We are living in an era where cryptocurrencies have a high market price and, that is why many legitimate websites and mobile apps are using cryptocurrency miners for their only profit.
Google is following the approach adopted by Apple in June, and now is banning mobile apps that mine cryptocurrencies using computational resources from victims’ devices. Due to this, Google has changed its Play Store Developer Policy.
“We don’t allow apps that mine cryptocurrency on devices,” reads the entry included in the policy.
Mining activities have a high impact for all the victims that are included in this schema. Problems with various origins as device performance, and in some cases, damage caused by overheat can destroy the batteries of victim’s devices.
In this sense, Google will remove all apps from Play Store that are using device’s resources for mining operations. But, it was also communicated by Google that “apps that remotely manage the mining cryptocurrency” are not included in the ban process.
Notice that last month, Google banned cryptocurrency mining extensions from its Chrome store, once that many of them have used users’ resources without consent.
Since January, Facebook also banned ads that promote financial products and services that are frequently associated with misleading or deceptive promotional practices, such as binary options, initial coin offerings, and cryptocurrency.
Living in the digital age means our privacy is no longer guaranteed with government and corporate tracking everywhere. The ExpressVPN Chrome extension allows you to browse without these fears, while also enabling you to circumvent geo-restrictions and even stop WiFi-based hacking: https://www.expressvpn.com/
Pedro Tavares is a professional in the field of information security, working as an Ethical Hacker, Malware Analyst, Cybersecurity Analyst and also a Security Evangelist. He is also a founding member at CSIRT.UBI and Editor-in-Chief of the security computer blog seguranca-informatica.pt.
In recent years he has invested in the field of information security, exploring and analyzing a wide range of topics, such as pentesting (Kali Linux), malware, hacking, cybersecurity, IoT and security in computer networks. He is also Freelance Writer.
Read more here.