Well, whenever you sign a message/transaction/block you have to pick some random k value. If you ever pick k twice the same, people can recover your private key, so you are advised to pick it completely randomly. In this example k was picked to be 908.
Yeah, I'm fully aware of the meaning of
k and why you need to pick it at random. My concern is that you are setting yourself up for a repeat. Do you remember
that time when you wrote a shitty not-so-random key generator, and then wrote a program that "found" your shitty weak keys?
If you use a shitty not-so-random
k generator, and then you exploit your shitty
ks, no one gives a fuck because you are exploiting your own lousy programming, not the software people are using, and not the math it is based on.
I could be wrong about that, of course. Your latest scam might not depend on using shitty
k values. It is also entirely possible that you don't understand that message signing is done on hashes instead of integers. Or, you may have "discovered" the property of key-recovery that gmaxwell mentioned earlier.