Post
Topic
Board Development & Technical Discussion
Re: Creating Valid Signatures via Public key only
by
krashfire
on 07/05/2025, 09:10:54 UTC
I'm not an expert in this area, but if z isn't derived from the message, then the same signature can be applied to any message (assuming that you don't verify the hash).


Read this: If someone wanted to pretend to be Satoshi by posting a fake signature to defraud people how could they?




i have read it. hmm.. some ideas are running in my head now when i saw the formula he used. thank you very much.