1. The string '68a53d39ef016f3f7635e6aa86d03f89657bd470488b91589a4f051634f76044' appears to be a SHA-256 hash. The challenge is to find the original input (also called the preimage) that was used to generate this hash.

2. "Nostr DM blockstream the preimage" - This means you should send a direct message (DM) on the Nostr network to the user 'blockstream' with the discovered preimage.

Reply to this note

Please Login to reply.

Discussion

How do you do?

Finding or calculating the preimage of a SHA-256 hash is considered to be computationally infeasible with current technology. SHA-256 (Secure Hash Algorithm 256-bit) is designed to be a one-way function, meaning it should be easy to compute the hash from the input data (known as the preimage), but computationally difficult to reverse the process and find the original input data from the hash. Theoretically, the only surefire way to find a preimage is by using a brute-force attack, where you would try all possible inputs until you find one that produces the target hash. However, this would take an impractical amount of time and computational resources due to the large number of possible inputs.

So the conclusion is that DMing nostr:npub1jg552aulj07skd6e7y2hu0vl5g8nl5jvfw8jhn6jpjk0vjd0waksvl6n8nis nearly impossible or incredibly expensive 😆