If you have the required hardware, you can mine bitcoin even if you are not a miner. There are different ways one can mine bitcoin such as cloud mining, mining pool, etc. For cloud mining, all you need to do is to connect to the datacenter and start mining. The good thing about this is that you can mine from anywhere and you don’t need a physical hardware to mine.


如果目的IP地址显示不是同一网段的,那么A要实现和B的通讯,在流缓存条目中没有对应MAC地址条目,就将第一个正常数据包发送向一个缺省网关,这个缺省网关一般在操作系统中已经设好,这个缺省网关的IP对应第三层路由模块,所以对于不是同一子网的数据,最先在MAC表中放的是缺省网关的MAC地址(由源主机A完成);然后就由三层模块接收到此数据包,查询路由表以确定到达B的路由,将构造一个新的帧头,其中以缺省网关的MAC地址为源MAC地址,以主机B的MAC地址为目的MAC地址。通过一定的识别触发机制,确立主机A与B的MAC地址及转发端口的对应关系,并记录进流缓存条目表,以后的A到B的数据(三层交换机要确认是由A到B而不是到C的数据,还要读取帧中的IP地址。),就直接交由二层交换模块完成。这就通常所说的一次路由多次转发。 [3] 
In August 2019, Coinbase announced that it was targeted by a sophisticated hacking attack attempt in mid-June. This reported attack used spear-phishing and social engineering tactics (including sending fake e-mails from compromised email accounts and created a landing page at the University of Cambridge) and two Firefox browser zero-day vulnerabilities. One of the Firefox vulnerabilities could allow an attacker to escalate privileges from JavaScript on a browser page (CVE-2019–11707) and the second one could allow the attacker to escape the browser sandbox and execute code on the host computer (CVE-2019–11708). Coinbase's security team detected and blocked the attack, the network was not compromised, and no cryptocurrency was stolen.[39][40][41]