Bitcoin Forum

Alternate cryptocurrencies => Announcements (Altcoins) => Topic started by: bitalchemists on January 19, 2017, 10:01:30 PM



Title: [PRE-ANN] RecoveryCoin - ECDSA-based cryptocurrency with fair mining
Post by: bitalchemists on January 19, 2017, 10:01:30 PM
RecoveryCoin introduces new cryptographic features, improved blockchain technology and a full cryptocurrency system.

UPDATE

More progress available on github: https://github.com/bit-alchemists/RecoveryCoin (https://github.com/bit-alchemists/RecoveryCoin)

For any help on how to build and run, or if you have any question about the code or the architecture please ask in this thread and you will be answered. Also we would appreciate your insights and comments. Why use PoW addresses? Harder to crack, saves space on the blockchain and keeps the coin away from mass trading. Also, while generating the address the targets may be hit (rewards are generated at transaction level and not at block level).

We're looking for people who understand what we are doing. Please contact us!

Next aims:
- Transaction assembly and transaction pool
- Block assembly
- Networking
- More uses for the technology (need your help with ideas)

Demo screenshot:
https://i.imgur.com/BKTbTJM.gif

Valid private keys:
64EDCC5591868C62AD176606D22F497B7C87364119DE046B17ADE979101AE648
B455555CC62F1408BAB5D5BA957E5A53D5E13D813B68B9B8867A8A7F2B91F76B

Specifications

Algorithm: ECDSA
Block time: 15 Minutes
Reward: 1 REC

Features

PoW Addresses - Readable 32 digit addresses, secured against brute-force attacks
Fair Mining - Always the same reward for the same computer power
ECDSA Hashing - Blocks chained on a curve
Proof of Attack - Earn REC for only attempting to recover Bitcoin addresses

Operating Systems

Linux/Windows/OSX

Whitepaper

http://recoverycoin.info/whitepaper (http://recoverycoin.info/whitepaper) (few tweaks expected)

Mining

ECDSA FPGA implementation & virtual image will be available for Amazon EC2, see:

https://aws.amazon.com/ec2/instance-types/f1 (https://aws.amazon.com/ec2/instance-types/f1)

ICO / Donations

Deposit any amount in BTC to 19vVPuzXPBUiNdnr6KZwYP9rAtdtWkDjqi until 2017/03/01
Get x150 to your parallel REC address
(using the same private key of the BTC address you've sent from; funds will be hardcoded into the genesis block).
Launch is expected in September 2017.

Want to contribute? Please contact us or post your opinion in a comment.


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: notsofast on January 19, 2017, 10:41:47 PM
This is really interesting. Have you calculated the chances of "recovering" one key from these addresses?


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: bitalchemists on January 19, 2017, 10:49:58 PM
This is really interesting. Have you calculated the chances of "recovering" one key from these addresses?

Yes we have. It is just used as an anchor to produce fair mining.


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: CjMapope on January 19, 2017, 10:51:22 PM
ooo this IS interesting...   you should really be serious about this, some specs, a solid plan, this is something i could prob get onboard with :)

ooo September is a long time, which is kinda sweet as it gives this time to evolve, tell us more, this sounds cool man! :)

course some might get mad your "breaking BTC" ;p

Good Luck! watching for sure!

Edit: just saw the whitepaper, theres some more info in there, sweet!


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: notsofast on January 19, 2017, 11:05:49 PM
This is really interesting. Have you calculated the chances of "recovering" one key from these addresses?

Yes we have. It is just used as an anchor to produce fair mining. Any client accidentally recovering one of these keys will be the key's new owner.

It's an ingenious cryptographic point as far as capturing mindshare goes. I mean, you could anchor to anything, but that particular anchor and the lottery ticket thinking it produces make for a compelling reason to get on board.

I'll be watching this project for sure.


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: Sourgummies on January 19, 2017, 11:29:22 PM
You want to do an ico to raise money to rob people of their btc, do I understand this correctly?


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: CjMapope on January 19, 2017, 11:37:25 PM
You want to do an ico to raise money to rob people of their btc, do I understand this correctly?

ya haha its kinda hard to say WHAT they even need money for ;p

i am down for "Proof of Attack - Earn REC for only attempting to recover Bitcoin addresses"  -- but i still dont see why they will need funding to setup a server for people like at vanitypool where stuff can be posted for people to crack at. seems like that could be done out of pocket, maybe add a 1% fee to the "EDSCA Pool".
course on that note, we already have an open non profit at http://lbc.cryptoguru.org:5000/about that is as i understand it basically an "EDSCA Pool"  (tho not set up for incentives as this maybe could be)

idk, time will tell ;p


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: Sourgummies on January 19, 2017, 11:38:38 PM
You want to do an ico to raise money to rob people of their btc, do I understand this correctly?

ya haha its kinda hard to say WHAT they even need money for ;p

i am down for "Proof of Attack - Earn REC for only attempting to recover Bitcoin addresses"  -- but i still dont see why they will need funding to setup a server for people like at vanitypool where stuff can be posted for people to crack at. seems like that could be done out of pocket, maybe add a 1% fee to the "EDSCA Pool".
course on that note, we already have an open non profit at http://lbc.cryptoguru.org:5000/about that is as i understand it basically an "EDSCA Pool"  (tho not set up for incentives as this maybe could be)

idk, time will tell ;p


But they want to do more then attempt, they want to clean the address out. Correct?


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: bitalchemists on January 20, 2017, 12:02:37 AM
You want to do an ico to raise money to rob people of their btc, do I understand this correctly?

Wrong.


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: Sourgummies on January 20, 2017, 12:04:46 AM
You want to do an ico to raise money to rob people of their btc, do I understand this correctly?

Wrong.

So then why?


