How Does a Pool Operator Detect ‘Share Hijacking’?

Share hijacking is detected by rigorous validation checks on the submitted shares. The pool verifies the share's timestamp, ensuring it is recent and within an acceptable window.

It also checks the nonce and the block header against the current mining job template to ensure the work is original and was performed for the current task. Anomalous submission patterns can also flag a potential attack.

How Does a Pool Operator Ensure Miners Are Working on a Valid Block Template?
What Is a “Transaction Nonce” and How Does It Differ from a Mining Nonce?
What Specific Data Must a Miner Include in the Block Header of a PoA Template?
What Is the ‘Template’ in the PoA Process and How Is It Different from a Full Block?
Relate the Concept of ‘Nonce’ in Mining to the ‘Nonce’ in ECDSA Signing
Does the Timestamp of a Block Affect the Deterministic Output of Its Hash?
Define ‘Block Header’ in the Context of a Blockchain
What Are the Main Components of a Typical Block Header?

Glossar