Skip to main content

How Does a Malicious Miner Try to Cheat the Share Submission System?

Malicious miners might attempt to submit 'fake' or 'stolen' shares. A common attack is 'share hijacking' or 'time warping,' where a miner tries to submit shares that were not genuinely found by them or were found at a time that gives them an unfair advantage.

Pool software employs rigorous validation checks, including timestamp verification and nonce checks, to prevent these attempts and ensure fair distribution of rewards.

How Does the Choice of Account Type Affect a Client’s Claim in a Broker Bankruptcy?
What Is ‘PFE’ (Potential Future Exposure) and How Is It Used in Credit Risk Management?
Explain the Impact of a Reverse Stock Split on Share Count
What Are the Most Common Types of Phishing Scams Targeting Cryptocurrency Investors?