Search content
Sort by

Showing 9 of 9 results by pikanakapika
Post
Topic
Board Bitcoin Discussion
Re: *THE TOP 20 MOST INFLUENTIAL FEMALES IN CRYPTO*
by
pikanakapika
on 19/06/2022, 09:28:35 UTC
I'm glad I don't know any of them. I don't need influencers in my life.

Same. Influencers are not something that is needed for a good product, community, service. They are part of the terrible advertising market.

Funnily enough, some of these women aren't actually influencers.

Elizabeth Stark is the CEO of Lightning Labs
Hester Peirce is a lawyer
Lyn Alden is a macro economist
Caitlin Long is a CEO of a bank

etc.

Unless your definition of an "influencer" is literally anyone with a decent following.

I was talking about influencers. My comment is not hard to understand. (https://en.wikipedia.org/w/index.php?title=Influencer&redirect=no)
Post
Topic
Board Bitcoin Discussion
Re: *THE TOP 20 MOST INFLUENTIAL FEMALES IN CRYPTO*
by
pikanakapika
on 18/06/2022, 23:55:23 UTC
I'm glad I don't know any of them. I don't need influencers in my life.

Same. Influencers are not something that is needed for a good product, community, service. They are part of the terrible advertising market.
Post
Topic
Board Development & Technical Discussion
Re: SHA256 once & twice
by
pikanakapika
on 07/06/2022, 22:14:49 UTC
There is no official/documented way to create brainwallets (words to privatekey).
You are talking about "privatekey to WIF" which is something different.
Post
Topic
Board Bitcoin Discussion
Re: == Bitcoin challenge transaction: ~100 BTC total bounty to solvers! ==UPDATED==
by
pikanakapika
on 04/06/2022, 14:31:16 UTC
I only wonder if the creator is/was close to Satoshi?
Post
Topic
Board Development & Technical Discussion
Merits 1 from 1 user
Re: Pollard's kangaroo ECDLP solver
by
pikanakapika
on 04/06/2022, 11:29:13 UTC
⭐ Merited by NotATether (1)
I mean, How to know ECDSA has collisions like that?

I don't think Pollard's Kangaroo will work against ECDSA sigs because there is a SHA512 hash of the message bytes which forms a second line of defence against brute-force.

So even if you cook up a Kangaroo iteration that takes you from R,S to the origional message, it's still hashed, so you'd have to find a different way around that.


Sure you can: R of the signature is the X coordinate of the curve point k*G. So you can use kangaroo to search for R and -R.
Post
Topic
Board Development & Technical Discussion
Re: dividing pubkey for attack. manual from me
by
pikanakapika
on 28/05/2022, 12:31:29 UTC
What you are doing is basic math:
5/2 = 2.5
2.5 -2 = 0.5
0.5 * 2 = 1

Now lets do it for 123123:
123123/2 = 61561.5
61561.5 - 2 = 61559.5
61559.5 * 2 = 123119

So we substracted 4 from 123123...

Now bigger divisor:

123123 / 4234  = 29.07959376476145
29.07959376476145 - 4234 = -4204.920406235239
-4204.920406235239 * 4234 = -17803633


Post
Topic
Board Development & Technical Discussion
Re: dividing pubkey for attack. manual from me
by
pikanakapika
on 28/05/2022, 03:46:35 UTC
It is really hard to follow your text full of errors/typos.
Sure you can divide the public key by any number you want, but what does it help?

You can imagine the simple example of dividing by 2.

then understad how to div priv, then clone calculation  to pubkey and you downgradw range from 120 to 60 bit etc

Ok. This seems to be some advanced math I do not and will not understand.
Post
Topic
Board Development & Technical Discussion
Re: dividing pubkey for attack. manual from me
by
pikanakapika
on 28/05/2022, 03:39:42 UTC
It is really hard to follow your text full of errors/typos.
Sure you can divide the public key by any number you want, but what does it help?
Post
Topic
Board Development & Technical Discussion
Re: dividing pubkey for attack. manual from me
by
pikanakapika
on 28/05/2022, 02:30:32 UTC
What are you trying to do?

You can divide a publickey by 2 but you don't know if it is even or odd so it either is 1 bit below or somewhere else...