Post
Trending posts
Well hello there
https://image.nostr.build/fca0d683f73430bbef5272559eb4df2bcbad21cc249465045b847bf97cf7394e.png
Exiled from X. Blessing.
Fuck that platform.
All-in on NOSTR.
🔥
"Why did you stop using Nostr"
old.reddit.com/r/nostr/comments/1josljh/stop
> it's an annoying fucking echo chamber o
In 2015, an eccentric millionaire placed bitcoins in weak addresses. For ye
https://image.nostr.build/7a13e5e43cb416bf9b6004a8f2a99ccadc05d4961ca5507b6a8f28c399777097.jpg
The individual's goal was to monitor the advancement of computational powmempool.space/tx/08389f34c98c606322740c0be6a7125d9860bb8d5cb182c02f98461e5fa6cd15
The first few dozen addresses were quickly looted. There are bots monitormempool.space/tx/0eb5b5c103e68eb0931430e7786cf1b6962f9eed5a2cb5271d4dd1699b77e86f
It was only at the end of 2015 that one of the owners of these bots noticbitcointalk.org/index.php?topic=1306983.0
In 2019, the creator exposed the public keys of some addresses (those witmempool.space/tx/17e4e323cfbc68d7f0071cad09364e8193eedf8fefbcbd8a21b4b65717a4b3d3
One of these methods is a very old algorithm from 1978:
Pollard's Kangaro#67 and #68 in early April.
Yesterday, someone, probably a beginner, cracked add#69 but didn’t secure the spending properly and exposed the public key.
Imempool.space/tx/a52c5046f3097a8c2bd3b9889df2fb47b104d47a16cc679d3357feec003db753
The time to crack these addresses — discovering the private key from
It’s official. Check your email anon

nobody can influence me
period
fuck you, we will live free
Don't use Windows. NEVER.
Perhaps we need to tighten up our language and say more precisely that Bitc