The principle of mining by a mining machine: connect to the mining pool, accept mining pool tasks, generate legal shares and send them to the mining pool. The mining pool distributes profits according to the proportion of the shares generated by a mining machine in the total pool shares during the generation of a block. For example, a mining pool has a pool fee of 1%, generates a block within 10 minutes, obtains 25 bitcoins, and has a total of 10,000 shares. A mining machine submitted 1,000 shares, accounting for 10%, so the profit that the mining machine can obtain = 25*10%*(1-0.01)=2.475 In order to earn more profits, some miners may use the following fraudulent methods to mine: Fraudulent conditions : Mining blocks by yourself, and the mining pool adopts Fraud method : Use multiple mining machines to connect to multiple mining pools. When your own mining machine mines a block in mining pool A, do not send the result to mining pool A first. Connect all other mining machines to mining pool A, mine for 5-10 minutes, and then submit the block to the mining pool, dispersing all computing power to various mining pools. Source of income : All mining machines are concentrated in mining pool A for 5-10 minutes, so that more shares are submitted and the distribution ratio becomes larger. Risk : When the computing power is concentrated in mining pool A, if others mine blocks, the previously mined blocks will become invalid. Monitoring method : A few minutes before an account submits a new block, the computing power increases significantly, and this phenomenon can be used for identification and prevention. Under the current stratum protocol, the miner knows whether the share it generates is the HASH value of the final block, and other fraudulent mining methods can be generated around this point. Is it possible to make the miner unaware of whether New block HASH confidentiality method:
Because the mining machine does not know the key, it cannot calculate the private HASH value, so it does not know whether it is the HASH value of the block, but the mining pool knows it, thus achieving confidentiality. Note: The new block HASH confidentiality method comes from the article [Analysis of Bitcoin Pooled Mining Reward Systems], which has not been verified. Please use it with caution. |
<<: Australian blockchain firm finalizes $190 million cryptocurrency mining deal
1. The nose is full of gallbladders, and you are ...
Physiognomy Analysis - Voice If a woman's voi...
Face reading is an important part of traditional C...
There are many textures and lines on the palm, th...
Good for Bitcoin? Both pro-coin and anti-coin com...
Since ancient times, there has been a saying that...
Text: Chen Yongwei (Head of Research Department o...
Rage Comment : The author believes that people sh...
Facial features of those who always like to take ...
Everyone loves beauty. Everyone hopes to have a go...
What does the mole around the eye mean? Statement...
On August 24, the China Banking and Insurance Reg...
In today's globalized world, language barrier...
The world's first professional Bitcoin bank w...
Girls who like to hook up with married men Not al...