secp256k1 as RSA so something must be used from failed attempts on RSA that helps the
attacker to zoom in on the key.
Anyone who knows anything about microsoft know they are CIA/NSA/MOSSOD and when you generate keys pairs
you run this code
Quote
RSACryptoServiceProvider rsa = new RSACryptoServiceProvider(512); // Key bits length
rsa.PersistKeyInCsp = false;
rsa.PersistKeyInCsp = false;
By default the keys get saved unless you remember to add the second line of code I am told by just now
on my version or Dot.Net it is defaulted to false so maybe they keep flipping it.
RSA and BigInt's were made for each other so it's easy to write you own encrypt/decrypt functions
but I never trust microsoft and would feel safer if i knew how to generate my own key pair so that
RSACryptoServiceProvider could be placed in the bin
secp256k1 =lots of code
RSA = Blackbox and you don't know whats in the box