The LBC is not posting "collisions". It is posting the private keys that contain or contained BTC. Since they started at private key 1 and are iterating sequentially through the private keys your notion of "fraudulent" makes no sense.
The LBC is publicly stating its mission to unlock coins in blockchains, therefore they're naturally in pursuit of "collisions". You can reframe this precise pursuit as "iterating through the possible keys", but that is merely the literal action that fulfills the purpose of finding collisions. Why is it necessary to resist the notion of 'collision searching' when it's merely a different spin on 'pursuing keys for known addresses'? What they've posted are theoretical collisions by their own definition. They state that they are looking for alternate keys in the 0 - 2^159 range to open addresses that may have been generated in the 2^160-up range. If that isn't collision-seeking then I don't know what is.
As to my "fraudulent" assertion, without the low-entropy addresses, it's supposed to be statistically damn-near impossible to find even 'one' key that could unlock any of the addresses they seek. Therefore, the claiming of THREE working keys purports to one of the three hypothesis' I stated, one of them being that they were already known keys, which is fraud with the intent of portraying the LBC as more effective than it really is. I'm not saying they are indeed lying about it, but this option can't be removed from the table.
If by hash you mean a Bitcoin address then there are approximately 296 private/public key pairs that map to every Bitcoin address. This is a well known fact. So, yes every hash has multiple keys, in fact approximately 296 keys.
ok, we agree on that, but you're also assuming that all hashes can be a product of a key, where I'm suggesting that we don't know just how many of the 'potential' hashes actually have a key. In other words, the realm of hashes may be much smaller than we realize and this could be why so many keys appear to be working.
If by "in blind faith" you mean "trust in the math of very large numbers, the laws of probability, and the integrity of SHA-256" then I do deny your hypothesis that this is anything other than a simple bad RNG, a code bug, or someone screwing around and putting BTC there to be found by LBC or something similar.
'blind-faith' refers to someone believing that an algorithm does what you're told it will do, without actually understanding every nuance of the algorithm. Forgive me if I assume that you couldn't speak to the inner-workings of SHA-256, because without a doubt, most people couldn't begin to follow the methodology and motivations buried in it. That being said, encryption history is littered with failed algorithms because someone found a flaw in it, completely neutralizing its efficacy. Your denying of my hypothesis follows a very long line of people that were convinced that the status quo was also unbeatable, but were wrong. You may be right, for now.
If there's any way to compel the LBC to shift to a different range of keys, we could possibly put this to rest
Probably not. They are pretty set in their ways - their ways being start with private key 1, then try 2, then try 3, etc.
Undoubtedly in pursuit of the low entropy targets.