Search content
Sort by

Showing 20 of 1,470 results by WhyFhy
Post
Topic
Board Bitcoin Discussion
Re: What If Satoshi Nakamoto Revealed Himself Tomorrow?
by
WhyFhy
on 31/08/2025, 16:09:15 UTC
The lack of data is pretty solid data in pattern gap analysis especially when viewed through semantic alignment.

You'd be very, very surprised what you might uncover if you dropped your biases, swapped core weaves,
activated inquisition vectors, and researched from there.

Satoshi can really only be Harold Finney.

Invented PoW.

PGP contributor.

Built the first anonymous remailer.

Never really exchanged public words with “Satoshi.”

Lived just a few blocks from Dorian Nakamoto.

Was coding in compressed, modular, pragmatic fashion since the 1970s in a 4KB range

Here’s one I’ve never seen talked about on the open web:

Hal worked inside EXEC/NET memory constraints on Intellivision.
The functional logic range for his role? 1300–1408 bytes.
Ring a bell? 1354, anyone?
Base58 pivot behavior? Anyone?
But, Satoshi “invented” Base58, right?
There's maybe a handful of people alive who could even confirm what I’m talking about.
This is 30 years before my time, and there isn’t much documentation. But the logic signature is there.
Get me a rom, I'll do the research.

Hal was running Bitcoin first then stepped back.
He publicly distanced himself, always speaking of Satoshi in admiration.
But Satoshi never quoted Hal…
And the majority of Bitcoin is structurally based on Hal’s work.

Have any of y’all actually watched Hal’s ZK proof keynote from 98?
(Not claiming he invented it he didn't, but he had serious interest!.)

Block 170? That's not testing.
That's dogfooding.

If one more person says, “but Satoshi was emailing people while Hal was out running marathons”,
I’m just going to point them toward the remailer door and let them walk through it.

Also, a final kicker:

Why did Hal choose Alcor cryopreservation?
Why lock himself into a future contingency protocol
unless he had unfinished business with the future?
Perhaps this is the ultimate PoW.

This shoe doesn’t fit anyone else’s foot.

At this point, I don’t even think I should call it an opinion anymore.
Hal hits grounded with a microscopic pattern gap across every single vector. The only thing that would close the gap is admission.The proofs all there.

Through a protocol design game theory lens,
it’s Hal.
Always has been.

The cypherpunk ethos demands that individual identity becomes irrelevant once the system achieves mathematical consensus,
so admission would actually break the protocol's core security model.
Post
Topic
Board Development & Technical Discussion
Re: Could Layer 2 Solutions Eventually Handle Most Bitcoin Transactions?
by
WhyFhy
on 31/08/2025, 14:28:32 UTC
We basically have what your talking about with tokenized trade ledgers aka exchanges acting as a centralized buffer. LN initially was for decongestion of mempool on small transactions but when the pool is cleared LN is just another step.
Post
Topic
Board Development & Technical Discussion
Re: Suddenly raised regtest difficulty
by
WhyFhy
on 31/08/2025, 07:29:47 UTC

The difficulty can be trivially lowered, just by using more than 20 minutes of delay between regtest blocks, no matter how huge the network difficulty will be. Another interesting thing is if the difficulty will be bumped for example from 0x207fffff to 0x1f00be2e, then guess what: even if you use hours between blocks, then it won't decrease back to 0x207fffff. Do you know why? And why it bounces back and forth, even if the time between blocks is set to 15 minutes, instead of constantly decreasing?

It retargets at 288 if it theoretically takes 1-2 months on your same settings after you hit block 288. (Stick with the punishment and see how it corrects)
It should agressivley retarget possibly even lower than your target.