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: bitalchemists on January 20, 2017, 12:09:49 AM
You want to do an ico to raise money to rob people of their btc, do I understand this correctly?

ya haha its kinda hard to say WHAT they even need money for ;p

i am down for "Proof of Attack - Earn REC for only attempting to recover Bitcoin addresses"  -- but i still dont see why they will need funding to setup a server for people like at vanitypool where stuff can be posted for people to crack at. seems like that could be done out of pocket, maybe add a 1% fee to the "EDSCA Pool".
course on that note, we already have an open non profit at http://lbc.cryptoguru.org:5000/about that is as i understand it basically an "EDSCA Pool"  (tho not set up for incentives as this maybe could be)

idk, time will tell ;p


1. We don't need the funds.
2. This pool you've shown is not decentralized, and it is not a cryptocurrency.


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: Sourgummies on January 20, 2017, 12:20:06 AM
You want to do an ico to raise money to rob people of their btc, do I understand this correctly?

Wrong.

So then why?

Still waiting.


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: CjMapope on January 20, 2017, 12:31:06 AM
You want to do an ico to raise money to rob people of their btc, do I understand this correctly?

ya haha its kinda hard to say WHAT they even need money for ;p

i am down for "Proof of Attack - Earn REC for only attempting to recover Bitcoin addresses"  -- but i still dont see why they will need funding to setup a server for people like at vanitypool where stuff can be posted for people to crack at. seems like that could be done out of pocket, maybe add a 1% fee to the "EDSCA Pool".
course on that note, we already have an open non profit at http://lbc.cryptoguru.org:5000/about that is as i understand it basically an "EDSCA Pool"  (tho not set up for incentives as this maybe could be)

idk, time will tell ;p


But they want to do more then attempt, they want to clean the address out. Correct?

the LBC collider? ya the funds will be claimed, AFAIK, yes. We only work on the "puzzle transaction" there tho, not a free market or service, like this could be

You want to do an ico to raise money to rob people of their btc, do I understand this correctly?

ya haha its kinda hard to say WHAT they even need money for ;p

i am down for "Proof of Attack - Earn REC for only attempting to recover Bitcoin addresses"  -- but i still dont see why they will need funding to setup a server for people like at vanitypool where stuff can be posted for people to crack at. seems like that could be done out of pocket, maybe add a 1% fee to the "EDSCA Pool".
course on that note, we already have an open non profit at http://lbc.cryptoguru.org:5000/about that is as i understand it basically an "EDSCA Pool"  (tho not set up for incentives as this maybe could be)

idk, time will tell ;p


1. We don't need the funds.
2. This pool you've shown is not decentralized, and it is not a cryptocurrency.

ya its not decentralized nor a cryptocurrency, true.

You want to do an ico to raise money to rob people of their btc, do I understand this correctly?

Wrong.

So then why?

my guess is they just want some financial comp for their idea and setting it up (what it seems like). Unfortunately most wont pay for an IDEA, but the service they might


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: bitalchemists on January 20, 2017, 12:37:48 AM
You want to do an ico to raise money to rob people of their btc, do I understand this correctly?

ya haha its kinda hard to say WHAT they even need money for ;p

i am down for "Proof of Attack - Earn REC for only attempting to recover Bitcoin addresses"  -- but i still dont see why they will need funding to setup a server for people like at vanitypool where stuff can be posted for people to crack at. seems like that could be done out of pocket, maybe add a 1% fee to the "EDSCA Pool".
course on that note, we already have an open non profit at http://lbc.cryptoguru.org:5000/about that is as i understand it basically an "EDSCA Pool"  (tho not set up for incentives as this maybe could be)

idk, time will tell ;p


But they want to do more then attempt, they want to clean the address out. Correct?

the LBC collider? ya the funds will be claimed, AFAIK, yes. We only work on the "puzzle transaction" there tho, not a free market or service, like this could be

You want to do an ico to raise money to rob people of their btc, do I understand this correctly?

ya haha its kinda hard to say WHAT they even need money for ;p

i am down for "Proof of Attack - Earn REC for only attempting to recover Bitcoin addresses"  -- but i still dont see why they will need funding to setup a server for people like at vanitypool where stuff can be posted for people to crack at. seems like that could be done out of pocket, maybe add a 1% fee to the "EDSCA Pool".
course on that note, we already have an open non profit at http://lbc.cryptoguru.org:5000/about that is as i understand it basically an "EDSCA Pool"  (tho not set up for incentives as this maybe could be)

idk, time will tell ;p


1. We don't need the funds.
2. This pool you've shown is not decentralized, and it is not a cryptocurrency.

ya its not decentralized nor a cryptocurrency, true.

You want to do an ico to raise money to rob people of their btc, do I understand this correctly?

Wrong.

So then why?

my guess is they just want some financial comp for their idea and setting it up (what it seems like). Unfortunately most wont pay for an IDEA, but the service they might

Actually we would prefer to have no funds raised, and to start the blockchain in a completely neutral state.


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: rekcahxfb_foundation on January 20, 2017, 12:39:47 AM
wow is it possible? or a scam coin. Brutal force is very hard concept.


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: ICOcountdown.com on January 20, 2017, 12:41:36 AM
Great concept, I am looking to add this to http://icocountdown.com

Could the developer team please contact me? Thank you.

Email: alex@icocountdown.com


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: kamiyama on January 20, 2017, 12:41:58 AM
Is there a mining method other than Amazon EC2 F1?


