While the deployment of cryptominers is principally achieved by means of phishing, downloading pirated material, making use of malware disguised as legit means, or exploiting vulnerabilities, some attackers are more resourceful. Monero also works on Evidence of Work but instead of your compact gadget resolving a very complex cryptography puzzle https://buy-cryptominer-machines42739.thenerdsblog.com/43498857/the-smart-trick-of-copyright-miner-manufacturers-that-nobody-is-discussing