Pages:
Author

Topic: End of Bitcoin (Read 381 times)

full member
Activity: 297
Merit: 133
May 25, 2024, 04:32:12 PM
#22
~
Nonsense is when you score my knowledge without knowing what I actually know. Talking simple does not mean that someone is dumb.

You missed the point.

How about I create a topic with the title "pbies is a fucking idiot!"  Just because I like to use those words, in that particular order, does not mean Im trying to insult you. Thats basically your argument, right?


No, not right. Your thinking is malfunctioning. Especially about someone's else knowledge.

Don't be so frustrated little kid, there will come a day for you also.
legendary
Activity: 1526
Merit: 1359
May 23, 2024, 03:27:34 PM
#21
~
Nonsense is when you score my knowledge without knowing what I actually know. Talking simple does not mean that someone is dumb.

You missed the point.

How about I create a topic with the title "pbies is a fucking idiot!"  Just because I like to use those words, in that particular order, does not mean Im trying to insult you. Thats basically your argument, right?
full member
Activity: 297
Merit: 133
May 22, 2024, 04:12:39 PM
#20
I have always been fascinated by how some folks can make big claims without knowing squat about the subject.  OP, you bandy around terms like bsgs and kangaroo like they are some kind of magic that can crack any encryption just like that.  Do you even know what these methods represent and what they are capable of doing?

If you are really interested in learning about this kind of stuff, I would suggest asking questions about things you dont understand before making such outlandish claims.


That are simplified words of other guys here in another topic. If you want to battle about what they are saying you are free to go.

Nonsense is when you score my knowledge without knowing what I actually know. Talking simple does not mean that someone is dumb.
legendary
Activity: 1512
Merit: 7340
Farewell, Leo
May 22, 2024, 03:12:31 PM
#19
I think he just meant that you can add 3 and 2 together instantly in your head whereas it will take you longer to add 334212132454779 + 675456421213132457964 since most people can't add them instantly without resorting to pencil and paper.
Humans can't add large numbers, because of lack of memory. You can't memorize the addition of 8173 with 2509, let alone with larger numbers. That's why you write it down, and then operate mechanically the step-by-step algorithm for column addition (starting from the rightmost column), as you've learned in elementary school, which has a time complexity of O(n).

Computers on the other hand, handle addition differently. When you give a computer a number, it reads it in a fixed-size set of bits. For example, 8173 and 2509 in 32-bit will be expressed as:
Code:
00000000000000000001111111101101
00000000000000000000100111001101

The addition here is done bit-by-bit, starting from the rightmost, with the following conditions:

  • If both bits added are '0', final bit is '0'.
  • If one bit is '1' and the other is '0', final bit is '1'.
  • If both bits are '1', final bit is '0' and we keep a carry ('1') for the next addition.

Code:
00000000000000000001111111101101
00000000000000000000100111001101
+
00000000000000000010100110111010

This way, regardless the digits of your number, if it can be represented with 32 or 64 bits, addition finishes in O(1) time complexity, in contrast with humans' algorithm, where time complexity increases linearly as the digits increase.
sr. member
Activity: 2828
Merit: 357
Eloncoin.org - Mars, here we come!
May 22, 2024, 03:07:29 PM
#18
you can do that with any transaction that is in mempool and has made public key public.
If I give you two numbers and ask you to add them together will you do it at the same speed with all numbers?
For example does it take you the same amount of time to add 3 and 2 together as it takes you to add 334212132454779 + 675456421213132457964?
And these numbers aren't even big!

It's the same in Elliptic Curve Cryptography.
If you can solve ECDLP in a short time when the key range is tiny, that doesn't mean you can do the same when the key range is ginormous like 2256. That's what the puzzle keys people are finding are, small keys in a tiny range compared to the max range of 2256.

Well, for computers it is fast:

1. selecting second number is fast, it can be pool of 10^9 numbers which will be operated in less than a second
2. multiplying this second number with known one is one instruction for CPU, so still under one second
3. then comparing to known value is still one instruction for CPU
4. if we have hit (still under one second, two at most) we have private key, there are only miliseconds to broadcast new tx with balance coming right to us

So we can do that for all mempool txs with multithreaded CPU below few seconds, where we have time of about 10 minutes when the tx will be a fact.
That’s not realistic at all.

Even with the most advanced computer, it can’t possibly find the correct combination with a possibility of 2^256 combinations. Just the amount of possibilities is enormous that if you just look for it without any logic, it would be very difficult to do so.

