Every five txs the public key is exposed. Maybe someone find it with other approach.
There is no "approach". The whole point of creating original transaction is to prove it, and it has been proven solid for 6 years since then.
The "approach" that was mentioned is in the different program used. People have used the "Kangaroo" program to find the keys with known public keys; versus brute force approach for the smaller ranges, i.e. 64 bit range.
The thing is that you can't use the Kangaroo "approach" to the small ranges because their public address are not known.