BeNN – Telegram
BeNN
1.12K subscribers
902 photos
82 videos
115 files
148 links
From simple ML algorithms to Neural Networks and Transformers — and from Number Theory to Topology, Cosmology to QED — dive into the world where code meets the cosmos.👨‍💻🌌

For Any Questions @benasphy
Download Telegram
"Aut viam inveniam aut faciam."
🔥31
Merry Christmas y'all🎄
13🤔1
lol They recreated it😂😂🤣🤣🔥🔥
🔥5🤣1
BeNN
lol They recreated it😂😂🤣🤣🔥🔥
Ethiopia did more than I anticipated actually!.... Anyone else watching while final is tomorrow👀👀😂😂
😁12👀7
It's really heartbreaking 💔💔 RIP
😢161
Nothing comes close to Crypto based Frontend. They are always Impressive!.... If you are web dev try to learn something from them.
👍31
Who else is waiting for this masterpiece 🙌
41
What a wonderful night!
❤️❤️❤️❤️SENEGAL❤️❤️❤️❤️
6🔥2
BeNN
What a wonderful night! ❤️❤️❤️❤️SENEGAL❤️❤️❤️❤️
One way or another Justice Prevails!! Mane My Man 🙌🙌
9
Is there anyone who has bought ENS Domain before?...If you have tell us the experience like the network fees if there is congestion and stuff.
👀4
Bought this masterpieces to read for break🙌
🔥21
The funniest incident I had was ... The book store has really great books 🔥and I saw Mein Kampf👀😂I started over viewing it and one foreign dude started staring at me like I'm going to be Hitler's Reborn 🤣 I had to go to him and explain that I don't like it, but sure as hell I'm gonna read it one day 😁and he laughed so hard and talked a lot mainly about Nietzsche! Didn't know that I have good knowledge in philosophy.
😁7
Man United 🔥🔥🔥🔥🔥❤️❤️You guys made my Day 🔥🔥
🔥14👀1
BE AUTHENTIC!
2👍2
What If you can extract private keys from public keys??👀
👀5
BeNN
What If you can extract private keys from public keys??👀
There is a reason I posted this question and I will try to explain best in below post
👍1
🚨 Your Public Key Is Not As Safe As You Think

Most people believe crypto and public-key cryptography are safe, but that’s not entirely true.
Most modern security, from cryptocurrency to TLS, relies on one assumption:

"Factoring large numbers is hard."

Shor’s Algorithm breaks that assumption the moment large-scale quantum computers become practical, allowing private keys to be derived from public keys.

Shor’s algorithm, discovered by Peter Shor in 1994, shows that a quantum computer can efficiently break the mathematics behind modern cryptography.
In simple terms: it turns “hard to break” into “easy to compute”.
It works by converting key-breaking problems into a period-finding task, something quantum computers are exceptionally good at. Once that period is found, the secret key is no longer secret.

So what does this mean for crypto?

🚨 The risks are not small:

- Private keys can be mathematically derived from public keys
- Wallets that have ever exposed a public key become long-term targets
- Old blockchain data becomes a future attack surface
- High-value wallets don’t need to be hacked today — just waited on
- Trust shifts from “cryptography” to “hope hardware never catches up”

This isn’t brute force.
This is the math itself collapsing.

And "crypto is nothing but math."

🛠️ The solution isn’t fear, it’s evolution:

- Post-quantum cryptography
- Quantum-safe signature schemes
- Wallets and protocols designed to upgrade cryptography over time
2👍1
Forwarded from CRYPTO INSIDER
A trader entrusted Clawdbot with $1 million in crypto.

The bot processed thousands of reports, ran 12 algorithms, scanned X posts — ending with a total loss.

CRYPTO INSIDERBybit
🤣9