Space Hodler on Nostr: If you're talking about cracking the computation of private keys from public keys, ...
If you're talking about cracking the computation of private keys from public keys, you'd still have to add entropy to your private key and move your coins to a new address.
But I think the OP meant cracking mining, which is what uses sha256. The private key to public key function uses elliptic curves and sha256 (twice).
Published at
2023-04-30 17:16:30Event JSON
{
"id": "a8b61b1e3a33d7c665e97d772b2d99c40d66a329317359ffbe1d99837d9b9d07",
"pubkey": "083560eaa9e80f7f5362bba93c7739f84324615c2fce411b4919d39b2cc8577c",
"created_at": 1682874990,
"kind": 1,
"tags": [
[
"e",
"85e1b707b89af8ff8929a5a76ded299a9b621c753d05524e3ed66cde5f277a43"
],
[
"e",
"7008961515982572d3f7cf05085fb719c0eb7ad07756a77439f217fb4a07a24e"
],
[
"e",
"a960630b2632748cc02f0186dbd645461c7932a214ac70285f17a1f6e6c795df"
],
[
"p",
"e2ccf7cf20403f3f2a4a55b328f0de3be38558a7d5f33632fdaaefc726c1c8eb"
],
[
"p",
"eeadea6cbb5018a190f0117857de513cc271d24c947d56cd82c54a6b64ae47a4"
],
[
"p",
"6a3301c4584124c509efa3efeef04dfa4e7413032797fb79d0207689a085f10c"
]
],
"content": "If you're talking about cracking the computation of private keys from public keys, you'd still have to add entropy to your private key and move your coins to a new address.\nBut I think the OP meant cracking mining, which is what uses sha256. The private key to public key function uses elliptic curves and sha256 (twice).",
"sig": "9f322e78f3b31a2fd3d1604336b45d92974539a4d70089e3d8432153916c3ee479ec37de18cc8fde37a3b7ab2cd539e6298df3e8c72dc555959c9878b236f5dc"
}