10 minutes to do probably with a supercomputer but then it would have been so expensive as you’d probably need more than one considering bitcoin’s power and the energy needed to go through them.
legendary
Activity: 1526
Merit: 1359
May 22, 2024, 03:06:56 PM
#17
I have always been fascinated by how some folks can make big claims without knowing squat about the subject.  OP, you bandy around terms like bsgs and kangaroo like they are some kind of magic that can crack any encryption just like that.  Do you even know what these methods represent and what they are capable of doing?

If you are really interested in learning about this kind of stuff, I would suggest asking questions about things you dont understand before making such outlandish claims.
legendary
Activity: 1092
Merit: 1021
May 22, 2024, 02:43:06 PM
#16
By that time, won't we find a preventive solution?
legendary
Activity: 3346
Merit: 3130
May 22, 2024, 02:41:33 PM
#15
So in other topics here, guys are saying, that if we have public key for puzzle 66 going public, then in few seconds we can track private key for that public key (bsgs, kangaroo) and take over the transaction making own one and moving the amount to our address.

Now think for a moment: you can do that with any transaction that is in mempool and has made public key public. It is only time matter when there will be massive take over of transactions.

PS. Let the shitstorm begin!

If it would be that easy, then someone would already do it.

The only way to get the private key from the public key is by brute force, and as we know, to brute-force bitcoin addresses is a waste of time, there are better odds of finding a wallet on the street than finding a private key.

So, nothing to worry about.
legendary
Activity: 4228
Merit: 1313
May 22, 2024, 02:38:34 PM
#14
For example does it take you the same amount of time to add 3 and 2 together as it takes you to add 334212132454779 + 675456421213132457964?
It takes the same time. Integer addition is instant, O(1). Did you mean elliptic curve point addition, perhaps?

Edit: For fixed-width integers (e.g., 32-bit, 64-bit), it's O(1). For arbitrary-precision, it's O(n) (with n being the number of bits in the integers, i.e. adding fixed-width n times). It's still fast, though.


I think he just meant that you can add 3 and 2 together instantly in your head whereas it will take you longer to add 334212132454779 + 675456421213132457964 since most people can't add them instantly without resorting to pencil and paper.  Similarly as the space searched expands like the numbers above got larger, searching takes much longer.
legendary
Activity: 1512
Merit: 7340
Farewell, Leo
May 22, 2024, 02:32:28 PM
#13
For example does it take you the same amount of time to add 3 and 2 together as it takes you to add 334212132454779 + 675456421213132457964?
It takes the same time. Integer addition is instant, O(1). Did you mean elliptic curve point addition, perhaps?

Edit: For fixed-width integers (e.g., 32-bit, 64-bit), it's O(1). For arbitrary-precision, it's O(n) (with n being the number of multiples of the fixed width integers, i.e. adding fixed-width n times). It's still fast, though.

1. selecting second number is fast, it can be pool of 10^9 numbers which will be operated in less than a second
10^9 is tiny space. We're talking about 2^256 = ~10^78. You can't store that range somewhere, if that's what you meant.

If you read the topic - this security has been breached recently by bsgs and kangaroo programs. There is no more security involved. Any transaction can be redirected currently, depends on luck hitting the pvk from pub key.
What topic? The probability of hitting a securely generated private key from public key is extremely slim. It's only public keys that were generated non-securely that are compromised.
legendary
Activity: 4228
Merit: 1313
May 22, 2024, 02:14:55 PM
#12
you can do that with any transaction that is in mempool and has made public key public.
If I give you two numbers and ask you to add them together will you do it at the same speed with all numbers?
For example does it take you the same amount of time to add 3 and 2 together as it takes you to add 334212132454779 + 675456421213132457964?
And these numbers aren't even big!

It's the same in Elliptic Curve Cryptography.
If you can solve ECDLP in a short time when the key range is tiny, that doesn't mean you can do the same when the key range is ginormous like 2256. That's what the puzzle keys people are finding are, small keys in a tiny range compared to the max range of 2256.


If OP really wants to understand the technical details a bit more (vs "End of Bitcoin" number #1000000012340), this thread has some discussion about it:
https://bitcointalksearch.org/topic/pollards-kangaroo-method-to-reverse-engineer-private-keys-5322009
full member
Activity: 297
Merit: 133
May 22, 2024, 01:59:24 PM
#11
I think there is still security in the BTC system that was created by Satoshi and user funds are still in the safe category if you refer to the question from @Freddie Boyer and the answer you provided above.

If you read the topic - this security has been breached recently by bsgs and kangaroo programs. There is no more security involved. Any transaction can be redirected currently, depends on luck hitting the pvk from pub key.
member
Activity: 295
Merit: 28
Enterapp
May 22, 2024, 01:50:11 PM
#10
I think there is not much possible to do in this case. Trying to guess the pvks is easy, there is only time that prevents us from seeing txs redirected by larger group of persons.