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: CjMapope on January 20, 2017, 12:44:50 AM
You want to do an ico to raise money to rob people of their btc, do I understand this correctly?

ya haha its kinda hard to say WHAT they even need money for ;p

i am down for "Proof of Attack - Earn REC for only attempting to recover Bitcoin addresses"  -- but i still dont see why they will need funding to setup a server for people like at vanitypool where stuff can be posted for people to crack at. seems like that could be done out of pocket, maybe add a 1% fee to the "EDSCA Pool".
course on that note, we already have an open non profit at http://lbc.cryptoguru.org:5000/about that is as i understand it basically an "EDSCA Pool"  (tho not set up for incentives as this maybe could be)

idk, time will tell ;p


But they want to do more then attempt, they want to clean the address out. Correct?

the LBC collider? ya the funds will be claimed, AFAIK, yes. We only work on the "puzzle transaction" there tho, not a free market or service, like this could be

You want to do an ico to raise money to rob people of their btc, do I understand this correctly?

ya haha its kinda hard to say WHAT they even need money for ;p

i am down for "Proof of Attack - Earn REC for only attempting to recover Bitcoin addresses"  -- but i still dont see why they will need funding to setup a server for people like at vanitypool where stuff can be posted for people to crack at. seems like that could be done out of pocket, maybe add a 1% fee to the "EDSCA Pool".
course on that note, we already have an open non profit at http://lbc.cryptoguru.org:5000/about that is as i understand it basically an "EDSCA Pool"  (tho not set up for incentives as this maybe could be)

idk, time will tell ;p


1. We don't need the funds.
2. This pool you've shown is not decentralized, and it is not a cryptocurrency.

ya its not decentralized nor a cryptocurrency, true.

You want to do an ico to raise money to rob people of their btc, do I understand this correctly?

Wrong.

So then why?

my guess is they just want some financial comp for their idea and setting it up (what it seems like). Unfortunately most wont pay for an IDEA, but the service they might

Actually we would prefer to have no funds raised, and to start the blockchain in a completely neutral state.


ooo, now THAT i like! :D truth be told a good service, even just one thats fun for a while that EVERYONE can participate in some way, MAKES money, so there is not always need to raise funds, a good service like this could definitally end up profitable if you manage it right like Nicehash but for bruteforcing BTC addys, and maybe even other algos offered in future? :)


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: litecoinricky on January 20, 2017, 12:54:51 AM
I like the sound of this, cant wait to mine some  ;D


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: bitalchemists on January 20, 2017, 01:04:53 AM
Is there a mining method other than Amazon EC2 F1?

CPU, GPU, FPGA or ASIC


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: MirkoIta on January 20, 2017, 09:38:15 AM
These are my favourite ICOs. Send me money to this bitcoin address and I send you back some shitcoins X1000. Is Lino Marshall the trusted escrow which owns the BTC address?


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: Bitdonator on January 20, 2017, 09:39:16 AM
You are totaly wrong if you think that BTC from first 100,000
blocks are "abandoned"   :)


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: YourMom420 on January 20, 2017, 03:48:50 PM
I'm ready to mine :)


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: CjMapope on January 20, 2017, 04:06:07 PM
These are my favourite ICOs. Send me money to this bitcoin address and I send you back some shitcoins X1000. Is Lino Marshall the trusted escrow which owns the BTC address?

haha, ya for me ill be participating with what i have in hardware, once it hits exchange if it still looks good by then ill be buying in some maybe ;p

theres just a bit too much, "give me money" nowadays, better to own hardware to mine and take your risk there ;p

You are totaly wrong if you think that BTC from first 100,000
blocks are "abandoned"   :)

oo, you have peaked my interest, now im looking deeper into that haha, thx! :D 
it stands to reason some of those addresses could be early believers that are in "ultimate HODL-Mode"


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: dolores13 on January 20, 2017, 04:10:54 PM
Proof of Robbery POR

proof of attack, rob money from ppls, Instead of that why not use your high programming skills to make new unique coin from scratch with new algo, maybe this coin will be the next zerocash, dash, eth , monero.......
Sad to see some gifted persons waste their skills in nosense things.


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: HmmMAA on January 20, 2017, 05:56:56 PM
Recoverycoin hits one of Satoshi's account , he gets furious , dumps all his coins till zero value and everyone's happy . Science fiction scenario , i should write a script about that .


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: Sourgummies on January 20, 2017, 08:49:42 PM
Proof of Robbery POR

proof of attack, rob money from ppls, Instead of that why not use your high programming skills to make new unique coin from scratch with new algo, maybe this coin will be the next zerocash, dash, eth , monero.......
Sad to see some gifted persons waste their skills in nosense things.

I like that! POR!

This dev wants to rob everyone. ICO participants, early miners, early holders. Fuck him.

Anyone who supports this scam on top of a robbery is filth.


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: logictense on January 20, 2017, 09:37:48 PM
These are my favourite ICOs. Send me money to this bitcoin address and I send you back some shitcoins X1000. Is Lino Marshall the trusted escrow which owns the BTC address?

See the name? Recovery means the dude is looking to recover from loss on a dumb trade and may need money to settle down. Its clearer than ever that he came up with this name after holding a thought about possible recovery from predicament.


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: bitalchemists on January 21, 2017, 12:26:36 AM
Dear everyone,
Since this is an opensource project, and after reading your comments we have decided to change the direction a little bit.
The targets will not be the full Bitcoin public keys, but only their 8 leftmost bytes. So nothing will be robbed.
RecoveryCoin will have its value from indicating the strength of Bitcoin's keys against the potential network power, with probabilistic calculations.
Thank you very much for replying to this thread, however harshly.   :-*


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: Sourgummies on January 21, 2017, 01:39:28 AM
Dear everyone,
Since this is an opensource project, and after reading your comments we have decided to change the direction a little bit.
The targets will not be e full Bitcoin public keys, but only their 8 leftmost bytes. So nothing will be robbed.
RecoveryCoin will have its value from indicating the strength of Bitcoin's keys against the potential network power, with probabilistic calculations.
Thank you very much for replying to this thread, however harshly.   :-*

Then what's the point. I don't get why you would want the first 8 bytes? What can you do with that?


