Summary
In this chapter, we explored solo mining and pool mining in more detail. We showed you how to set up your wallet and your mining software to be able to mine solo. We talked about the use of configuration files for the wallet and also configuration files for cgminer. We discussed mining pools and what to look for when joining one. We touched upon a very important attack against the network that every miner should be aware of—a 51% attack. In the next chapter, we will look at large-scale mining operations.