I think there is still security in the BTC system that was created by Satoshi and user funds are still in the safe category if you refer to the question from @Freddie Boyer and the answer you provided above.


full member
Activity: 297
Merit: 133
May 22, 2024, 01:14:15 PM
#9
You already started the shitstorm, so i will expect to see more of how you're going to compare seeing that bitcoin ends with the content of what you wrote down, i can only say more grease to your elbow, but know that bitcoin is not ending.

If you would be positively directed for the idea you would already know that.

If anyone can obtain pubkey and then get pvk from it, he could immediately redirect the tx to himself. That's the problem here which you don't see.

Brute-force method.

This is very interesting, where things that are secret will no longer be secret. I wonder what the scale will be if this is not anticipated immediately.

As well as anticipating funds to be safe.

I think there is not much possible to do in this case. Trying to guess the pvks is easy, there is only time that prevents us from seeing txs redirected by larger group of persons.
member
Activity: 308
Merit: 21
Crypto WEB3 Neobank
May 22, 2024, 10:38:26 AM
#8
Well, for computers it is fast:

1. selecting second number is fast, it can be pool of 10^9 numbers which will be operated in less than a second
2. multiplying this second number with known one is one instruction for CPU, so still under one second
3. then comparing to known value is still one instruction for CPU
4. if we have hit (still under one second, two at most) we have private key, there are only miliseconds to broadcast new tx with balance coming right to us

So we can do that for all mempool txs with multithreaded CPU below few seconds, where we have time of about 10 minutes when the tx will be a fact.

Brute-force method.

This is very interesting, where things that are secret will no longer be secret. I wonder what the scale will be if this is not anticipated immediately.

As well as anticipating funds to be safe.










sr. member
Activity: 798
Merit: 436
May 22, 2024, 10:26:14 AM
#7
snipped

You already started the shitstorm, so i will expect to see more of how you're going to compare seeing that bitcoin ends with the content of what you wrote down, i can only say more grease to your elbow, but know that bitcoin is not ending.
full member
Activity: 297
Merit: 133
May 22, 2024, 09:44:33 AM
#6
you can do that with any transaction that is in mempool and has made public key public.
If I give you two numbers and ask you to add them together will you do it at the same speed with all numbers?
For example does it take you the same amount of time to add 3 and 2 together as it takes you to add 334212132454779 + 675456421213132457964?
And these numbers aren't even big!

It's the same in Elliptic Curve Cryptography.
If you can solve ECDLP in a short time when the key range is tiny, that doesn't mean you can do the same when the key range is ginormous like 2256. That's what the puzzle keys people are finding are, small keys in a tiny range compared to the max range of 2256.

Well, for computers it is fast:

1. selecting second number is fast, it can be pool of 10^9 numbers which will be operated in less than a second
2. multiplying this second number with known one is one instruction for CPU, so still under one second
3. then comparing to known value is still one instruction for CPU
4. if we have hit (still under one second, two at most) we have private key, there are only miliseconds to broadcast new tx with balance coming right to us

So we can do that for all mempool txs with multithreaded CPU below few seconds, where we have time of about 10 minutes when the tx will be a fact.
sr. member
Activity: 2618
Merit: 439
May 22, 2024, 06:41:24 AM
#5
Your theory is possible and have been studied about by experts. They learned how to try and prevent such things from happening. With the cosntant evolution of technology, we can expect stronger security so the likelihood of this happening keeps decreasing as time goes by. Not to mention how hard it would be to actually generate the private key from an exposed public key if there are even any.
newbie
Activity: 70
Merit: 0
May 22, 2024, 05:25:40 AM
#4
So in other topics here, guys are saying, that if we have public key for puzzle 66 going public, then in few seconds we can track private key for that public key (bsgs, kangaroo) and take over the transaction making own one and moving the amount to our address.

Now think for a moment: you can do that with any transaction that is in mempool and has made public key public. It is only time matter when there will be massive take over of transactions.

PS. Let the shitstorm begin!
How widespread do you think this issue could become, and are there any preventative measures that can be taken to protect transactions in the mempool?
legendary
Activity: 3472
Merit: 10611
May 22, 2024, 04:46:07 AM
#3
you can do that with any transaction that is in mempool and has made public key public.
If I give you two numbers and ask you to add them together will you do it at the same speed with all numbers?
For example does it take you the same amount of time to add 3 and 2 together as it takes you to add 334212132454779 + 675456421213132457964?
And these numbers aren't even big!

It's the same in Elliptic Curve Cryptography.
If you can solve ECDLP in a short time when the key range is tiny, that doesn't mean you can do the same when the key range is ginormous like 2256. That's what the puzzle keys people are finding are, small keys in a tiny range compared to the max range of 2256.
Pages:
Jump to: