This is silly and proves nothing, besides being wrong: it's like saying you can't play chess simply because you can't count to 2^64. Okay, I'll be reasonable: it's like saying that because you can't contain every possible chess game in memory.
Also, you have my lottery comment out of context: If I have your private key, and you change it, then you're safe again. But you changing your private key all the time, obviously maximizes my chances of stealing it... or does it?
Come on! Catch up.
Looks like a cool book.
But again... have you been living under a rock? No encryption needed to get cracked for millions of hosts to get compromised via ssh, which is also secured by various flavours of encryption, including SHA hashes... all it took was a little "bug". How many private keys got changed after that fiasco??! Did you change yours?
You realize that to do a transaction, you need to put your private key into your computer, and if you've put your key into your computer any one of around half a million or more "security researchers", software developers and potential bad guys who have touched the code resident in your computer's memory, have potentially had an opportunity to capture some part of your key in one way or another... anywhere from recording the sound your keyboard makes when you hit each key, up to the hardware or software in your keyboard, browser, OS, or that of the phone your little nephew carried in there a few moments before you did the transaction, you know, the one where he loads new "unlocked" versions of whatever on daily...
I am not poking at the absence of holes in Bitcoin. I'm poking at the holes in the slab of swiss cheese that Bitcoin lives on, and I'm saying that Bitcoin can shield itself against that, even...
Actually, I'm not even poking at it yet... I'm just asking... who has? Where are they? Where are their findings?
No, reading a computer security manual is not the answer, because the vast majority of people using bitcoin will never do that; I'm saying that Bitcoin needs an official security strategy... be it "security through obscurity", or "security through unscrupulous transparency"... whatever it is, it's going to need more of it if it's to weather the coming waves... where is it?