←back to thread

198 points aorloff | 1 comments | | HN request time: 0.264s | source
Show context
mattlondon ◴[] No.44467062[source]
Maybe that guy who was digging up a landfill to find his old HDD finally found it!

Seriously though, what are the odds that someone has been quietly spending 10s/100s of millions in cloud compute to brute force the keys for old wallets?

replies(12): >>44467081 #>>44467123 #>>44467396 #>>44467750 #>>44469927 #>>44470471 #>>44470497 #>>44470630 #>>44470975 #>>44471691 #>>44471790 #>>44472481 #
bravoetch ◴[] No.44467081[source]
I would say the odds are zero because that's the likelihood of being able to brute-force anything in the key space.
replies(2): >>44467180 #>>44477232 #
1. amy214 ◴[] No.44477232[source]
>I would say the odds are zero because that's the likelihood of being able to brute-force anything in the key space.

you are correct at first pass, but it's a fact wallets have been cracked many times, perhaps at least 100s of millions of dollars. The "keyspace" for the cracked wallet is a subset of the nominal keyspace - the much smaller space covered by either a flawed random number generator (RNG), or the whole brainwallet fiasco, or a RNG where a seed is crackable (e.g. milliseconds since 1970 or unix epoch - some cracks, whitehat, have used this method). That's all what we know in the whitehat space, surely other tricks exist in the blackhat space