BeNN
1.1K subscribers
915 photos
82 videos
115 files
154 links
From simple ML algorithms to Neural Networks and Transformers β€” and from Number Theory to Topology, Cosmology to QED β€” dive into the world where code meets the cosmos.πŸ‘¨β€πŸ’»πŸŒŒ

For Any Questions @benasphy
Download Telegram
Who else is waiting for this masterpiece πŸ™Œ
❀5⚑1
What a wonderful night!
❀️❀️❀️❀️SENEGAL❀️❀️❀️❀️
❀6πŸ”₯2
Is there anyone who has bought ENS Domain before?...If you have tell us the experience like the network fees if there is congestion and stuff.
πŸ‘€4
Bought this masterpieces to read for breakπŸ™Œ
πŸ”₯2❀1
The funniest incident I had was ... The book store has really great books πŸ”₯and I saw Mein KampfπŸ‘€πŸ˜‚I started over viewing it and one foreign dude started staring at me like I'm going to be Hitler's Reborn 🀣 I had to go to him and explain that I don't like it, but sure as hell I'm gonna read it one day 😁and he laughed so hard and talked a lot mainly about Nietzsche! Didn't know that I have good knowledge in philosophy.
😁7
Man United πŸ”₯πŸ”₯πŸ”₯πŸ”₯πŸ”₯❀️❀️You guys made my Day πŸ”₯πŸ”₯
πŸ”₯14πŸ‘€1
BE AUTHENTIC!
❀2πŸ‘2
What If you can extract private keys from public keys??πŸ‘€
πŸ‘€5
BeNN
What If you can extract private keys from public keys??πŸ‘€
There is a reason I posted this question and I will try to explain best in below post
πŸ‘1
🚨 Your Public Key Is Not As Safe As You Think

Most people believe crypto and public-key cryptography are safe, but that’s not entirely true.
Most modern security, from cryptocurrency to TLS, relies on one assumption:

"Factoring large numbers is hard."

Shor’s Algorithm breaks that assumption the moment large-scale quantum computers become practical, allowing private keys to be derived from public keys.

Shor’s algorithm, discovered by Peter Shor in 1994, shows that a quantum computer can efficiently break the mathematics behind modern cryptography.
In simple terms: it turns β€œhard to break” into β€œeasy to compute”.
It works by converting key-breaking problems into a period-finding task, something quantum computers are exceptionally good at. Once that period is found, the secret key is no longer secret.

So what does this mean for crypto?

🚨 The risks are not small:

- Private keys can be mathematically derived from public keys
- Wallets that have ever exposed a public key become long-term targets
- Old blockchain data becomes a future attack surface
- High-value wallets don’t need to be hacked today β€” just waited on
- Trust shifts from β€œcryptography” to β€œhope hardware never catches up”

This isn’t brute force.
This is the math itself collapsing.

And "crypto is nothing but math."

πŸ› οΈ The solution isn’t fear, it’s evolution:

- Post-quantum cryptography
- Quantum-safe signature schemes
- Wallets and protocols designed to upgrade cryptography over time
❀3πŸ‘1
Forwarded from CRYPTO INSIDER
A trader entrusted Clawdbot with $1 million in crypto.

The bot processed thousands of reports, ran 12 algorithms, scanned X posts β€” ending with a total loss.

CRYPTO INSIDER β”‚ Bybit
🀣12❀1
I think in mastering any skill it is better to focus on iteration than repetition and also in coding rather than studying 10k hours write 10k lines of code and the change will amaze you.
πŸ’―9
Hmmm Interesting πŸ‘€πŸ‘€
πŸ‘€10
I never thought I could say this, but C++ is really cool language. I really needed to learn C to appreciate C++ because from Python perspective it seems shitty language as it has a lot of jargon in it. However, I have come to realize C is more straightforward than Python for someone who wants to think interms of what is going under the hood.
❀6
Forwarded from Frectonz
Know Your Representative

https://rep.et
πŸ‘2
β€œA people without the knowledge of their past history, origin and culture is like a tree without roots.” Marcus Garvey
πŸ’―3
This is the Best Gift I have ever received from a personπŸ™ŒWhat a great book check it out

I have already read about 70% of it and it's basically world history. I will try my best to share some of cool stuff from it.

@BeNN_Pi
πŸ”₯3❀1