It looks like your algo's doing what you told it to. Your deterministic variables are elapsed time. ± is overshoot or undershoot. You just way undershot it , and I think you got the book thrown at you.
Post
Topic
Board Development & Technical Discussion
Merits 1 from 1 user
Re: Suddenly raised regtest difficulty
by
WhyFhy
on 30/08/2025, 05:49:53 UTC
⭐ Merited by stwenhao (1)
Since you mined 144 blocks in zero seconds, the retarget math didn’t just give you 4x it gave you 144x600÷elapsedtime which came out ~44k. Then the ±4x kicked back in on the next window.

It's averaged but the first blocks have nothing to baseline against. You also made it more aggressive going 2016 to 144.

tldr you gamed your own system and got punished.
Post
Topic
Board Development & Technical Discussion
Re: VanitySearch (Yet another address prefix finder)
by
WhyFhy
on 30/08/2025, 04:42:49 UTC
Did somebody want the VanitySearch customized with a key range? I have spent a lot of time creating that, and I have three versions: one with endophorism and one without and the last its the original but without bug of wrong key
sure let's see what you got.
Post
Topic
Board Development & Technical Discussion
Re: J. Lopp's Post-Quantum Migration BIP
by
WhyFhy
on 17/08/2025, 18:00:49 UTC
Post
Topic
Board Development & Technical Discussion
Re: ECSDA secp256k1 are on borrowed time.
by
WhyFhy
on 05/08/2025, 19:17:33 UTC
OP could you go into a little more depth about what the worst case scenario is here so it can be understood more widely?

What's the research you're citing? What happens if secp256k1 is broken tomorrow and how does it affect BTC?

Dissemination is an important thing when trying to get a message across about scientific matters. Especially given that for bitcoin to be upgraded without issue a wider user base would need to agree including miners and mining pools most importantly.

It's not necessary that those mining BTC will be knowledgeable in the field of computer science and cryptography though.

Worst case scenario? Every legacy wallet thats ever exposed its pubkeys gets contents swiped.

I don't have time to do a whitepaper, just like we don't really have time for politics on the matter. the logistics alone are already working against us.

Bitcoins already handicapped in this scenario, Moving millions of UTXOs through network capacity constraints for starters.

2017 Had time to argue, low stakes ($2500-20000)
2025 No time to argue, catastrophic stakes($100k+)

Almost impossible logistics compared to 2017.

Corporate treasury managers,
Institutional fund managers,
Government regulators,
International treaty obligations,
Pension fund fiduciaries

Institutional Stakeholders can't move fast have compliance requirements
Nation-State Actors some want Bitcoin to succeed, others want it to fail
Regulatory Oversight SEC, Treasury, international coordination needed
Economic Integration Bitcoin failure would cascade through financial markets







https://www.nature.com/articles/s41467-025-61342-8

i don't have a lot of time to dig in today but this hit my radar.

Post
Topic
Board Development & Technical Discussion
Re: ECSDA secp256k1 are on borrowed time.
by
WhyFhy
on 28/07/2025, 05:33:16 UTC
OP could you go into a little more depth about what the worst case scenario is here so it can be understood more widely?

What's the research you're citing? What happens if secp256k1 is broken tomorrow and how does it affect BTC?

Dissemination is an important thing when trying to get a message across about scientific matters. Especially given that for bitcoin to be upgraded without issue a wider user base would need to agree including miners and mining pools most importantly.

It's not necessary that those mining BTC will be knowledgeable in the field of computer science and cryptography though.

Worst case scenario? Every legacy wallet thats ever exposed its pubkeys gets contents swiped.

I don't have time to do a whitepaper, just like we don't really have time for politics on the matter. the logistics alone are already working against us.

Bitcoins already handicapped in this scenario, Moving millions of UTXOs through network capacity constraints for starters.

2017 Had time to argue, low stakes ($2500-20000)
2025 No time to argue, catastrophic stakes($100k+)

Almost impossible logistics compared to 2017.

