Antivirus software, ad blockers, and dedicated browser extensions are now able to detect and block cryptojacking scripts. The most popular and widespread of these techniques is to deploy a “cryptojacking proxy server
Source: such as allowing crooks to use custom mining pools. In the long run

