Next scheduled rescrape ... in 2 days
Version 1
Last scraped
Scraped on 31/07/2025, 15:55:44 UTC
I still don't fully understand — if a low-bit privkey public key is exposed, how could someone potentially derive the private key from it? Could someone please explain how that's possible?
Brute-forcing using the public key is much cheaper than brute-forcing using an address only.

if he didn't use it, he could go back and compile an .exe with o.random. Smiley
This is not how development works. You can't just "compile a binary" after sticking "o.random" somewhere and expecting it to work.
Original archived Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
Scraped on 31/07/2025, 15:51:10 UTC
I still don't fully understand — if a low-bit privkey public key is exposed, how could someone potentially derive the private key from it? Could someone please explain how that's possible?
Brute-forcing using the public key is much cheaper than brute-forcing using an address only.