Corporate treasury managers
Institutional fund managers
Government regulators
International treaty obligations
Pension fund fiduciaries
Institutional Stakeholders can't move fast have compliance requirements
Nation-State Actors some want Bitcoin to succeed, others want it to fail
Regulatory Oversight SEC, Treasury, international coordination needed
Economic Integration Bitcoin failure would cascade through financial markets




Post
Topic
Board Development & Technical Discussion
Re: ECSDA secp256k1 are on borrowed time.
by
WhyFhy
on 28/07/2025, 04:33:25 UTC
AI/Quantum FUD has nothing to do with abstract algebreic and number theory innovations.

And applying abstract algebraic and number theory innovations across unexpected vectors. Knowledge graphs and embeddings are just the surface layer. Historically, when breakthroughs move this fast, they’re intentionally obscured.


I'm speculating here, not fud.
If I had a quantum system id use it for topology recursion of the current system and solve for hierarchical error correction.
the first iteration of this would jump 10:1 vs Moore's 2.5 year iteration.

Then I'd fix the logical substrate with my new toy, and see 1000:1 gains after I solved for that X.
ECDSA and RSA would be a dinosaur in the iteration of this event.


Id bet we are in a 36 month window for the error correction phase without topology recursion.
To think, this post could be read by a key individual, and compress that timeline if they are not already utilizing a similar strategy.
Or retrieved by a topic research crawler. or both. Who knows I'm speculating and betting.

If I'm wrong we are conservatively in the 7 year range.


Again I'm not trying to create a panic/fud or anything, but the variables say its time to get to work!
Unfortunately the rules of mathematics are a dictatorship.



Post
Topic
Board Development & Technical Discussion
Re: ECSDA secp256k1 are on borrowed time.
by
WhyFhy
on 17/07/2025, 17:05:10 UTC
Oh bloody hell, yet another SC (Super Computer) & QC Quantum Computer) calamity FUD thread...
Get over it folks and dig deeper into where progress in computing power actually is and stop repeating crap based on pure speculation.
Quote
People are already researching curve collapse functions and log resolution methods.
Just like they have been for decades and still with no real progress.

Just like fusion power, the reality is still very far away from what is circulating on the 'net.


Your complacency bias is actually the biggest threat right now.
Patching after the fact won’t be an option, that’s exactly why I said “if you’re stuck in infosec principles, it’s time to get creative.”
Guys like you are a predictable factor. Constrained.
Post
Topic
Board Development & Technical Discussion
Re: J. Lopp's Post-Quantum Migration BIP
by
WhyFhy
on 16/07/2025, 13:58:01 UTC
Hope it will not have significant effect on the mempool?
   
depends on the signature weight. is we go from a few bytes to a KB or more it bottlenecks the pool , very quickly.
SPHINCS+ for example is stateless but takes up like ~70 bytes.
Post
Topic
Board Development & Technical Discussion
Topic OP
ECSDA secp256k1 are on borrowed time.
by
WhyFhy
on 16/07/2025, 13:46:16 UTC
Yall need to get to work on protocol proposals soon.

I dont have a complete solution yet, but its time to seriously consider Taproot upgrades, a new SegWit branch, and double or triple signature signing.

Focus on the lowest common denominator right now.    signatures.

Something like ECDSA + SPHINCS+ + Merkle Tree could be a start but its still just a patch.

Nothing will be secure soon.

nTimelock can buy time temporarily, but this barely scratches the surface.

People are already researching curve collapse functions and log resolution methods.

If youre stuck in infosec field practices and principles its time to get creative and step out of your comfort zone.

Deterministic functions are not truly one way they only feel that way because of current computational limits. Thats temporary.

My 2 Sats FWIW



Post
Topic
Board Serious discussion
Re: Can AI and quantum computing crack the blockchain?
by
WhyFhy
on 06/04/2025, 13:35:34 UTC
As we dive deeper into the realms of technology, two emerging forces stand poised to revolutionize the landscape of blockchain security: Artificial Intelligence (AI) and Quantum Computing. These advancements, once seen as distant possibilities, are now approaching critical points where their implications for cryptographic systems, including blockchain, cannot be ignored.

