How Does a Pool Operator Detect ‘Share Hijacking’?
Share hijacking is detected by rigorous validation checks on the submitted shares. The pool verifies the share's timestamp, ensuring it is recent and within an acceptable window.
It also checks the nonce and the block header against the current mining job template to ensure the work is original and was performed for the current task. Anomalous submission patterns can also flag a potential attack.