Interesting paper. Can you spot what they conveniently left out? A certain simple fact of algebraic number theory. I'll spell it out: most public keys can be generated by many different private keys. In other words, it is not necessary to solve for the private key actually used to generate the public key to do transactions, but only to solve for a single private key that gives rise to the same public key. The probability of finding such a suitable private key is high in the vast majority of cases.
This is what renders crypto wallets insecure and subject to spoofing. It is intrinsic to the design. It's deliberate.
- Forums
- Breaking News
- We need more cryptocurrencies that’ll solve real life problems to ensure global adoption of cryptocurrency.
We need more cryptocurrencies that’ll solve real life problems to ensure global adoption of cryptocurrency., page-8
-
- There are more pages in this discussion • 8 more messages in this thread...
You’re viewing a single post only. To view the entire thread just sign in or Join Now (FREE)
Featured News
Featured News
The Watchlist
LU7
LITHIUM UNIVERSE LIMITED
Alex Hanly, CEO
Alex Hanly
CEO
SPONSORED BY The Market Online