Can one still use this algo to install malware to run on a website so that website visitors mine XMR with the users CPU?
Wasn't there any consideration to the algorithm that would negate this specific security issue with XMR and why is this not mentioned in the audit?
thanks.
Due to the random code generation part of the proof-of-work, a web miner is significantly more difficult to create (though definitely not impossible). Additionally, the 2GB RAM requirement somewhat mitigates the malware issue.
this is the kind of response i had hoped to read. thank you for that.
Glad that some of us are a little less easily-triggered!
peace.
Yes, this was not at all an insult to the community as a whole. I think your lucky you got a civil answer at all. But I was abrasive so that is on me for allowing
you to bait me. Be assured that won't happen again.
no it was a genuine question.. but feel free to see it as fud if you like.
my concern is that i had some comparative-crypto website open for a few hours yesterday on my browser and when i returned to my computer, it had almost melted the CPU. I know this type of shady deployment of malware has been inherent within the XMR community in the past so wanted to ask. I think your attitude to the question answered it specifically. thank you.
I refrained from stating 'within the XMR ecosystem, because it is not a fault of the developers, it is indeed people mining XMR via shady malware, which is indeed 'people involved in XMR' = "xmr community members"
You got triggered and defensive on my choice of phrase, perhaps you need some time with your head in a good novel or something friend, come away from 'Interent Formus' - it's an awful anxiety-enducing state to be in.
Take the advice of your peers:
Hueristic, I respect you, but in recent weeks and months you've been frothing at the mouth.
+1, let's keep it civil.