it costs just 6 billion to destryo bitcoin with a 51% attack
Source for the 6 billion ? Additionally one can not 'destroy' bitcoin by maintaining 51% of the hashrate for a short timespan. this is something a commited developed country easily could affort,
Or they could just easily ban the posession/usage/trading of cryptocurrencies. Would cost them way less. Additionally it would need a hardware manufacturer to produce all the ASIC's needed to obtain such a big % of the hashrate. however if there is an intelligent businesman who lends a ton of money to create this haspower as some form of cyberweapon of a state, this could truly exist.
If this businessman were 'intelligent', he wouldn't 'invest' in tons of mining hardware just to NOT MAKE PROFIT with it. If you own enough ASICS to have a big % of the total hashrate, you earn WAY MORE when simply mining. and what makes it worse this cyber weapon would then be able to eat more and more as each destroyed cryptocurrency would make the attacker even richer, which he can invest to have even more hashpower
Thats not how it works. ASIC's do only work for ONE algorithm. After 'destroying' bitcoin, the whole hardware would be useless and worth almost nothing anymore. This doesn't make the attacker richer.. an attacker would effectively throw money away. Please stop posting misleading information. All of your 'facts' are simply wrong and illogical.
|
|
|
I tried it at the bit address page online it says my private key is invalid. I tried downloading the bitaddress page offline but I'm getting jscript error
The error message was..."The private key entered is not a valid private key".
Obviously this error is only due to the wrong private key. I'd highly suggest you are going to use the downloaded version of the site. Preferably on an offline PC. While it does not necessarly lead to a loss of your funds when you enter your private key on the online version, it makes it way more probable that it is going to happen. But there is one thing weird though, the private key is a mixture of letters and numbers except the alphabets are all capital, that should not be the case right?
If only one of your private keys does have capitals only, it might be a coincidence. But if all do have capitals only, something weird happened. A small bruteforce script (like suggested by HCP) would be the easiest/fastest way to access your funds.
|
|
|
I have a whole list of private keys, i only tried one with a small balance, it tells me the private key is invalid. yes I used the same browser.
Please answer the questions. I do not ask them out of curiosity. How much characters does your private key have? And what does it start with? 5.., L.., K.. ?
What kind of error do you get?
|
|
|
I tried it at the bit address page online it says my private key is invalid. I really don't know what to do.
You should NEVER paste your private key into a website. You may have exposed your private key now. After you have accessed your funds, consider this private key as compromised. How much characters does your private key have? And what does it start with? 5.., L.., K.. ? I tried downloading the bitaddress page offline but I'm getting jscript error, by the way you're a mixer, interesting.
Did you open it with the same browser as when accessing it online? What kind of error do you get?
|
|
|
Thanks. So how can I make that script? Is it shell programming? If then, what is the code that run command line execution inside shell script? I want to see exact code example.
You seem to ask a lot of basic questions. HCP already gave you pseudo code with your logic, you can work with. If we would give you an further 'example', it already would be the whole code. Thats literally less than 10 lines of code.. Without offending you.. but if you can't create such a small script (and can't find anything on google), you probaly shouldn't work on a crypto project. Please do yourself a favor and do NOT create/host a crypto site/project/exchange/.. Your application will definitely be vulnerable. You are inviting black hats into stealing your funds..
|
|
|
Total number of possible privatekeys is 2^256 or in base 10 it would be 10^77.
Im not quite sure but doesnt every address have only 1 private key? The number of possible private keys is indeed 2^256 (A private key is a 256 bit random number). But there are 2^160 addresses possible (An address is the RIPEMD-160 hash of a SHA256 hash of the public key -> 160 bit long). There are 2^96 private keys which match one address ON AVERAGE. This is simply due to the fact that the input dictionary (256 bit) is bigger than the output dictionary (160 bit). Note that this does NOT impose any security risks.
|
|
|
hey thanks i tried it, apparently my private seems to have issues with it, but my public uncompressed key is correct, is there a way to get a confirmed private key?
It doesn't work like that. You can't get the private key out of an address. What exactly are you trying to accomplish? Xynerise already gave you an answer. You need to enter your private key (first download the site and run it offline). Then you will get an compressed and uncompressed key. What exactly isn't working properly?
|
|
|
Is it possible to have the same public and private key pair that got generated by the algorithm ? How is the algorithm generating public and private keys..
Theoreticaly, yes it is possible. But practically, it is not possible because the chances are almost zero. You could use the whole energy available on earth and wouldn't generate a private key which already has been generated. In fact you would have created < 1% of all possible private keys. Private keys are not generated by any algorithm. A private key is just a 256 bit random number. The public key is then calculated through multiplication on the eliptic curve (in bitcoins case: secp256k1). The address is then derived by calculating the hash: RIPEMD-160(SHA256(public_key)).
|
|
|
The lightning network is about to solve the scalability 'problem' of bitcoin. You will be able to open a bi-directional channel with someone by funding it (through a 'standard' transaction). Inside this channel you will be able to pay someone which is connected to your channel through other channels. If there is a route to your destination, you will be able to pay instantly (almost zero fees, no confirmation times). This balance basically remains in your channel until you decide to close it. At the moment of closure another on-chain-transaction is being made, crediting you the funds. I'd suggest you read this: https://cointelegraph.com/explained/lightning-network-explained. It explains the lightning network pretty decently.
|
|
|
7 safest wallet for cryptocurrency ... Coinbase – Hot Wallet. MyEtherWallet – Paper Wallet. ...
