16905"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=16905"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=16905"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}