Next scheduled rescrape ... never
Version 2
Last scraped
Edited on 12/05/2025, 19:15:07 UTC
I'm not an expert in this area, but it seems to me that if z isn't derived from the message, then the same signature can be applied to any message (assuming that you don't verify the hash).


Read this: If someone wanted to pretend to be Satoshi by posting a fake signature to defraud people how could they?


Version 1
Scraped on 05/05/2025, 19:20:18 UTC
If I'm not an expert in this area, but it seems to me that if z isn't derived from the message, then the signature can be applied to any message.
Original archived Re: Creating Valid Signatures via Public key only
Scraped on 05/05/2025, 19:15:06 UTC
If z isn't derived from the message, then the signature can be applied to any message.