Bitcoin Forum
November 05, 2025, 11:45:52 AM *
News: Pumpkin carving contest
 
   Home   Help Search Login Register More  
Poll
Question: Do issues related to predictable key generation still exist today?
Yes, predictable key generation issues still exist. Let's find it. - 1 (50%)
No, modern key generation methods are all safe. - 1 (50%)
Total Voters: 2

Pages: [1]
  Print  
Author Topic: Searching for Weak Bitcoin Keys and Low-Entropy Addresses  (Read 342 times)
Plogan (OP)
Newbie
*
Offline Offline

Activity: 4
Merit: 2


View Profile
April 21, 2025, 05:18:45 PM
Last edit: April 21, 2025, 05:41:49 PM by Plogan
Merited by satscraper (1)
 #1


Hello everyone!

I recently came across a fascinating (but mostly forgotten) topic on: https://bitcointalk.org/index.php?topic=2488493.75;wap, discussing weak Bitcoin addresses — wallets generated using predictable or low-entropy methods. Although this issue was first noticed 5–10 years ago, I’ve found hints suggesting that some of these addresses are still being used for fund transfers even in the past couple of years.

I am not a professional cryptographer or blockchain expert — just an enthusiast deeply interested in this subject. I would like to gather like-minded people to research, share ideas, and possibly discover new methods for detecting weak or predictably generated addresses.

Why This Matters

Historically, insiders or attackers have sometimes used predictable key generation methods (or perhaps partially exploited certain patterns or bugs) to stealthily steal funds. Even today, in 2025, I suspect that weak key vulnerabilities may still exist in Bitcoin and other cryptocurrencies.

Despite a few isolated discussions, there has been very little deep exploration into this topic. Most of the conversations ended after a few examples were found, but it’s very possible that the problem has simply evolved — with new predictable patterns that have yet to be studied or understood.

Known Methods of Predictable Key Generation:

Several fascinating examples already exist where public or semi-public data was used to derive private keys:

Using a Bitcoin block hash as a private key
Example: Genesis block hash → derived address.

SHA-256 of an existing Bitcoin address as a private key
Example: SHA256("1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa") → derived address.

Using a block's Merkle root as a private key
Example: Merkle root of block #229670 → derived address.

Using a transaction hash (txid) as a private key
Example: Specific txid → derived address.

Reusing Bitcoin block hashes for Ethereum wallets
Example: Bitcoin block #100 hash used as an Bitcoin private key.


My Hypotheses About Possible Use Cases:

1. Experiments by early crypto exchanges
(e.g., generating keys that could allow a password reset for users who lost access)

2. Insiders creating weak wallets intentionally for hidden BTC thefts

3. Exploitation of possible unknown patterns or bugs
(maybe even something deep in blockchain mechanics)


What I Propose

I would like to form a small research community focused on:

Analyzing historical and current blockchain data,

Developing hypotheses on new predictable generation patterns,

Studying entropy vulnerabilities,

Testing scanning methods (possibly I can using full nodes) to identify anomalies.


I have created a Telegram group to kickstart discussions:
https://t.me/WeakKeysLab

Final Thoughts

This is a massive challenge and might sometimes feel like chasing shadows — but even the chance of finding a single active low-entropy address is incredibly exciting. Furthermore, improving our understanding of such vulnerabilities can only strengthen the overall security of the crypto ecosystem.

If you have experience in:

Blockchain analysis,

Cryptography,

Entropy research,

Programming (especially for parsing large blockchain datasets),

or if you're simply curious and want to learn together, you are more than welcome to join!
ABCbits
Legendary
*
Offline Offline

Activity: 3416
Merit: 9321



View Profile
April 22, 2025, 09:43:59 AM
Merited by vapourminer (1)
 #2

Even today, in 2025, I suspect that weak key vulnerabilities may still exist in Bitcoin and other cryptocurrencies.

FWIW, the vulnerabilities actually lies on software used to generate Bitcoin/altcoin address where Bitcoin/non-centralized altcoin can't stop people from using address with bad security.

Most of the conversations ended after a few examples were found, but it’s very possible that the problem has simply evolved — with new predictable patterns that have yet to be studied or understood.

Isn't it mainly because of these reasons?
1. People may use entropy/data related with their life (e.g. book they like to read or their favorite musician).
2. Many weak RNG usually use few same data source (e.g. current date/time or process ID).

apogio
Legendary
*
Offline Offline

Activity: 966
Merit: 2188


Trêvoid █ No KYC-AML Crypto Swaps


View Profile WWW
April 22, 2025, 11:31:02 AM
Merited by vapourminer (1)
 #3

Isn't it mainly because of these reasons?
1. People may use entropy/data related with their life (e.g. book they like to read or their favorite musician).

