== Best Practises ==
* Only run software from known reputable developers, preferably peer revived reviewed and audited code. * Download only from the links provided by the developer, preferably from the developers own siteor their own github repo.* The inherent danger of a malicious miner app is that by design it already has already all the tools needed to be very harmful, these include including upload and download capabilities, there will not necessarily be anything we can detect immediately, as a malicious miner app can be triggered by something as simple as a specific network block number being reached or other delayed mechanisms.* Any computer on our network(subnet) could be a potential treat threat towards our hot wallet.
* There is no way to know if our wallet.dat/private keys are compromised, unless we always keep them safe guarded.
* The above holds true for any software we download and use.