I’m not for or against crypto mining per se, just how do you enforce anything to clamp down on it without breaking and entering a computer to prove what they are doing?
Could be crypto mining. Could be a bulk email operation. Could be doing DC projects. Could be a web server.
How do you tell the difference?