Bitcoin Forum
May 09, 2024, 06:27:40 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: How did the Chinese crack SHA?  (Read 70 times)
PrimeHunter2023 (OP)
Newbie
*
Offline Offline

Activity: 20
Merit: 0


View Profile
June 18, 2023, 09:19:59 PM
 #1

Word seems to be filtering out that so called 'secure hashing algorithms' are all broken, and China has joined the U.S. in the very short list of countries with the ability.

How did they do it?

Only thing known for sure is that it has to do with the fact that the complexity of patterns an algorithm produces  progresses slower than the complexity of the algorithm. So in relation to hashing algorithms that means that you can take a large number of products of the algorithm e.g. public addresses, and find the pattern fairly easily, then backtrack to the private keys.

Anybody have more info?
There are several different types of Bitcoin clients. The most secure are full nodes like Bitcoin Core, but full nodes are more resource-heavy, and they must do a lengthy initial syncing process. As a result, lightweight clients with somewhat less security are commonly used.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715236060
Hero Member
*
Offline Offline

Posts: 1715236060

View Profile Personal Message (Offline)

Ignore
1715236060
Reply with quote  #2

1715236060
Report to moderator
1715236060
Hero Member
*
Offline Offline

Posts: 1715236060

View Profile Personal Message (Offline)

Ignore
1715236060
Reply with quote  #2

1715236060
Report to moderator
odolvlobo
Legendary
*
Offline Offline

Activity: 4298
Merit: 3214



View Profile
June 20, 2023, 08:54:57 PM
 #2

Word seems to be filtering out that so called 'secure hashing algorithms' are all broken, and China has joined the U.S. in the very short list of countries with the ability.

If you are referring to SHA-1, it was cracked many years ago (Announcing the first SHA1 collision). I haven't seen information about any others.

Why don't you start by providing the source of your information?

Join an anti-signature campaign: Click ignore on the members of signature campaigns.
PGP Fingerprint: 6B6BC26599EC24EF7E29A405EAF050539D0B2925 Signing address: 13GAVJo8YaAuenj6keiEykwxWUZ7jMoSLt
Ucy
Sr. Member
****
Offline Offline

Activity: 2576
Merit: 402


View Profile
June 21, 2023, 08:59:56 AM
 #3

Private keys, passwords, etc are as secured as the laws that protect them and how responsible or morally upright the owners are.
China or US can't do anything bad about the security without consequences unless the owners rights are nolonger enforceable because of doing something wrong that leaves their security vulnerable.

eXPHorizon
Full Member
***
Offline Offline

Activity: 1176
Merit: 132


Precision Beats Power and Timing Beats Speed.


View Profile
June 21, 2023, 09:17:53 AM
 #4

bljatcoin is cracked already u just do not know it yet

A Leader does not watch on safely from the rear.
JohannesX
Newbie
*
Offline Offline

Activity: 5
Merit: 9


View Profile
June 21, 2023, 05:23:10 PM
 #5

How did they do it?
Maybe they use better techniques for hunting primes?  Wink
PrimeHunter2023 (OP)
Newbie
*
Offline Offline

Activity: 20
Merit: 0


View Profile
February 21, 2024, 12:49:28 PM
Last edit: February 21, 2024, 03:41:09 PM by PrimeHunter2023
 #6

How did they do it?
Maybe they use better techniques for hunting primes?  Wink

An interesting post that you link to.

Not interesting because it refines the truth, but interesting because it elaborates the mistake of trusting public key cryptography.

Your 'prime' paradigm consists of vectors, or whatever, with 24 or however many sections. That starts with an underlying understanding which precludes understanding why pkc can never be secure.

"Math" is a science, and like all academic sciences it does not reflect nature directly, but rather several steps removed. There is "something", then there is "something a person understands" etc etc etc and eventually there is a science as a group project.

So "primes" cannot be organized in a way that reflects something that is derived from them, as your post suggests. You cannot give a person an orange and say "I bought a hundred gallons of orange juice and managed to build this orange out of it".

So the initial point about pkc is that there are two competing variables.

There is "any" algorithm, then there is the product of that algorithm.

If there is a gross discrepancy such that patterns in the product of the algorithm e.g. bitcoin address, advances at a much slower pace than the complexity of the algorithms then you cannot create what people call 'secure' pkc. Because you can find patterns in the product i.e., 'bitcoin addresses' for example that are computationally inexpensive compared to the 'initial' algorithm. Maybe why ltc is computationally heavier than btc.

It doesn't seem to be a big secret, but it also is not something discussed publicly, for reasons that are probably not what most 'insiders' would be comfortable admitting.

PKC is a massive globalist fraud which is designed to profit the individuals who have power in the melting pot.

As long as they can keep the discrepancy between algorithm/product patterns hidden they can maintain control over the trillions of dollars controlled by the pkc scam.

They do this in part simply by preventing access to computers powerful enough to let people demonstrate the discrepancy in 'secure' algorithms.

Anybody can demonstrate it using simple algorithms.

~

Edit to add

Here is a crude analogy of what pkc is.

Imagine a group of guys from one tribe that stumbles on another weaker tribe and finds a vulnerability that allows them to commit crimes against the weaker tribe.

Every so often somebody figures out that it is simply an ongoing criminal enterprise, but the initial gang has had such power, for so long, that they have been able to force cognitive tricks on anybody who discovers the ruse.

So a person typically
1) Sees the vulnerable group
2) Profits from abusing them
3) Then is auto indoctrinated that the abuse is under guise of doing some good deed
4) Continues abusing and profiting while using their abilities to perpetuate the crime
etc etc

A small group of people has extracted massive benefit from weaker tribes for decades under the pkc ruse.

As things are developing it looks like the biggest profiteer, the UK, is trying to dump the bill on some of the late joiners, hence things like the spate of Pegasus exposes.

It also raises the question of ltc's origin and forces a person to ask when the Chinese realized what the Brits were doing...........and whether they then decided to join the crime spree.

China has lots of prisoners it does not want to lose, exactly as the Brits. Tibetans, Uyghurs etc.

~

edit to add 2

If your view is accurate

How did they do it?
Maybe they use better techniques for hunting primes?  Wink

Then it means prime numbers are subordinate in some way to composite numbers and it would cause extreme problems among mathematics students around the world.





Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!