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: bitalchemists on January 21, 2017, 01:41:52 AM
Dear everyone,
Since this is an opensource project, and after reading your comments we have decided to change the direction a little bit.
The targets will not be e full Bitcoin public keys, but only their 8 leftmost bytes. So nothing will be robbed.
RecoveryCoin will have its value from indicating the strength of Bitcoin's keys against the potential network power, with probabilistic calculations.
Thank you very much for replying to this thread, however harshly.   :-*

Then what's the point. I don't get why you would want the first 8 bytes? What can you do with that?

You can measure how probable it is to crack a Bitcoin address. This is similar to "shares" in pooled mining.


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: Sourgummies on January 21, 2017, 01:48:10 AM
Dear everyone,
Since this is an opensource project, and after reading your comments we have decided to change the direction a little bit.
The targets will not be e full Bitcoin public keys, but only their 8 leftmost bytes. So nothing will be robbed.
RecoveryCoin will have its value from indicating the strength of Bitcoin's keys against the potential network power, with probabilistic calculations.
Thank you very much for replying to this thread, however harshly.   :-*

Then what's the point. I don't get why you would want the first 8 bytes? What can you do with that?

You can measure how probable it is to crack a Bitcoin address. This is similar to "shares" in pooled mining.

But how does that make money for you or anyone else unless you take the btc in the address.


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: bitalchemists on January 21, 2017, 01:53:41 AM
Dear everyone,
Since this is an opensource project, and after reading your comments we have decided to change the direction a little bit.
The targets will not be e full Bitcoin public keys, but only their 8 leftmost bytes. So nothing will be robbed.
RecoveryCoin will have its value from indicating the strength of Bitcoin's keys against the potential network power, with probabilistic calculations.
Thank you very much for replying to this thread, however harshly.   :-*

Then what's the point. I don't get why you would want the first 8 bytes? What can you do with that?

You can measure how probable it is to crack a Bitcoin address. This is similar to "shares" in pooled mining.

But how does that make money for you or anyone else unless you take the btc in the address.

You serve the Bitcoin community by telling them when they have to switch to a bigger key size. So without RecoveryCoin, BTC holders might be at risk some day.


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: CjMapope on January 21, 2017, 02:01:14 AM
Dear everyone,
Since this is an opensource project, and after reading your comments we have decided to change the direction a little bit.
The targets will not be the full Bitcoin public keys, but only their 8 leftmost bytes. So nothing will be robbed.
RecoveryCoin will have its value from indicating the strength of Bitcoin's keys against the potential network power, with probabilistic calculations.
Thank you very much for replying to this thread, however harshly.   :-*

well thats a bit better, im coming to realize this might be interesting in my head, as i also take part in the LBC,  but on paper (and to other people)  probably really is a terrible idea :/

i await seeing how this evolves


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: MostlyGhostly on January 21, 2017, 02:02:43 AM
Dear everyone,
Since this is an opensource project, and after reading your comments we have decided to change the direction a little bit.
The targets will not be e full Bitcoin public keys, but only their 8 leftmost bytes. So nothing will be robbed.
RecoveryCoin will have its value from indicating the strength of Bitcoin's keys against the potential network power, with probabilistic calculations.
Thank you very much for replying to this thread, however harshly.   :-*

Then what's the point. I don't get why you would want the first 8 bytes? What can you do with that?

You can measure how probable it is to crack a Bitcoin address. This is similar to "shares" in pooled mining.

But how does that make money for you or anyone else unless you take the btc in the address.

Big changes are coming and Im prepared fro them. U will invest 300 million dollars in ecdsa attacks and will be rewarded with a small payment coming from a private key retrieved from btc address u control, but don't hope to see more payments coming in because the sending address will be vanished by greedy sharks and brave scavengers.


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: bitalchemists on January 21, 2017, 02:08:36 AM
Dear everyone,
Since this is an opensource project, and after reading your comments we have decided to change the direction a little bit.
The targets will not be e full Bitcoin public keys, but only their 8 leftmost bytes. So nothing will be robbed.
RecoveryCoin will have its value from indicating the strength of Bitcoin's keys against the potential network power, with probabilistic calculations.
Thank you very much for replying to this thread, however harshly.   :-*

Then what's the point. I don't get why you would want the first 8 bytes? What can you do with that?

You can measure how probable it is to crack a Bitcoin address. This is similar to "shares" in pooled mining.

But how does that make money for you or anyone else unless you take the btc in the address.

Big changes are coming and Im prepared fro them. U will invest 300 million dollars in ecdsa attacks and will be rewarded with a small payment coming from a private key retrieved from btc address u control, but don't hope to see more payments coming in because the sending address will be vanished by greedy sharks and brave scavengers.

Rubbish.


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: Sourgummies on January 21, 2017, 02:13:46 AM
Dear everyone,
Since this is an opensource project, and after reading your comments we have decided to change the direction a little bit.
The targets will not be e full Bitcoin public keys, but only their 8 leftmost bytes. So nothing will be robbed.
RecoveryCoin will have its value from indicating the strength of Bitcoin's keys against the potential network power, with probabilistic calculations.
Thank you very much for replying to this thread, however harshly.   :-*

Then what's the point. I don't get why you would want the first 8 bytes? What can you do with that?

You can measure how probable it is to crack a Bitcoin address. This is similar to "shares" in pooled mining.

But how does that make money for you or anyone else unless you take the btc in the address.

You serve the Bitcoin community by telling them when they have to switch to a bigger key size. So without RecoveryCoin, BTC holders might be at risk some day.

Still not following. Spell it out for me please.


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: bitalchemists on January 21, 2017, 02:19:49 AM
Dear everyone,
Since this is an opensource project, and after reading your comments we have decided to change the direction a little bit.
The targets will not be e full Bitcoin public keys, but only their 8 leftmost bytes. So nothing will be robbed.
RecoveryCoin will have its value from indicating the strength of Bitcoin's keys against the potential network power, with probabilistic calculations.
Thank you very much for replying to this thread, however harshly.   :-*

Then what's the point. I don't get why you would want the first 8 bytes? What can you do with that?

