As we all know, the Blockchain technology works because of the #mining procedure.
Basically,
Mining is the process of adding transaction records to Bitcoin's public ledger of past transactions (This ledger of past transactions is called the blockchain as it is a chain of blocks. The blockchain serves to confirm transactions to the rest of the network as having taken place. Bitcoin nodes use the blockchain to distinguish legitimate Bitcoin transactions from attempts to re-spend coins that have already been spent elsewhere.
Since this Proof-of-Work is expensive, in terms of buying an appropriate hardware (CPU, GPU, FPGA, ASIC), a way to get this work done freely is Cryptojacking.
What Cryptojacking is?
Cryptojacking is the secret use of your computing device to mine cryptocurrency.
So, imagine that your computer is mining (thus, it is working to generate new coins) secretly.
This phenomenon has raised up over the past few months, as well as the value of the cryptocurrencies.
How does the Cryptojacking work? What can I do to protect my coins?
It is quite difficult to say whether your system is infected or not.
Cryptojacking works anonymously, maybe you downloaded a program last week which is mining, or you're visiting an infected website.
An infected website runs a little snippet of JavaScript code which is responsible for in-browser mining and it does not need to be installed.
A solution could be this downloading this extension called; it is available for
If you don't want to install anything, you can disable JavaScript in your browser. But this could make your net surf nearly impossible, since, as mentioned before, almost all websites use JavaScript.
.
It is even more safe to enable the dual authentication on a secondary cellphone.
At last the most secure way to store all your cryptos can be a hardware wallet.