The tactics of miners who, using special software, connect to the mining pool at the final stage in order to participate in the rewards distribution. The process of connecting to the data decryption takes place after other participants have decrypted most of the data. To reduce the frequency of pool hopping, pools put up security systems, limit the possibility of exiting the pool, and/or change the payment rules.