george soros is SATOSHI????? WHO ELSE CAUGHT THAT JUST NOW.... | |
allentownchemtrail (OP) User ID: 53502500 United States 12/03/2018 02:55 PM Report Abusive Post Report Copyright Violation | |
allentownchemtrail (OP) User ID: 53502500 United States 12/03/2018 02:56 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 76423133 Netherlands 12/03/2018 03:43 PM Report Abusive Post Report Copyright Violation | Numbers used to create eliptic curves are suggestions given by NSA Secp256k1 curve [link to www.secg.org] Bitcoin uses the Elliptic Curve Digital Signature Algorithm (ECDSA) for signing transactions. This is how you use your private key to “prove” you own the bitcoins associated with your address. ECDSA keys are derived from elliptic curves that themselves are generated using certain parameters. NIST has been actively recommending that everyone use the secp256r1 parameters because they “are the most secure”. However, there appears to be some funny business with secp256r1 that is eerily similar to the backdoor in Dual_EC_DRBG. SO BASICALLY when using bitcoin one has to TRUST the recommendations given by NSA and friends. I assume that there is a backdoor in bitcoin... Poiny is it that developers like Satoshi took the recomendations Secp256r1 is supposed to use a random number in generating the curves. The way it allegedly creates this random number is by using a one-way hash function of a “seed” to produce a nothing up my sleeve number. The seed need not be random since the output of the hash function is not predictable. Instead of using a relatively innocuous seed like, say, the number 15, secp256r1 uses the very suspicious looking seed: c49d360886e704936a6678e1139d26b7819f7e90. And like Dual_EC_DRBG, it provides no documentation for how or why this number was chosen. And if so The Elite knows , that is De soros might have a backdoor. |
Terry Nutkins User ID: 77118776 United Kingdom 12/03/2018 04:13 PM Report Abusive Post Report Copyright Violation | It's like this : Quoting: BeamOfLight Numbers used to create eliptic curves are suggestions given by NSA Secp256k1 curve [link to www.secg.org] Bitcoin uses the Elliptic Curve Digital Signature Algorithm (ECDSA) for signing transactions. This is how you use your private key to “prove” you own the bitcoins associated with your address. ECDSA keys are derived from elliptic curves that themselves are generated using certain parameters. NIST has been actively recommending that everyone use the secp256r1 parameters because they “are the most secure”. However, there appears to be some funny business with secp256r1 that is eerily similar to the backdoor in Dual_EC_DRBG. SO BASICALLY when using bitcoin one has to TRUST the recommendations given by NSA and friends. I assume that there is a backdoor in bitcoin... Poiny is it that developers like Satoshi took the recomendations Secp256r1 is supposed to use a random number in generating the curves. The way it allegedly creates this random number is by using a one-way hash function of a “seed” to produce a nothing up my sleeve number. The seed need not be random since the output of the hash function is not predictable. Instead of using a relatively innocuous seed like, say, the number 15, secp256r1 uses the very suspicious looking seed: c49d360886e704936a6678e1139d26b7819f7e90. And like Dual_EC_DRBG, it provides no documentation for how or why this number was chosen. And if so The Elite knows , that is De soros might have a backdoor. It doesn't need one. All the processors have them built in. EVERY SINGLE PROCESSOR. |
Anonymous Coward User ID: 76423133 Netherlands 12/03/2018 05:15 PM Report Abusive Post Report Copyright Violation | It's like this : Quoting: BeamOfLight Numbers used to create eliptic curves are suggestions given by NSA Secp256k1 curve [link to www.secg.org] Bitcoin uses the Elliptic Curve Digital Signature Algorithm (ECDSA) for signing transactions. This is how you use your private key to “prove” you own the bitcoins associated with your address. ECDSA keys are derived from elliptic curves that themselves are generated using certain parameters. NIST has been actively recommending that everyone use the secp256r1 parameters because they “are the most secure”. However, there appears to be some funny business with secp256r1 that is eerily similar to the backdoor in Dual_EC_DRBG. SO BASICALLY when using bitcoin one has to TRUST the recommendations given by NSA and friends. I assume that there is a backdoor in bitcoin... Poiny is it that developers like Satoshi took the recomendations Secp256r1 is supposed to use a random number in generating the curves. The way it allegedly creates this random number is by using a one-way hash function of a “seed” to produce a nothing up my sleeve number. The seed need not be random since the output of the hash function is not predictable. Instead of using a relatively innocuous seed like, say, the number 15, secp256r1 uses the very suspicious looking seed: c49d360886e704936a6678e1139d26b7819f7e90. And like Dual_EC_DRBG, it provides no documentation for how or why this number was chosen. And if so The Elite knows , that is De soros might have a backdoor. It doesn't need one. All the processors have them built in. EVERY SINGLE PROCESSOR. Right , but paperwallets don't have a processor ... A mathematical backdoor is always better than a physical. I assume that everyone knows about NSA backdoor in Windows , and digital angels in the sky right now. |