Don't consider 'coinbase' as a secure/safe wallet. Coinbase is a company which does offer an exchange. They do provide a service where they are in charge of your bitcoins, allowing you to withdraw them. But this is NOT a proper wallet, since you don't have access to your private keys, effectively NOT owning any bitcoins. MyEtherWallet on the other hand is not a paper wallet. It is an interface which does allow to create paper wallets. But the majority of people are using it as a software wallet. This shouldn't be considered as a safe/secure wallet either. Both are pretty vulnerable and should not hold amounts which you can't afford to lose.
|
|
|
The whole cryptocurrency economy is being built on top of bitcoin.
Bitcoin is the most secured and most tested cryptocurrency.
If a heavy security breach were going to happen which would eliminate all the trust into bitcoins protocol, the whole ecosystem would die. Everyone would sell/dump all alts to further dump BTC. This would result in a black crypto friday.
Thats also probably the only way bitcoin would effectively 'die'.
The whole success of all crypto projects rely on bitcoin to be successful. So, short answer: No. The whole crypto community would suffer bad if bitcoin were about to 'die'.
|
|
|
I am curious how the Bitcoin network handles alternative clients to Bitcoin Core? My question is how are they compatible with the rest of the network?
If the clients do follow the network rules, they are 'compatible'. You can connect to the bitcoin network with whatever client you want. Is there a practice among larger participants, like mining pools for instance to use alternative implementations for their own means?
That is definitely imaginable. Bigger exchanges mostly do use their own implementation too. How do we know that an alternative implementation is not malicious? All in all I could summarize the question as: Are alternative clients a security threat?
Alternative clients are NOT a security threat. If you want to use an alternative client, make sure it is open source and audited. The network itself doesn't care with which client you are connecting.
|
|
|
Otherwise bitcoin cash is not yet accepted by the mycelium as of today but still looking forward that it will happen.
Actually bcash is available in mycelium. With their last update they have reorganized their structure and created so-called 'modules'. According to them there will be differend modules for different currencies available. The first released module is the bcash module.
|
|
|
This does NOT mean that one can create 'infinite identities'.
sure I can create infinite addresses every address is a different permissionless identity The fact that you can create a large amount of addresses doesn't mean that this is the definition of anonymous. Monero on the other hand is anonymous. You can also create as much addresses as you wish (like in bitcoin), but the transactions itself are not visible to everyone. Withou an attack on the network, monero is anonymous. Since you can't link a transaction to a public key / identity.
monero is pointless too. you can not obfucate to hide, it is simply stupid. It is like trusting WEP can protect your wireless link ever, or md5 will never be collided. It is wrong history have shown us. You don't know which secret technology someone other have. You don't know if tomorrow someone discover how to crack elliptic curves. Thats not comparable. WEP had a bad design. Noone thought that there won't be a MD5 collision ever.. Collisions are going to happen. Thats almost certain. There is no way a collision can't happen when the input size > output size. It also seems you don't have a clue how monero actually works. Despite of any 'secret technology', one can surely know that somone will NOT 'discover' how to 'crack' ECC tomorrow.
|
|
|
So effectively, if another node where to mine a block before you broadcast your own (ie come back online), then your own would be orphaned?
Not necessarly. This depends on the next block. If this block is going to be built ontop of your block, the block from the 'other' node will get orphaned. If the next block is going to be built ontop of the 'others' node block, yours will be orphaned. Why does the protocol not just ignore it?
What should the protocol ignore? The protocol is designed to follow the 'biggest' Proof-of-Work created. This is necessary.
|
|
|
But we all know cryptocurrencies and blockchain are decentralised by nature, so the whole concept of centralised cryptocurrency would be contradicting.
Cryptocurrencies are not decentralised by nature. 'Cryptocurrency' just refers to a currency with cryptographical technology underneath. Neither is 'blockchain' decentralised by nature. It is just a data structrue. Comparable to a linked list. It is the usage of the blockchain which does (or does not) make it decentralised. Look at ripple, for example. Thats very far away from decentralised.
|
|
|
Any transaction has to match an address perfectly so the chance of guessing one is damned near impossible. They represent a digital signature, that is why they are random and none of them are the same Neither a transaction nor an address does 'represent' a digital signature. A transaction is being signed with the private key(s) which belong(s) to the public key(s) of the UTXO(s). The signature is then being verified with the public key. Neither of them are 'random'. A transaction hash and an address do look random because they are an output of a hash function.
|
|
|
It might be worthy to add that 'only' using TOR doesn't obscure everything enough to never be found/tracked. While using the TOR browser does help a lot, the privacy also highly depends on the user. Can someone please tell me why bitcoin mixers seem typically seem to have both a darknet and clearnet address? Maybe I'm missing something obvious, but just now I can't imagine what the point is.
The whole point is privacy. Thats also the same reason why some mixing services (eg. ChipMixer) do offer a non-java script mixing service. Reducing the graphical animation, increasing the privacy.
|
|
|
|