You can measure how probable it is to crack a Bitcoin address. This is similar to "shares" in pooled mining.

But how does that make money for you or anyone else unless you take the btc in the address.

You serve the Bitcoin community by telling them when they have to switch to a bigger key size. So without RecoveryCoin, BTC holders might be at risk some day.

Still not following. Spell it out for me please.

Please be more specific.


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: Sourgummies on January 21, 2017, 02:42:32 AM
If you cant even explain what your doing and why your doing it and how it helps ect in more then a few sentences you don't deserve my time.

Good bye.


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: bitalchemists on January 21, 2017, 02:47:19 AM
If you cant even explain what your doing and why your doing it and how it helps ect in more then a few sentences you don't deserve my time.

Good bye.

An explanation was already given, assuming that you have general knowledge of cryptocurrency technology.


Title: Re: [PRE-ANN] RecoveryCoin - ECDSA-based cryptocurrency
Post by: menace.bit on January 22, 2017, 08:08:42 AM
Put this to good use to recover coins from ICO scams. Any recovered BTC should be donated to the foundation. ;D


Title: Re: [PRE-ANN] RecoveryCoin - ECDSA-based cryptocurrency
Post by: bitalchemists on January 23, 2017, 12:20:20 AM
Address generator and ECDSA hash demonstration now available on github: https://github.com/bit-alchemists/RecoveryCoin (https://github.com/bit-alchemists/RecoveryCoin)

For any help on how to build and run, or if you have any question about the code or the architecture please ask in this thread and you will be answered. Also we would appreciate your insights and comments. Why use PoW addresses? Harder to crack, saves space on the blockchain and keeps the coin away from mass trading. Also, while generating the address the targets may be hit (rewards are generated at transaction level and not at block level).


Title: Re: [PRE-ANN] RecoveryCoin - ECDSA-based cryptocurrency
Post by: adaseb on January 23, 2017, 12:48:11 AM
Its just not possible what you are trying to do.

To crack a private key with brute force will make millions of years even on Bitcoin ASICs.

This wont achieve anything except wasted electricity.


Title: Re: [PRE-ANN] RecoveryCoin - ECDSA-based cryptocurrency
Post by: bitalchemists on January 23, 2017, 01:14:48 AM
Its just not possible what you are trying to do.

To crack a private key with brute force will make millions of years even on Bitcoin ASICs.

This wont achieve anything except wasted electricity.

It's not the purpose of this coin, please read the website at www.recoverycoin.info and the whitepaper. Also, without incentive there's no effort.


Title: Re: [PRE-ANN] RecoveryCoin - ECDSA-based cryptocurrency
Post by: JariKriting on January 23, 2017, 02:14:09 AM
youre write
in launch coin and create coin is expected in September 2017.
but this now month january youre open ico selling, collect bitcoin investor and without escrow because coin still not ready


Title: Re: [PRE-ANN] RecoveryCoin - ECDSA-based cryptocurrency
Post by: bitalchemists on January 23, 2017, 02:22:48 AM
youre write
in launch coin and create coin is expected in September 2017.
but this now month january youre open ico selling, collect bitcoin investor and without escrow because coin still not ready

All smartass traders, including you are welcome to get off this thread at once.


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: Wolf Rainer on January 23, 2017, 02:52:35 AM
Any bounty available or to be announced? I would like to translate ann to spanish.


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: bitalchemists on January 23, 2017, 09:22:05 AM
Any bounty available or to be announced? I would like to translate ann to spanish.

Please private message.


Title: Re: [PRE-ANN] RecoveryCoin - ECDSA-based cryptocurrency
Post by: JimmyRecard on January 23, 2017, 09:53:53 AM
youre write
in launch coin and create coin is expected in September 2017.
but this now month january youre open ico selling, collect bitcoin investor and without escrow because coin still not ready

All smartass traders, including you are welcome to get off this thread at once.

You have another thing coming bitalchemists ;D or should I say Triswardhani, loljosh, mintodev, templar77, Carlos RT Ferguson, nite69, Thewolfofcrypto ;)

You ain't fooling anyone :D


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: mvl on January 23, 2017, 10:16:45 AM
BE CAREFUL PEOPLE, THERE ARE A LOT OF RED FLAGS HERE:

  • Anon dev
  • No Escrow
Promises things that are to good to be true: it walks and talks like a duck.
  • Github user is new and anon as well
  • Source code on Github is just C# and lacks a LOT
  • Source code on Github is C#, but OP mentions OSX and Linux as targets as well
  • This is dead wrong:
    Quote
    Deposit any amount in BTC to 19vVPuzXPBUiNdnr6KZwYP9rAtdtWkDjqi until 2017/03/01
    Get x150 to your parallel REC address
    (using the same private key of the BTC address you've sent from; funds will be hardcoded into the genesis block).
    Launch is expected in September 2017.
    Private keys are private keys. They should never be available for anyone but you. The person who has your private keys, controls your Bitcoin. So if the dev states that he uses your private keys to create REC coins in a "parallel" address, that alone should be enough to abandon this coin/project.

Keep your private keys safe. Make sure nobody gets your private keys. If someone is after your private keys, he is after your bitcoin!


