Post
Topic
Board Development & Technical Discussion
Re: Brute-forcing Bitcoin private keys
by
ranochigo
on 02/03/2021, 12:20:50 UTC
Well as i can see that many of the replies are about how hard it is, i do understand that, let me give you an example of bitaddress.org which was used by many people back in the day to buy bitcoin, what are the chances that someone made a wallet and transfered some bitcoins to it and forgot about it, i can refere you to this https://www.reddit.com/r/Bitcoin/comments/1rli5i/if_someone_cracks_bitaddressorgs_number_generator/
Then you are exploiting potentially flawed PRNG which has been done and is completely feasible. Bitaddress uses randomness from different sources which would make it harder as you'll have to replicate both the tracked mouse movement as well as the randomness that was generated when the user enters the page.

These attacks can only work if they are using predictable variables as an entropy source. If and only if you can find a pattern in that generation, then you can reduce the search space significantly. Under no circumstances should any wallet be generating using flawed PRNG.