If you're talking about cracking the computation of private keys from public keys, you'd still have to add entropy to your private key and move your coins to a new address.

But I think the OP meant cracking mining, which is what uses sha256. The private key to public key function uses elliptic curves and sha256 (twice).

Reply to this note

Please Login to reply.

Discussion

No replies yet.