Wladimir [ARCHIVE] on Nostr: 📅 Original date posted:2014-03-14 📝 Original message:On Fri, Mar 14, 2014 at ...
📅 Original date posted:2014-03-14
📝 Original message:On Fri, Mar 14, 2014 at 3:38 AM, Jack Scott <jack.scott.public at gmail.com>wrote:
> A method is proposed to generate a Bitcoin private key by using a physical
> key in conjunction with image recognition software and a PIN. Use edge
> detection software applied to incoming video feed to convert the shape of a
> physical key into an equation that describes the key. The hash of the
> key's equation plus a user generated five digit pin can then be used to
> create a Bitcoin private key.
>
Some practical nits:
- Physical keys are vulnerable to photography-based reproduction attacks.
That gets even worse if you use them to identify to a digital system as you
can leave out the tiresome manual reproduction step.
- The output from computer vision algorithms is notoriously noisy. If you
use that as input for hashing a private key, it may become hard/impossible
to reproduce (also, physical objects may deform over time).
Wladimir
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <
http://lists.linuxfoundation.org/pipermail/bitcoin-dev/attachments/20140314/7fca85eb/attachment.html>;
Published at
2023-06-07 15:15:43Event JSON
{
"id": "775b56ef001a3f9358eb62fbfaf8f8a4ab6227146d79e7d590ee424258a32643",
"pubkey": "30217b018a47b99ed4c20399b44b02f70ec4f58ed77a2814a563fa28322ef722",
"created_at": 1686150943,
"kind": 1,
"tags": [
[
"e",
"ea640c4c6067dffe4eff62a398dabf45a4f29accef1bf077df916951fa6b2055",
"",
"root"
],
[
"e",
"27f0a24b4950da3269f33f398dcbcc7105c17b8f4ceb5c5d80d0207b3922ca28",
"",
"reply"
],
[
"p",
"b12bbf2f9d0ed10318691454b67a769c892c1ad54c39ff399fed0a40009beb04"
]
],
"content": "📅 Original date posted:2014-03-14\n📝 Original message:On Fri, Mar 14, 2014 at 3:38 AM, Jack Scott \u003cjack.scott.public at gmail.com\u003ewrote:\n\n\u003e A method is proposed to generate a Bitcoin private key by using a physical\n\u003e key in conjunction with image recognition software and a PIN. Use edge\n\u003e detection software applied to incoming video feed to convert the shape of a\n\u003e physical key into an equation that describes the key. The hash of the\n\u003e key's equation plus a user generated five digit pin can then be used to\n\u003e create a Bitcoin private key.\n\u003e\n\nSome practical nits:\n\n- Physical keys are vulnerable to photography-based reproduction attacks.\nThat gets even worse if you use them to identify to a digital system as you\ncan leave out the tiresome manual reproduction step.\n\n- The output from computer vision algorithms is notoriously noisy. If you\nuse that as input for hashing a private key, it may become hard/impossible\nto reproduce (also, physical objects may deform over time).\n\nWladimir\n-------------- next part --------------\nAn HTML attachment was scrubbed...\nURL: \u003chttp://lists.linuxfoundation.org/pipermail/bitcoin-dev/attachments/20140314/7fca85eb/attachment.html\u003e",
"sig": "5aa9d1c00aff0a964b8997984924b139bd0522f702406a9b4cc48ccb5e61e1f7134f08d42fbd37e000a9aeef1e01bac26fb9d8fea579930f2c6c7123d1fd44a4"
}