Data mining: you install a “mobile game” or “social medium”, which extracts your photos, contacts, location, preferences, and other device information; to build a model of which ads you are more likely to click on. This model gets sold to the highest bidder.
Crypto mining: you install a background process that uses your spare CPU power to generate tokens that you can sell to pay your power bill. This is a way to convert free electricity into spendable money. It’s dumb AF if you pay your own power bill. OR you trick someone else into installing the background process, now you are a malware author. OR you trick someone else into sending you their hard-earned tokens… Scams within scams.
Latest Answers