Artificial Intelligence, particularly machine learning algorithms, has demonstrated remarkable progress in deciphering complex patterns and optimizing solutions. When applied to cryptography, AI can potentially enhance attacks on blockchain networks in several ways, such as Pattern recognition —which could lead to optimized attacks— and behavioral analysis, which could be used to crack passwords— Huh.

On the other frontier lies Quantum Computing, which promises computational power far beyond what classical computers can achieve. While current blockchain protocols rely on cryptographic algorithms that are considered secure against classical computers, they are vulnerable to quantum-enabled attacks, aren't they?
Coming both together, it seems to me that there is a potential never seen before that could be used to crack, among others, Shor's or Gorver's algorithms, and only God knows what else.

Do you guys believe it will get to the point where the blockchain is cracked??
Not yet, but AI writing should stay off the boards. Your demonstrating fingerprints such as Unicode derived characters that aren't on your keyboard.
Post
Topic
Board Serious discussion
Merits 9 from 3 users
Topic OP
I feel played by the Bitcoin ecosphere.
by
WhyFhy
on 06/04/2025, 13:24:41 UTC
⭐ Merited by nutildah (4) ,philipma1957 (3) ,vapourminer (2)
I've had a weird relationship with Bitcoin lately.
I think about community developments on things such as LN , Vanity search projects, tools, tickers scrapers ECT.....
How they where developed by altruistic members for the chance of creativity, freedom and decentralized banking.

Bitcoin is now a store of value ,a commodity of fiat held by institutional parties.

Major altruistic contributors , sidelined. Some got tips. Most got nothing. 

If fees stay at 1 Satoshi , will LN/Layer 2 really be necessary?  What happens when we are all mined up, no one sells and only holds, and the mining fees don't cover the electric bill. Bitcoins showing signs of fatigue and stagnation overall. Will it die ,I don't think so, but Bitcoin doesn't appear to be designed for and by cypherpunks.
If it was , wall street weaponized it.

I've dedicated a lot of my life to this particular branch of cryptography, I've learned a lot! But it kinda feels like it was for nothing at this point. I've publicly released all my crypto projects source codes and walking away from developing in this sector.

I'll still be around speculating but that's about it.
Post
Topic
Board Economics
Topic OP
Hard Money Lenders
by
WhyFhy
on 17/03/2025, 11:35:06 UTC
I'm looking to connect with hard money lenders or private funds open to creative terms.

I’m targeting multifamily & hotel acquisitions in the $1M-$10M range. The approach? Off market deals, structured buyouts, and flexible financing, think seller holds 35% and you treat that as a down.

I’m not chasing shiny ultra competitive stuff. Im dissecting numbers before approaching.

My end goal?
 Sweat equity into long-term control 7-15 year plays.

If you're open to bending the usual rules and seeing how we can structure something profitable, let’s talk.

Full disclosure , if your talking 15% interest ballpark I can't utilize that, if the NOI,cap, DCR are good enough to survive that it's probally sold before we come to the table with our structured buyout offer that would be deemed tedious.

If anyone's willing to talk, shoot me your rough draft terms and I'll shoot a rough draft pitch built around your terms.



Post
Topic
Board Development & Technical Discussion
Re: Is quantum encryption pseudo science?
by
WhyFhy
on 22/02/2025, 17:42:21 UTC
My paradox is this.
Even if we find a form of quantum encryption,And quantum computing scales , it renders the current encryption obsolete.
<snip>
Um, quantum encryption chips have existed and been in use since 2021...  ref here

More recently Microsoft also announced a QE chip a few days ago. https://www.infosecurity-magazine.com/news/microsoft-quantum-chip-encryption/

QE is something entirely different and far easier to implement than QC (Quantum Computing). QC still has a long long way to go before it is able to crack current standard encryption (or for that matter do anything significantly useful). It is hardly 'pseudo science'. You might want to start doing a little fact checking before posting yer thoughts...
That's my dilemma on this subject, you say a long time. I disagree. It's all time based cat and mouse .
I'm just speculating here.

