Cryptojacking takes place when hackers obtain access to an endpoint device and secretly use its computing resources to mine cryptocurrencies such as bitcoin, ether or monero.By completing and publishing this type, I give my signature expressly consenting to phone calls, e-mails and/or texts-- including our use of automatic technology for phone call