The difference between you, ktimesg, and me is that I encourage others to come up with plans. You’re like atheists in a church, only there to tell believers that God doesn’t exist. I find this absurd, because the smartest approach is to realize that you’re just wasting time trying, as you won’t make people lose interest.
Yeah except math is an exact science that works on objective proofs, not personal subjective beliefs.
So if something is already proven to be valid, then the opposite cannot be true, right?
There's a big difference between having opinions over things that don't have a definitive answer, and trying to convince everyone left and right
against things that are definitively proven to have an exact answer.
If you think the validity of a proof you're going against is wrong - spend some time to write that script. No one is obliged to prove to you the validity of the opposite things you're against (the ones you are propagating around). Because those things are the ones that were already proven.
Good luck anyway.
The prefix theory for searching matches in Bitcoin is a mathematically unexplored topic; it has only been investigated for the purpose of vanity addresses. The current research into hashes, to which you adhere, is focused on the whole picture, and the exploration of prefixes does not contradict current mathematics at any point. It is simply a probabilistic approach for a small dataset. For example, if you're searching for prefixes:
Target = ebeaf11111111111111111111111111111111111
If you search this way, it has a probability of n**16:
ebeaf00000000000000000000000000000000000
If you search by position, it has a very different probability:
eb11100000000
1100000
111111110000000
11111Without contradicting what is already established, both searches affect the most probable result differently.
Thus, probabilities change depending on how you search.
It is likely that a more efficient search method exists. And no,
this does not break cryptography, just like Kangaroo, BSGS, and prefixes, all these strategies are limited to very small ranges compared to actual security.