Binance Square

BIP

7,524 views
7 Discussing
Anh_ba_Cong
--
See original
Could Bitcoin be hacked in just a few hours? A developer warns and presents a solutionWhile most users still trust the 'steel' security of Bitcoin, a silent threat is getting closer every day – quantum computers. And Agustin Cruz, a Bitcoin developer from Chile, is trying to act before disaster strikes. Quantum computers: The potential enemy of Bitcoin Currently, Bitcoin uses a cryptographic algorithm called #ECDSA (Elliptic Curve Digital Signature Algorithm) to ensure that only the legitimate owner can spend the BTC in their wallet.

Could Bitcoin be hacked in just a few hours? A developer warns and presents a solution

While most users still trust the 'steel' security of Bitcoin, a silent threat is getting closer every day – quantum computers. And Agustin Cruz, a Bitcoin developer from Chile, is trying to act before disaster strikes.

Quantum computers: The potential enemy of Bitcoin

Currently, Bitcoin uses a cryptographic algorithm called #ECDSA (Elliptic Curve Digital Signature Algorithm) to ensure that only the legitimate owner can spend the BTC in their wallet.
See original
Wallet (III) - BIP322. Derivation rules [BIP32]. We generated a seed through BIP39, which we call the 'master seed'. According to the derivation rules of BIP32, we can derive the 'master private key', 'master public key', and 'master chain code' from the 'master seed', all three of which are referred to as 'keys'. We can continue to derive 'child keys' (child private key, child public key, child chain code) from the 'keys' as 'child seeds', and so on, allowing for an infinite generation of descendants, all derived from the 'master seed'; hence, the 'master seed' is also referred to as the 'root'. The 'master private key', 'master public key', and 'master chain code' are also referred to as the 'master keys'. As long as we back up the 'mnemonic phrase', we can export the 'root' -> 'master root' -> 'child root', etc.

Wallet (III) - BIP32

2. Derivation rules [BIP32].
We generated a seed through BIP39, which we call the 'master seed'. According to the derivation rules of BIP32, we can derive the 'master private key', 'master public key', and 'master chain code' from the 'master seed', all three of which are referred to as 'keys'. We can continue to derive 'child keys' (child private key, child public key, child chain code) from the 'keys' as 'child seeds', and so on, allowing for an infinite generation of descendants, all derived from the 'master seed'; hence, the 'master seed' is also referred to as the 'root'. The 'master private key', 'master public key', and 'master chain code' are also referred to as the 'master keys'. As long as we back up the 'mnemonic phrase', we can export the 'root' -> 'master root' -> 'child root', etc.
See original
Wallet (5) - BIP44 Standard and Future EnterprisesFuture enterprises will definitely move towards intelligence, and financial management will also undergo significant changes. We can see clues from BIP44; it's really hard to say what society will develop into in the next thirty years. #钱包 #BIP

Wallet (5) - BIP44 Standard and Future Enterprises

Future enterprises will definitely move towards intelligence, and financial management will also undergo significant changes. We can see clues from BIP44; it's really hard to say what society will develop into in the next thirty years.

#钱包 #BIP
Login to explore more contents
Explore the latest crypto news
⚡️ Be a part of the latests discussions in crypto
💬 Interact with your favorite creators
👍 Enjoy content that interests you
Email / Phone number