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: bitalchemists on January 23, 2017, 10:45:47 AM
BE CAREFUL PEOPLE, THERE ARE A LOT OF RED FLAGS HERE:

  • Anon dev
  • No Escrow
Promises things that are to good to be true: it walks and talks like a duck.
  • Github user is new and anon as well
  • Source code on Github is just C# and lacks a LOT
  • Source code on Github is C#, but OP mentions OSX and Linux as targets as well
  • This is dead wrong:
    Quote
    Deposit any amount in BTC to 19vVPuzXPBUiNdnr6KZwYP9rAtdtWkDjqi until 2017/03/01
    Get x150 to your parallel REC address
    (using the same private key of the BTC address you've sent from; funds will be hardcoded into the genesis block).
    Launch is expected in September 2017.
    Private keys are private keys. They should never be available for anyone but you. The person who has your private keys, controls your Bitcoin. So if the dev states that he uses your private keys to create REC coins in a "parallel" address, that alone should be enough to abandon this coin/project.

Keep your private keys safe. Make sure nobody gets your private keys. If someone is after your private keys, he is after your bitcoin!


1. Satoshi nakamoto was anon dev
2. You can have anon escrow and still be legit
3. This is not the best proverb you could come up with
4. Everything has a starting point
5. What exactly is the code lacking in your opinion?
6. Have you ever heard about mono?
7. The private keys are just used to demonstrate the PoW address
8. You lack intelligence

Hope that answers...


Title: Re: [PRE-ANN] RecoveryCoin - ECDSA-based cryptocurrency
Post by: bitalchemists on January 23, 2017, 10:53:19 AM
youre write
in launch coin and create coin is expected in September 2017.
but this now month january youre open ico selling, collect bitcoin investor and without escrow because coin still not ready

All smartass traders, including you are welcome to get off this thread at once.

You have another thing coming bitalchemists ;D or should I say Triswardhani, loljosh, mintodev, templar77, Carlos RT Ferguson, nite69, Thewolfofcrypto ;)

You ain't fooling anyone :D

Unless you have proof to what you're saying, you should hurry up and get the hell out of this thread.


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: mvl on January 23, 2017, 11:06:26 AM
BE CAREFUL PEOPLE, THERE ARE A LOT OF RED FLAGS HERE:

  • Anon dev
  • No Escrow
Promises things that are to good to be true: it walks and talks like a duck.
  • Github user is new and anon as well
  • Source code on Github is just C# and lacks a LOT
  • Source code on Github is C#, but OP mentions OSX and Linux as targets as well
  • This is dead wrong:
    Quote
    Deposit any amount in BTC to 19vVPuzXPBUiNdnr6KZwYP9rAtdtWkDjqi until 2017/03/01
    Get x150 to your parallel REC address
    (using the same private key of the BTC address you've sent from; funds will be hardcoded into the genesis block).
    Launch is expected in September 2017.
    Private keys are private keys. They should never be available for anyone but you. The person who has your private keys, controls your Bitcoin. So if the dev states that he uses your private keys to create REC coins in a "parallel" address, that alone should be enough to abandon this coin/project.

Keep your private keys safe. Make sure nobody gets your private keys. If someone is after your private keys, he is after your bitcoin!


1. Satoshi nakamoto was anon dev
He did not beg for gifts or investments.
Quote
2. You can have anon escrow and still be legit
You don't have Escrow. There is a BTC address and the rest is a matter of trust. That is not Escrow.
Quote
3. This is not the best proverb you could come up with
4. Everything has a starting point
5. What exactly is the code lacking in your opinion?
6. Have you ever heard about mono
Yes, but the thing is you are asking for funds based on just promises
Quote
7. The private keys are just used to demonstrate the PoW address
Bullshit. In your OP you tell people that they get REC coins in some sort of "parallel" address using the private keys of the Bitcoin addresses they used for sending. Literally. It is in the OP. Your own words.

Quote
8. You lack intelligence
Usually, people get personal only when they don't have real arguments, because real arguments are much stronger. Your personal attack is therefore a sign of weakness, and another indication that this project cannot be trusted.


Title: Re: [PRE-ANN] RecoveryCoin - ECDSA-based cryptocurrency
Post by: JimmyRecard on January 23, 2017, 11:14:30 AM
youre write
in launch coin and create coin is expected in September 2017.
but this now month january youre open ico selling, collect bitcoin investor and without escrow because coin still not ready

All smartass traders, including you are welcome to get off this thread at once.

You have another thing coming bitalchemists ;D or should I say Triswardhani, loljosh, mintodev, templar77, Carlos RT Ferguson, nite69, Thewolfofcrypto ;)

You ain't fooling anyone :D

Unless you have proof to what you're saying, you should hurry up and get the hell out of this thread.

Yeah keep dreaming sonny Jim, I have proof your an asshole :D


8. You lack intelligence


Plus the fact that your English grammar when typing is very much the same if not word for word as all your other alts... fuck dude and you even said this...


3. This is not the best proverb you could come up with

Hope that answers...

Look how you ended it and you are having a sook about nouns, adjectives & proverbs ::)

Want to rub me again ? I don't grant you wishes though ;) ;D


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: care2yak on January 23, 2017, 11:17:10 AM

7. The private keys are just used to demonstrate the PoW address


Private keys shouldn't just be given away casually. Asking for private keys raises red flags so thank heavens for people on the forum that can discern when something appears scammy.

There are people on this forum who - out of their good heart  ;D - make it their purpose to expose scams/scammers, so while they do their investigation and point out some questionable portions of the announcement, it would be best to show proof that the one being accused isn't a fraud  ;)


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: bitalchemists on January 23, 2017, 11:19:38 AM

7. The private keys are just used to demonstrate the PoW address


Private keys shouldn't just be given away casually. Asking for private keys raises red flags so thank heavens for people on the forum that can discern when something appears scammy.

There are people on this forum who - out of their good heart  ;D - make it their purpose to expose scams/scammers, so while they do their investigation and point out some questionable portions of the announcement, it would be best to show proof that the one being accused isn't a fraud  ;)

Who asked for anyone's private keys? Do you people know how to read or you are just trolling around threads?


