How Do Decentralized Mining Protocols Aim to Mitigate the 51% Attack Risk?
Decentralized mining protocols aim to mitigate the risk by eliminating the central pool operator, thus preventing a single entity from accumulating a majority of the hash rate. They distribute the block template creation and reward distribution logic across the miners themselves, making it harder for any single point of control to emerge and organize a majority attack.
Examples include P2Pool and other non-custodial pool designs.