PS go find a blackhat forum this is not blackhat stealing world...
I wouldn't worry, judging by the awareness level of OP on how things work, he'd probably be the one who gets hacked if he ever posts his brilliant ideas to the BH community.
There are too many things OP claimed that are complete bogus to anyone even bothering to refute them. Latest one is using a SHA output as a private key, which actually works the other way around. But hey, I'm waiting for that ASIC that can break two different hashing algorithms just to end up with a 256-bits (128-bit secure) public key! I guess it doesn't matter there's not enough juice in the universe to even count all the attempts required to do that.