BeNN – Telegram
BeNN
1.12K subscribers
909 photos
82 videos
115 files
150 links
From simple ML algorithms to Neural Networks and Transformers — and from Number Theory to Topology, Cosmology to QED — dive into the world where code meets the cosmos.👨‍💻🌌

For Any Questions @benasphy
Download Telegram
BeNN
lol They recreated it😂😂🤣🤣🔥🔥
Ethiopia did more than I anticipated actually!.... Anyone else watching while final is tomorrow👀👀😂😂
😁12👀7
It's really heartbreaking 💔💔 RIP
😢161
Nothing comes close to Crypto based Frontend. They are always Impressive!.... If you are web dev try to learn something from them.
👍31
Who else is waiting for this masterpiece 🙌
51
What a wonderful night!
❤️❤️❤️❤️SENEGAL❤️❤️❤️❤️
6🔥2
BeNN
What a wonderful night! ❤️❤️❤️❤️SENEGAL❤️❤️❤️❤️
One way or another Justice Prevails!! Mane My Man 🙌🙌
9
Is there anyone who has bought ENS Domain before?...If you have tell us the experience like the network fees if there is congestion and stuff.
👀4
Bought this masterpieces to read for break🙌
🔥21
The funniest incident I had was ... The book store has really great books 🔥and I saw Mein Kampf👀😂I started over viewing it and one foreign dude started staring at me like I'm going to be Hitler's Reborn 🤣 I had to go to him and explain that I don't like it, but sure as hell I'm gonna read it one day 😁and he laughed so hard and talked a lot mainly about Nietzsche! Didn't know that I have good knowledge in philosophy.
😁7
Man United 🔥🔥🔥🔥🔥❤️❤️You guys made my Day 🔥🔥
🔥14👀1
BE AUTHENTIC!
2👍2
What If you can extract private keys from public keys??👀
👀5
BeNN
What If you can extract private keys from public keys??👀
There is a reason I posted this question and I will try to explain best in below post
👍1
🚨 Your Public Key Is Not As Safe As You Think

Most people believe crypto and public-key cryptography are safe, but that’s not entirely true.
Most modern security, from cryptocurrency to TLS, relies on one assumption:

"Factoring large numbers is hard."

Shor’s Algorithm breaks that assumption the moment large-scale quantum computers become practical, allowing private keys to be derived from public keys.

Shor’s algorithm, discovered by Peter Shor in 1994, shows that a quantum computer can efficiently break the mathematics behind modern cryptography.
In simple terms: it turns “hard to break” into “easy to compute”.
It works by converting key-breaking problems into a period-finding task, something quantum computers are exceptionally good at. Once that period is found, the secret key is no longer secret.

So what does this mean for crypto?

🚨 The risks are not small:

- Private keys can be mathematically derived from public keys
- Wallets that have ever exposed a public key become long-term targets
- Old blockchain data becomes a future attack surface
- High-value wallets don’t need to be hacked today — just waited on
- Trust shifts from “cryptography” to “hope hardware never catches up”

This isn’t brute force.
This is the math itself collapsing.

And "crypto is nothing but math."

🛠️ The solution isn’t fear, it’s evolution:

- Post-quantum cryptography
- Quantum-safe signature schemes
- Wallets and protocols designed to upgrade cryptography over time
3👍1
Forwarded from CRYPTO INSIDER
A trader entrusted Clawdbot with $1 million in crypto.

The bot processed thousands of reports, ran 12 algorithms, scanned X posts — ending with a total loss.

CRYPTO INSIDERBybit
🤣121
I think in mastering any skill it is better to focus on iteration than repetition and also in coding rather than studying 10k hours write 10k lines of code and the change will amaze you.
💯9
Hmmm Interesting 👀👀
👀10
I never thought I could say this, but C++ is really cool language. I really needed to learn C to appreciate C++ because from Python perspective it seems shitty language as it has a lot of jargon in it. However, I have come to realize C is more straightforward than Python for someone who wants to think interms of what is going under the hood.
6