BeNN
lol They recreated itπππ€£π€£π₯π₯
Ethiopia did more than I anticipated actually!.... Anyone else watching while final is tomorrowππππ
π12π7
What a wonderful night!
β€οΈβ€οΈβ€οΈβ€οΈSENEGALβ€οΈβ€οΈβ€οΈβ€οΈ
β€οΈβ€οΈβ€οΈβ€οΈSENEGALβ€οΈβ€οΈβ€οΈβ€οΈ
β€6π₯2
BeNN
What a wonderful night! β€οΈβ€οΈβ€οΈβ€οΈSENEGALβ€οΈβ€οΈβ€οΈβ€οΈ
One way or another Justice Prevails!! Mane My Man ππ
β€9
Is there anyone who has bought ENS Domain before?...If you have tell us the experience like the network fees if there is congestion and stuff.
π4
The funniest incident I had was ... The book store has really great books π₯and I saw Mein KampfππI started over viewing it and one foreign dude started staring at me like I'm going to be Hitler's Reborn π€£ I had to go to him and explain that I don't like it, but sure as hell I'm gonna read it one day πand he laughed so hard and talked a lot mainly about Nietzsche! Didn't know that I have good knowledge in philosophy.
π7
BeNN
What If you can extract private keys from public keys??π
There is a reason I posted this question and I will try to explain best in below post
π1
π¨ Your Public Key Is Not As Safe As You Think
Most people believe crypto and public-key cryptography are safe, but thatβs not entirely true.
Most modern security, from cryptocurrency to TLS, relies on one assumption:
"Factoring large numbers is hard."
Shorβs Algorithm breaks that assumption the moment large-scale quantum computers become practical, allowing private keys to be derived from public keys.
Shorβs algorithm, discovered by Peter Shor in 1994, shows that a quantum computer can efficiently break the mathematics behind modern cryptography.
In simple terms: it turns βhard to breakβ into βeasy to computeβ.
It works by converting key-breaking problems into a period-finding task, something quantum computers are exceptionally good at. Once that period is found, the secret key is no longer secret.
So what does this mean for crypto?
π¨ The risks are not small:
- Private keys can be mathematically derived from public keys
- Wallets that have ever exposed a public key become long-term targets
- Old blockchain data becomes a future attack surface
- High-value wallets donβt need to be hacked today β just waited on
- Trust shifts from βcryptographyβ to βhope hardware never catches upβ
This isnβt brute force.
This is the math itself collapsing.
And "crypto is nothing but math."
π οΈ The solution isnβt fear, itβs evolution:
- Post-quantum cryptography
- Quantum-safe signature schemes
- Wallets and protocols designed to upgrade cryptography over time
Most people believe crypto and public-key cryptography are safe, but thatβs not entirely true.
Most modern security, from cryptocurrency to TLS, relies on one assumption:
"Factoring large numbers is hard."
Shorβs Algorithm breaks that assumption the moment large-scale quantum computers become practical, allowing private keys to be derived from public keys.
Shorβs algorithm, discovered by Peter Shor in 1994, shows that a quantum computer can efficiently break the mathematics behind modern cryptography.
In simple terms: it turns βhard to breakβ into βeasy to computeβ.
It works by converting key-breaking problems into a period-finding task, something quantum computers are exceptionally good at. Once that period is found, the secret key is no longer secret.
So what does this mean for crypto?
π¨ The risks are not small:
- Private keys can be mathematically derived from public keys
- Wallets that have ever exposed a public key become long-term targets
- Old blockchain data becomes a future attack surface
- High-value wallets donβt need to be hacked today β just waited on
- Trust shifts from βcryptographyβ to βhope hardware never catches upβ
This isnβt brute force.
This is the math itself collapsing.
And "crypto is nothing but math."
π οΈ The solution isnβt fear, itβs evolution:
- Post-quantum cryptography
- Quantum-safe signature schemes
- Wallets and protocols designed to upgrade cryptography over time
β€3π1
Forwarded from CRYPTO INSIDER
A trader entrusted Clawdbot with $1 million in crypto.
The bot processed thousands of reports, ran 12 algorithms, scanned X posts βending with a total loss.
CRYPTO INSIDER β Bybit
The bot processed thousands of reports, ran 12 algorithms, scanned X posts β
CRYPTO INSIDER β Bybit
π€£12β€1
I think in mastering any skill it is better to focus on iteration than repetition and also in coding rather than studying 10k hours write 10k lines of code and the change will amaze you.
π―9