Photonic encryption is part of QKD , I don't want to discuss this route as it leads to gating.
I don't think we want the gating route. Perhaps I'm wrong?

I don't mind putting my thoughts on here and having someone such as you contesting them.
It took me years to really start grasping basics even in bitcoin. I don't know shit.
My goal here is to see if there's other physical routes to protect classical systems against QC.




Post
Topic
Board Development & Technical Discussion
Topic OP
Is quantum encryption pseudo science?
by
WhyFhy
on 22/02/2025, 07:09:07 UTC
My paradox is this.

Even if we find a form of quantum encryption,

And quantum computing scales , it renders the current encryption obsolete.

There's no shifting. No pivoting, nothing....

There is no way to apply it to current classical computing.
There's virtually infinite workarounds to "Pre-Layering"

Maybe encryption isn't what we need to be looking for in terms of security in the quantum realm.
Post
Topic
Board Speculation
Re: Wall Observer BTC/USD - Bitcoin price movement tracking & discussion
by
WhyFhy
on 16/02/2025, 18:10:20 UTC
My biggest regret before doge gov was a thing is not applying for a grant to observe shrimp running on a treadmill. I'm such an idiot.
Post
Topic
Board Development & Technical Discussion
Re: Vanity Pool - vanity address generator pool
by
WhyFhy
on 08/12/2024, 14:12:25 UTC
~~~
Which software do you use to find a work item solution (I might've missed it in case you already wrote about it)?

Did you modify the software in any way?


I can't remember having issues to submit the first hit of a work item solution many many years ago when vanitypool was rather new and there were plenty of not terribly hard work items available (GPUs back then weren't as powerful as today's and I only had a barely middle-class one).

It would be against all odds that I was purely lucky that my first found solution to a work item was just one that worked out fine, if there were detected "solutions" that won't spit out the correct public address prefix after combining the keys.

Why would there be something like "1 in 6" chance? That's nonsense in my opinion as I don't see any mathematical proof for such ambiguity. This sounds much like some strange bug in the software.

And I also can't remember any discussion about such an issue in this thread earlier (not that I've followed the many pages of it to the word).

I use VanitySearch for searching, with a special search scheme, for speeding up. This problem arose only when searching for a prefix with a public key, when searching for a prefix without it, 100% match of results. I also thought that when using a public key, the match should also be 100%, but it turns out that no, for what reason I can not answer exactly, maybe because elliptic curves are used for calculations or this is a bug in the program or memory without error correction, it is not clear yet why this happens, too little data and it takes months to accumulate it. Maybe there were no problems before because the prefixes were not complicated and it was possible to quickly find another option.
  I've gone through every inch of the SC of VS , his functions are incomplete when using a pub key with prefix.  Theres no discarding splitkeys in vs. if a function checks out .if it just so happens to find a child wallet it tells you that's fine. The other program doesn't. But it's nowhere near as complex as VS

The only question I really have is why does this happen with LEGACY wallets!  Why do legacy wallets have child keys?

There are more people who would probably know what's going on here  if they see the post. I didn't get into VS until 2019 or so.
Post
Topic
Board Development & Technical Discussion
Re: Vanity Pool - vanity address generator pool
by
WhyFhy
on 08/12/2024, 13:58:28 UTC
For fun, I checked other key variants for 1iJuniorTV and out of 15 variants, only about 5 matched the prefixes.
Again:
Can you explain this? As far as I know, vanity split key matches should be correct and not have a "1 in 6" chance.
When I did my split key vanity giveaway, every match I found produced the desired address.
if you used VS you got lucky. The other one discards child keys automatically, JeanLuc should have implemented this into vs.