Post
Trending posts
Please tag more Bitcoin devs here on nostr below so I can add extend the lifollowing.space/d/acc8bfac-7b00-4c07-b607-d38b8e53bf0f?p=50d94fc2d8580c682b071a542f8b1e31a200b0508bab95a33bef0855df281d63
Not sure if this is the way…
GM, I'd like to see a Core fork managed via Nostr and not GitHub. Who's witIcy Boa
Perhaps we need to tighten up our language and say more precisely that Bitc
nobody can influence me
period
fuck you, we will live free
What are you restaurant red flags?
Mine is cooks with gloves in complete
Conviction is everything.
Conviction will have you stay in the game when
following.space took off before I even added the option to search for usern
He built a cozy shelter above water so he could fish from it
The utxoset size is *permanent* it can’t be pruned like other block data un
Hey everyone! I play beach volleyball and I wanted to share a glimpse of th
If y’all want Bitcoin to stay purely a monetary protocol- then start fuckinAnnoyed Opossum got silenced for expressing a valid concern.
Here we go:
Hodling, sittiTall Antlion is not stupid. He’s been writing about long term instability for years: petertodd.org/2022/surprisingly-tail-emission-is-not-inflationary
Slimy Cattle s
Lee just vibe coded this website into existence and coconuts showed up at mFuzzy Cardinal #RealLifeBitcoin
Don't use Windows. NEVER.
rabbit hole recap live in an hour
what should we talk about?
rhr.tv
In 2015, an eccentric millionaire placed bitcoins in weak addresses. For ye
The individual's goal was to monitor the advancement of computational powmempool.space/tx/08389f34c98c606322740c0be6a7125d9860bb8d5cb182c02f98461e5fa6cd15
The first few dozen addresses were quickly looted. There are bots monitormempool.space/tx/0eb5b5c103e68eb0931430e7786cf1b6962f9eed5a2cb5271d4dd1699b77e86f
It was only at the end of 2015 that one of the owners of these bots noticbitcointalk.org/index.php?topic=1306983.0
In 2019, the creator exposed the public keys of some addresses (those witmempool.space/tx/17e4e323cfbc68d7f0071cad09364e8193eedf8fefbcbd8a21b4b65717a4b3d3
One of these methods is a very old algorithm from 1978:
Pollard's Kangaro#67 and #68 in early April.
Yesterday, someone, probably a beginner, cracked add#69 but didn’t secure the spending properly and exposed the public key.
Imempool.space/tx/a52c5046f3097a8c2bd3b9889df2fb47b104d47a16cc679d3357feec003db753
The time to crack these addresses — discovering the private key from
Well hello there
Come on, own up now…