Most of the time, the problems occur when people try to generate randomness with something that they can remember. It doesn't work this way. There is no true randomness, but generating entropy from things that you can memorise leads to the exact opposite thing than randomness. I guess we could say it leads to predictability  Tongue

hd49728
Legendary
*
Offline Offline

Activity: 2632
Merit: 1248



View Profile
April 22, 2025, 02:23:13 PM
Merited by vapourminer (1)
 #4

If you use a trusted wallet softwares for generating your wallet, and addresses offline, you don't have to concern about this issue too much.

J. Lopp has an article How Many Bitcoin Seed Phrases Are Only One Repeated Word?.

If you read his article, see his warnings, you won't use those cool but dangerous wallet mnemonic seeds with 12 or 24 repeated words.

.
 betpanda.io 
 
ANONYMOUS & INSTANT
.......ONLINE CASINO.......
▄███████████████████████▄
█████████████████████████
█████████████████████████
████████▀▀▀▀▀▀███████████
████▀▀▀█░▀▀░░░░░░▄███████
████░▄▄█▄▄▀█▄░░░█▄░▄█████
████▀██▀░▄█▀░░░█▀░░██████
██████░░▄▀░░░░▐░░░▐█▄████
██████▄▄█░▀▀░░░█▄▄▄██████
█████████████████████████
█████████████████████████
█████████████████████████
▀███████████████████████▀
▄███████████████████████▄
█████████████████████████
██████████▀░░░▀██████████
█████████░░░░░░░█████████
███████░░░░░░░░░███████
████████░░░░░░░░░████████
█████████▄░░░░░▄█████████
███████▀▀▀█▄▄▄█▀▀▀███████
██████░░░░▄░▄░▄░░░░██████
██████░░░░█▀█▀█░░░░██████
██████░░░░░░░░░░░░░██████
█████████████████████████
▀███████████████████████▀
▄███████████████████████▄
█████████████████████████
██████████▀▀▀▀▀▀█████████
███████▀▀░░░░░░░░░███████
██████░░░░░░░░░░░░▀█████
██████░░░░░░░░░░░░░░▀████
██████▄░░░░░░▄▄░░░░░░████
████▀▀▀▀▀░░░█░░█░░░░░████
████░▀░▀░░░░░▀▀░░░░░█████
████░▀░▀▄░░░░░░▄▄▄▄██████
█████░▀░█████████████████
█████████████████████████
▀███████████████████████▀
.
SLOT GAMES
....SPORTS....
LIVE CASINO
▄░░▄█▄░░▄
▀█▀░▄▀▄░▀█▀
▄▄▄▄▄▄▄▄▄▄▄   
█████████████
█░░░░░░░░░░░█
█████████████

▄▀▄██▀▄▄▄▄▄███▄▀▄
▄▀▄█████▄██▄▀▄
▄▀▄▐▐▌▐▐▌▄▀▄
▄▀▄█▀██▀█▄▀▄
▄▀▄█████▀▄████▄▀▄
▀▄▀▄▀█████▀▄▀▄▀
▀▀▀▄█▀█▄▀▄▀▀

Regional Sponsor of the
Argentina National Team
satscraper
Legendary
*
Offline Offline

Activity: 1274
Merit: 2267



View Profile
October 30, 2025, 07:53:57 AM
Merited by vapourminer (2)
 #5


~

Regarding low-entropy addresses , yeah, some wallets may still generate predictable private keys due the various flaws in architecture they used. The latest example of such flaw is "seeding mechanism used in Libbitcoin Explorer 3.0.0 through 3.6.0", i.e. Mersenne Twister PRNG was seeded with just 32 bits of system time.

 Effected wallets:


▄▄███████████████████▄▄
▄███████████████████████▄
████████████████████████
█████████████████████████
████████████████████████
████████████▀██████▀████
████████████████████████
█████████▄▄▄▄███████████
██████████▄▄▄████████████
████████████████████████
████████████████▀▀███████
▀███████████████████████▀
▀▀███████████████████▀▀
 
 EARNBET 
██
██
██
██
██
██
██
██
██
██
██
██
██
███████▄▄███████████
████▄██████████████████
██▀▀███████████████▀▀███
▄████████████████████████
▄▄████████▀▀▀▀▀████████▄▄██
███████████████████████████
█████████▌██▀████████████
███████████████████████████
▀▀███████▄▄▄▄▄█████████▀▀██
▀█████████████████████▀██
██▄▄███████████████▄▄███
████▀██████████████████
███████▀▀███████████
██
██
██
██
██
██
██
██
██
██
██
██
██


▄▄▄
▄▄▄███████▐███▌███████▄▄▄
█████████████████████████
▀████▄▄▄███████▄▄▄████▀
█████████████████████
▐███████████████████▌
███████████████████
███████████████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀

 King of The Castle 
 $200,000 in prizes
██
██
██
██
██
██
██
██
██
██
██
██
██

 62.5% 

 
RAKEBACK
BONUS
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!