Like most cryptocurrencies, Zcash relies on miners to add transactions to the blockchain. While all nodes in the Zcash network contribute to verifying the validity of transactions, the miners take on the heavy lifting to secure the network.
How it works
To secure the network, Zcash uses a proof-of-work mining algorithm. Proof-of-work means that miners compete against each other using processing power to produce a new block on the chain. The first miner that succeeds completing the proper computation for each block is awarded with a network standard block reward and any fees for any transactions they add to that block.
Zcash Mining Guide
Want to earn Zcash while strengthening the security of the Zcash network? Whether you are a hobbyist or a professional, mining is a great way to do it. Given the current network difficulty you must use an ASIC to mine Zcash.
As part of the Heartwood network upgrade, Zcash miners and mining pools have the option to mine directly to a shielded coinbase. Shielded coinbase allows Zcash users to have completely shielded ZEC from its creation. In addition to increased privacy, a considerable benefit to shielded coinbase is that miners have the option of getting their mining rewards issued immediately into a z-address. Reach out to your mining pool and encourage them to adopt shielded coinbase.