This use-case is usually accomplished with the downloading of a cryptominer disguised to be a legit useful resource, which can take place as A part of a phishing assault. Why we do that may be just because we don't desire our operate graphic to be bloated with added packages which https://batchminer.com/about-us/