Please do your research, I did.
Last 24 hour average block size for pools: From 8 pm 2/16/14 to 8 pm 2/17/14 (PST timezone)
karma.hashstrike.com = 247 blocks/448009.8825910931 avg
http://pool.karmacoin.info = 237 blocks/456402.3839662447 avg
http://karm.idcray.com = 103 blocks/717014.3203883495 avg
For a total average of 587 blocks/498600.1379897785 avg
That is where the hell my claim comes from. I don't want to argue but please research first. This is way out of the range of luck isn't it? The attacker is getting massive block sizes somehow compared to the pools.
Well, I think I figured it out, and there's basically nothing that could be done besides changing the block rewards to a static value. I talked to someone with good knowledge of the dogecoin source code (which karmacoin was based off of) and, well, here you go...
00:39 < trigeek> the random seed for block rewards
00:39 < trigeek> it's solely derived from the previous block hash, yes?
00:39 < xxxxxxx> its not as random as you think it is ;)
00:39 < xxxxxxx> yup
00:39 < trigeek> well it can't be that random
00:39 < trigeek> otherwise nobody could agree on it
00:39 < xxxxxxx> yup
00:39 < xxxxxxx> there was some nifty bit of research done
00:40 < trigeek> so, you can determine what the next block's reward is, correct?
00:40 < xxxxxxx> yup
00:40 < trigeek> ok. thats what i thought
00:40 < xxxxxxx> there was the cool bit of code that could let a multipool know if the next payout was gonna be a X block
00:40 < xxxxxxx> like "oh the payout's gonna be 2" fuck that
00:40 < trigeek> that's that, then.
TL;DR - the multi-pool is switching their hash rate on and off based on what the reward of the next expected block is.