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: JimmyRecard on January 23, 2017, 11:21:31 AM

7. The private keys are just used to demonstrate the PoW address


Private keys shouldn't just be given away casually. Asking for private keys raises red flags so thank heavens for people on the forum that can discern when something appears scammy.

There are people on this forum who - out of their good heart  ;D - make it their purpose to expose scams/scammers, so while they do their investigation and point out some questionable portions of the announcement, it would be best to show proof that the one being accused isn't a fraud  ;)

Who asked for anyone's private keys? Do you people know how to read or you are just trolling around threads?

So called "Devs" or "Developers" who use the word Troll are pretty much giving themselves away as a scammer, wouldn't you use a more technical term if you were Legitimate ? :D What kind of genuine start up company would treat its consumers like shit and expect them to stay part of it and have faith in you..... yeah 0 thats right, fucking dumbass ! :D


Title: Re: [PRE-ANN] RecoveryCoin - ECDSA-based cryptocurrency
Post by: rafajunior99 on January 23, 2017, 11:25:07 AM
This seems very nice and really helpful for all people who are stuck with the attacks that are not true. and I'm still waiting for it. ;D ;D


Title: Re: [PRE-ANN] RecoveryCoin - ECDSA-based cryptocurrency
Post by: care2yak on January 23, 2017, 11:26:39 AM
You're being childish. Why don't you just explain the beauty of your concept instead of getting all fiery wild about how I understood your statement about receiving REC. That's how I understood it. All you have to do is explain it so no one else will misinterpret it the way I did.


Title: Re: [PRE-ANN] RecoveryCoin - Generalized ECDSA attacks for Bitcoin key recovery
Post by: bitalchemists on January 23, 2017, 11:26:54 AM

7. The private keys are just used to demonstrate the PoW address


Private keys shouldn't just be given away casually. Asking for private keys raises red flags so thank heavens for people on the forum that can discern when something appears scammy.

There are people on this forum who - out of their good heart  ;D - make it their purpose to expose scams/scammers, so while they do their investigation and point out some questionable portions of the announcement, it would be best to show proof that the one being accused isn't a fraud  ;)

A good heart with too many smilies


Title: Re: [PRE-ANN] RecoveryCoin - ECDSA-based cryptocurrency
Post by: chris190 on January 23, 2017, 11:33:31 AM
how to mining?  ???


Title: Re: [PRE-ANN] RecoveryCoin - ECDSA-based cryptocurrency
Post by: MirkoIta on January 23, 2017, 11:37:01 AM
how to mining?  ???

You don't mine it you just have to send you bitcoins to the address given by the OP and you will be rich soon  ::)


Title: Re: [PRE-ANN] RecoveryCoin - ECDSA-based cryptocurrency
Post by: JimmyRecard on January 23, 2017, 11:40:21 AM
how to mining?  ???

You don't mine it you just have to send you bitcoins to the address given by the OP and you will be rich soon  ::)

After the dev uses your private keys that you send to him so he can create REC coins from them for you.....  ::) :D


Title: Re: [PRE-ANN] RecoveryCoin - ECDSA-based cryptocurrency
Post by: bitalchemists on January 23, 2017, 11:45:45 AM
You're being childish. Why don't you just explain the beauty of your concept instead of getting all fiery wild about how I understood your statement about receiving REC. That's how I understood it. All you have to do is explain it so no one else will misinterpret it the way I did.

You have all the information you need on the website, whitepaper and code. If you post any specific technical question, and it seems serious to us, you'll be answered.


Title: Re: [PRE-ANN] RecoveryCoin - ECDSA-based cryptocurrency
Post by: JimmyRecard on January 23, 2017, 12:02:01 PM
You're being childish. Why don't you just explain the beauty of your concept instead of getting all fiery wild about how I understood your statement about receiving REC. That's how I understood it. All you have to do is explain it so no one else will misinterpret it the way I did.

You have all the information you need on the website, whitepaper and code. If you post any specific technical question, and it seems serious to us, you'll be answered.

Did you really just use a comma before an and..... ?

Very Professional :D


Title: Re: [PRE-ANN] RecoveryCoin - ECDSA-based cryptocurrency
Post by: AmoreJaz on January 23, 2017, 12:06:55 PM
The idea is great and the concept even Greater! people should give this a shot if nothing else to advance their personal aptitude!
i am totally unsure if this will go far or not as i may not be the right person to ask !
But the idea could spin in many different ways and could be a gold mine if the devs keep a solid ground and are with serious intentions to developing this even further!
ATTA BOY!


Title: Re: [PRE-ANN] RecoveryCoin - ECDSA-based cryptocurrency
Post by: chris190 on January 23, 2017, 12:13:28 PM
how to mining?  ???

You don't mine it you just have to send you bitcoins to the address given by the OP and you will be rich soon  ::)


wow, then I become rich!  ;D


Title: Re: [PRE-ANN] RecoveryCoin - ECDSA-based cryptocurrency
Post by: mvl on January 23, 2017, 12:19:47 PM
You're being childish. Why don't you just explain the beauty of your concept instead of getting all fiery wild about how I understood your statement about receiving REC. That's how I understood it. All you have to do is explain it so no one else will misinterpret it the way I did.

You have all the information you need on the website, whitepaper and code. If you post any specific technical question, and it seems serious to us, you'll be answered.
Well it is not up to you to decide if we have all the information we need. That is up to your target audience.

But, let's go into a technical discussion, if that is what you want. I take this passage from your "whitepaper", which I would not really call a whitepaper, because it leaves out most of the details, and fails to connect the dots of information that are in it.

