BeNN
lol They recreated it😂😂🤣🤣🔥🔥
Ethiopia did more than I anticipated actually!.... Anyone else watching while final is tomorrow👀👀😂😂
😁12👀7
BeNN
What a wonderful night! ❤️❤️❤️❤️SENEGAL❤️❤️❤️❤️
One way or another Justice Prevails!! Mane My Man 🙌🙌
❤9
Is there anyone who has bought ENS Domain before?...If you have tell us the experience like the network fees if there is congestion and stuff.
👀4
The funniest incident I had was ... The book store has really great books 🔥and I saw Mein Kampf👀😂I started over viewing it and one foreign dude started staring at me like I'm going to be Hitler's Reborn 🤣 I had to go to him and explain that I don't like it, but sure as hell I'm gonna read it one day 😁and he laughed so hard and talked a lot mainly about Nietzsche! Didn't know that I have good knowledge in philosophy.
😁7
BeNN
What If you can extract private keys from public keys??👀
There is a reason I posted this question and I will try to explain best in below post
👍1
🚨 Your Public Key Is Not As Safe As You Think
Most people believe crypto and public-key cryptography are safe, but that’s not entirely true.
Most modern security, from cryptocurrency to TLS, relies on one assumption:
"Factoring large numbers is hard."
Shor’s Algorithm breaks that assumption the moment large-scale quantum computers become practical, allowing private keys to be derived from public keys.
Shor’s algorithm, discovered by Peter Shor in 1994, shows that a quantum computer can efficiently break the mathematics behind modern cryptography.
In simple terms: it turns “hard to break” into “easy to compute”.
It works by converting key-breaking problems into a period-finding task, something quantum computers are exceptionally good at. Once that period is found, the secret key is no longer secret.
So what does this mean for crypto?
🚨 The risks are not small:
- Private keys can be mathematically derived from public keys
- Wallets that have ever exposed a public key become long-term targets
- Old blockchain data becomes a future attack surface
- High-value wallets don’t need to be hacked today — just waited on
- Trust shifts from “cryptography” to “hope hardware never catches up”
This isn’t brute force.
This is the math itself collapsing.
And "crypto is nothing but math."
🛠️ The solution isn’t fear, it’s evolution:
- Post-quantum cryptography
- Quantum-safe signature schemes
- Wallets and protocols designed to upgrade cryptography over time
Most people believe crypto and public-key cryptography are safe, but that’s not entirely true.
Most modern security, from cryptocurrency to TLS, relies on one assumption:
"Factoring large numbers is hard."
Shor’s Algorithm breaks that assumption the moment large-scale quantum computers become practical, allowing private keys to be derived from public keys.
Shor’s algorithm, discovered by Peter Shor in 1994, shows that a quantum computer can efficiently break the mathematics behind modern cryptography.
In simple terms: it turns “hard to break” into “easy to compute”.
It works by converting key-breaking problems into a period-finding task, something quantum computers are exceptionally good at. Once that period is found, the secret key is no longer secret.
So what does this mean for crypto?
🚨 The risks are not small:
- Private keys can be mathematically derived from public keys
- Wallets that have ever exposed a public key become long-term targets
- Old blockchain data becomes a future attack surface
- High-value wallets don’t need to be hacked today — just waited on
- Trust shifts from “cryptography” to “hope hardware never catches up”
This isn’t brute force.
This is the math itself collapsing.
And "crypto is nothing but math."
🛠️ The solution isn’t fear, it’s evolution:
- Post-quantum cryptography
- Quantum-safe signature schemes
- Wallets and protocols designed to upgrade cryptography over time
❤3👍1
Forwarded from CRYPTO INSIDER
A trader entrusted Clawdbot with $1 million in crypto.
The bot processed thousands of reports, ran 12 algorithms, scanned X posts —ending with a total loss.
CRYPTO INSIDER │ Bybit
The bot processed thousands of reports, ran 12 algorithms, scanned X posts —
CRYPTO INSIDER │ Bybit
🤣12❤1
I think in mastering any skill it is better to focus on iteration than repetition and also in coding rather than studying 10k hours write 10k lines of code and the change will amaze you.
💯9
I never thought I could say this, but C++ is really cool language. I really needed to learn C to appreciate C++ because from Python perspective it seems shitty language as it has a lot of jargon in it. However, I have come to realize C is more straightforward than Python for someone who wants to think interms of what is going under the hood.
❤6