Here’s a thought for you:

What makes your money diffeeent to a movie studios studio?

Nothing really.

Both entities worked hard for their fortunes and IP.

It is very likely that you are about to be the new movie studios, and people will most likely pirate your money.

Decrypting your keys without your permission is no different to the movie studios having their property taken.

This is the true free and open market.

So the question is, are you adequately prepared and informed to be in this position? Or are you sleeping and hoping someone else will do the work for you.

Very honest thought for whoever is looking back at you in the mirror šŸŖž

Reply to this note

Please Login to reply.

Discussion

Your homework is to watch the video and read the points below it!

Welcome to the free market. Where permission doesn’t exist.

Not this faggy you can’t tell me what to eat or what to watch permissions, I’m talking, complete absolute identity wiping fortune crumbling stuff.

The level of permission that the fags in bitcoin think is on the table, just shows how elementary their thinking is.

This isn’t, oh wow, my social media account got hacked.

This is digital earthquake you don’t exist and can’t go online.

They all know fuck all. And it’s time that the community stopped with this faggotry soy boy attitude of ā€œI’m just minding my own businessā€.

That’s lazy. It’s a team effort, do some fucking work.

Take my word for it, or tag them below.

nostr:nevent1qqsvtgtqp8tzlprk9nq7khxwxmkw94qeuv97c7cgn04sqh2nq25my6qczahrc

So let me ask you, what do prime numbers have to do with seed phrases?

The generator point that creates all keys in elliptic curve is a prime boundary of the field. That’s a direct association.

Worse though, the security policy of RSA keys which protect servers that protect keys, etc are all semi primes. Which is just the multiplication of two prime numbers.

There’s no cryptography that exists (that’s usable) that doesn’t involve prime numbers.

Keeping secrets is nowhere in nature, it’s likely a temporary privilege we accessed as a civilization, but in a larger cohesive system of energy (the universe) it’s likely we have little say against nature.

So we have sort of been raw dogging primes and using them everywhere but they’re less like little bricks that secure the building and more like ticking explosive bricks. The explosion goes off when someone figures out what others haven’t yet.

Everything breaks eventually against nature, and now we have a large enough motivation, we start to see how loyal hungry dogs really are. Meaning, people are struggling and a maths puzzle vs 8B motivated people remaining unsolved is VERY different to a maths puzzle vs 400 individuals with closed minds and maths niche focus.

Once the problem looks like a global lotto ticket, I give it less than 7 days for a civilian to crack on a laptop or iPhone. The solution will be elegant and fresh (like horse and cart evolving to engine).

It’s super serious.

Or hashes for that matter?

It’s sort of like understanding how the electron works, but digitally. The new lens and understanding cracks open a revisit of all previous tech.

Similar to electricity updating old tech to become electrical/digital.

If that makes sense! 😊

I just don’t understand why there are not throngs of teams trying to get to this first before the bad guys do.

(The bad guys are already there, it’s most likely that encryption is not really secure and allows people the illusion of privacy)

Well one, if they crack it and start draining utxos left and right, wouldn't that just nullify the entire experiment? Bitcoin would plummet, the miners would leave the market, the whole house would come down nullifying the benefit of employing that solution. So the motivation only rests in the hands of malicious actors-state and bankers.

So you're saying a single solution could drain every utxo mathematically, no matter how many signatures the wallet has?

Wouldn't that entail cracking the entire time chain? We're talking orders of magnitude more difficult right? Like hundreds of thousands, or millions of digits since every transaction adds complexity.

If so, wouldn't that mean the number changes every 10 minutes? Someone would have to come up with the exact theorem (I think that's what we're saying, otherwise just the right prime number) at exactly the right block to use it. And then sweep everything they could before the next block.

Yes, it then becomes less of ā€œcan it be brokenā€ and more like ā€œhow do we make sure people believe it still is secureā€

This scene exactly. šŸ‘‡

The hard part is breaking it, the impossible part is keeping it a secret.

Enigma was the olden day version of RSA.

https://youtu.be/Qdfp5Za0XVg?si=04WR4SlCCP6U03Ve

You wouldn’t know UTXO’s were drained, because you couldn’t tell anyone. They would attribute it to your setup, and then you’d have to disclose that, and over a longer arc, it looks like blame and lack of personal accountability, but it would make people look like modern day lunatics saying there’s a ghost in their machine and that they couldn’t possibly made a mistake etc…

Hard to detect. Near impossible to detect at scale.

But my key point, that I did not articulate well (and then i will fuck off and let you have your time back) is where would something like that hit? Like which wall would they be tunneling under? Like would it be seeds so the entire wallet, the hash of an individual utxo at a time, or the actual timechain? To my knowledge (lacking obviously) the elliptic curve is just how keys are derived. Or does that arc include data directly onchain?

Wallets are one thing SHA 256 as a whole is a galaxy of another story. Because we'd have to find a new one if what your saying even could be done.

It would be exposed public keys, to start. So any transactions that have revealed a public key holding a balance.

That’s first cab off the rank, then it’ll be server side compromises through SSL certificates that use CA’s (a trusted network of certificate authorities, aka, the dudes that give the green pad lock when you visit a website).

When you see the green padlock, on a website, that is your machine (not you) saying to the bouncer ā€œcan I come in?ā€ He says let me see your semiprime and verify it. If it’s verified (key signature verification) you get let in.

The problem with this is revealing a signature reveals the semiprime, so unless key rotation is happening in real time, computationally inelegant for our expeditious dopamine now, it wouldn’t work out.

Basically, Epstein files, aliens, warheads, all open to the guy who has an answer.

Hashing algo’s are not really that hard either, everything is too mechanical (by design) not fuzzy. This is a blessing but a silver bullet one shot head shot if the algo breaks.

This show from last year (likely a foreshadowing) is a great tl;dr

https://youtu.be/_HdOGSOu1kQ?si=-nAg6jUNBVHWDDGv

As an extra note, the thing that has literally almost sent me into a doom loop spiral.

I’ve spoken to the top professors about this on earth (like our Michael Jordan’s of maths)…

They give me this absolute loser juice ā€œI focus on prime numbers, not other stuffā€.

That’s like a chemist saying ā€œI just make ammunition, I’m not responsibleā€.

We are sooooo cooked if people don’t start paying attention IMO.

Maybe I’m overthinking it, but I feel in my bones I’m not!

Hope you are ready for a great new year!!!! (Actually! Lighten the subject!!!)

You too fren. I'll be digging.