Quote
Addresses

Every account address is represented with 32 digits, and is created the following way:

1. A random private key is chosen
2. A point on the curve is calculated into a 64 byte array
3. The byte array is collapsed into a 16 byte array
4. A constant 16 byte array called “Network Bytes” is also added
5. If all bytes in the address are below 100, the address is valid and can be represented with digits only (32 digits for 16 bytes)

It takes some time to generate the address, yet it saves space on the chain and adds proof of work. While generating the address, the client may hit or recover one of the targets.
ad 1. What does the randomly generated private key look like? What are it's specifications?
ad 1. What does random mean in this case? What type/class of random generator are you using? Is it seeded, and if so: how?
ad 2. "A point on the curve is calculated into a 64 byte array". Many questions:
ad 2. What curve? what does a "point on the curve" mean? What point? what curve? What do you mean by "chosen" ? How does that work? Are there criteria to "choose" a point ?
ad 2. If you have 64 bytes, you have 64 bytes. An array is a representation of those bytes. What does that mean? How many elements are in your array? Is it associative or zero base indexed? How many bytes are used for the indices and how many bytes are for the data? The fact that the 64 bytes are an array implies that they are ordered. Why the ordering and how is the ordering preserved? Why the array representation? Sounds like bullshit to me but please prove me wrong.
ad 3. What do you mean by "collapsing a 64 byte array into a 16 byte array" ? Do you realise that if you reduce 64 bytes to 16 bytes, you are reducing entropy, thereby throwing away information? Lowering entropy is rarely a good idea in cryptographic systems. Please explain why this is a good idea in this case. Oh, and explain the "collapsing" algorithm.
ad 4. Why use 16 bytes for a constant? A constant is a constant. You are not using the 16 bytes entropy. Again: why is this a good idea? It does not add entropy nor information.
ad 4. What is the "Network Bytes" constant being used for? What is the purpose?
ad 5. Again lowering the entropy, by not using all bytes below '100' (assuming 100 in 10-base). Looks like you are throwing away all the advantages of high entropy in cryptographic systems, thereby making your system weaker with every step.

Please answer those questions, because they are a big big concern.


For the non-technical people: the "whitepaper" may seem to use some impressive words, but if you have a technical/cryptographical/software development background, it raises more questions than it answers. In fact, a number of sentences in the whitepaper are technical nonsense, and others are fundamentally wrong.


Title: Re: [PRE-ANN] RecoveryCoin - ECDSA-based cryptocurrency
Post by: bitalchemists on January 23, 2017, 12:33:42 PM
You're being childish. Why don't you just explain the beauty of your concept instead of getting all fiery wild about how I understood your statement about receiving REC. That's how I understood it. All you have to do is explain it so no one else will misinterpret it the way I did.

You have all the information you need on the website, whitepaper and code. If you post any specific technical question, and it seems serious to us, you'll be answered.
Well it is not up to you to decide if we have all the information we need. That is up to your target audience.

But, let's go into a technical discussion, if that is what you want. I take this passage from your "whitepaper", which I would not really call a whitepaper, because it leaves out most of the details, and fails to connect the dots of information that are in it.

Quote
Addresses

Every account address is represented with 32 digits, and is created the following way:

1. A random private key is chosen
2. A point on the curve is calculated into a 64 byte array
3. The byte array is collapsed into a 16 byte array
4. A constant 16 byte array called “Network Bytes” is also added
5. If all bytes in the address are below 100, the address is valid and can be represented with digits only (32 digits for 16 bytes)

It takes some time to generate the address, yet it saves space on the chain and adds proof of work. While generating the address, the client may hit or recover one of the targets.
ad 1. What does the randomly generated private key look like? What are it's specifications?
ad 1. What does random mean in this case? What type/class of random generator are you using? Is it seeded, and if so: how?
ad 2. "A point on the curve is calculated into a 64 byte array". Many questions:
ad 2. What curve? what does a "point on the curve" mean? What point? what curve? What do you mean by "chosen" ? How does that work? Are there criteria to "choose" a point ?
ad 2. If you have 64 bytes, you have 64 bytes. An array is a representation of those bytes. What does that mean? How many elements are in your array? Is it associative or zero base indexed? How many bytes are used for the indices and how many bytes are for the data? The fact that the 64 bytes are an array implies that they are ordered. Why the ordering and how is the ordering preserved? Why the array representation? Sounds like bullshit to me.
ad 3. What do you mean by "collapsing a 64 byte array into a 16 byte array" ? Do you realise that if you reduce 64 bytes to 16 bytes, you are reducing entropy, thereby throwing away information? Lowering entropy is rarely a good idea in cryptographic systems. Please explain why this is a good idea in this case. Oh, and explain the "collapsing" algorithm.
ad 4. Why use 16 bytes for a constant? A constant is a constant. You are not using the 16 bytes entropy. Again: why is this a good idea? It does not add entropy nor information.
ad 4. What is the "Network Bytes" constant being used for? What is the purpose?
ad 5. Again lowering the entropy, by not using all bytes below '100' (assuming 100 in 10-base). Looks like you are throwing away all the advantages of high entropy in cryptographic systems, thereby making your system weaker with every step.

Please answer those questions, because they are a big big concern.



Thank you for your interest in the internals of our technology. Right now, we are talking about generating an address:

1. Private keys are 32 byte, randomly generated by a secure random class, same as bitcoin.
2. The ECDSA curve used here is sepc256k1.
3. The 64 byte point is the curve's generator multiplied n times (where n=private key). Then you have 32 bytes for the X coordinate and 32 for the Y.
4. These 64 bytes are split into 4 chunks of 16 bytes, where each position is added up modulo 256, resulting in 16 bytes.
5. Network bytes are used to identify the network (testnet/mainnet/other) and to validate the address (instead of checksum). The network bytes are also added up modulo 256.
6. If all 16 bytes are below 100, then it's a valid address. This does not reduce entropy of the private key generator, it's not even related to that. If you check it, it makes it difficult to generate the address therefore making it difficult to brute-force attack it.

Hope that helps.