Skip to main content

How Does a Pool Operator Detect ‘Share Hijacking’?

Share hijacking is detected by rigorous validation checks on the submitted shares. The pool verifies the share's timestamp, ensuring it is recent and within an acceptable window.

It also checks the nonce and the block header against the current mining job template to ensure the work is original and was performed for the current task. Anomalous submission patterns can also flag a potential attack.

What Are the Main Components of a Typical Block Header?
Why Must the Block Timestamp Be within a Certain Range of the Network Time?
What Is the Difference between a Nonce and an Extranonce?
How Does a Pool Operator Ensure Miners Are Working on a Valid Block Template?