Peter Todd [ARCHIVE] on Nostr: π
Original date posted:2016-01-11 π Original message:-----BEGIN PGP SIGNED ...
π
Original date posted:2016-01-11
π Original message:-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
On 10 January 2016 22:57:15 GMT-05:00, Rusty
>Cheers,
>Rusty.
>[1] Weirdly, the bitcoin network is doing this much work every 57
> days, for about $92M. If that's all the attack costs, it's under
> 1M in 10 years.
Don't get too caught up in Moore's law here - more likely the attack will become feasible because SHA2 is partially weakened, as happened with SHA1. Having industry standard safety margins would make such a weakening be an academic problem rather than an emergency.
-----BEGIN PGP SIGNATURE-----
iQE9BAEBCgAnIBxQZXRlciBUb2RkIDxwZXRlQHBldGVydG9kZC5vcmc+BQJWk1Jc
AAoJEMCF8hzn9Lncz4MH/RYReh4+oPkt8D4uW2FhiB/BlzY5Q1FP94nyi/jQAAh9
er3cUA47RhSLLd2ukC2XDgbw8CZzhnzECs7vBVsXacc3dGpzV59n8L/pnX47IRJh
i1BPWHzEl/UeE/uBYUVgmy+kCVkJ80gnL2GGgZ3IXL5P+CHYY9dvhBrr53Q3HSpi
aEXVivBvBnX0GeATMVY5TAiailUfsUbUmPdEHu0x5hqqTh0sUpi+R+wXWJfPESB2
hzMVZd8ALz1SJhDqbkmBNHy2CX0fhGlnMSapm6EkQksfshkcwJ7tj8s2CEOYD68T
4mR7Xh+FsOA2bbZP8M/lMd3rrXbwFzXi0rWPa70mxqI=
=2W58
-----END PGP SIGNATURE-----
Published at
2023-06-07 17:47:47Event JSON
{
"id": "3ee3bf7d7f451a86a34a83ce52d8236cd1b9f21ece3478314ea27f8db141f3d6",
"pubkey": "daa2fc676a25e3b5b45644540bcbd1e1168b111427cd0e3cf19c56194fb231aa",
"created_at": 1686160067,
"kind": 1,
"tags": [
[
"e",
"e1f46f49861d474f81d81bf43d690af02c9b35e1c9c4fe5cc415112a34c1c041",
"",
"root"
],
[
"e",
"e8bd3095b809119b3d05eed75081876aa1e1385872df56ab0229570bbb425c1a",
"",
"reply"
],
[
"p",
"13bd8c1c5e3b3508a07c92598647160b11ab0deef4c452098e223e443c1ca425"
]
],
"content": "π
Original date posted:2016-01-11\nπ Original message:-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\n\n\nOn 10 January 2016 22:57:15 GMT-05:00, Rusty\n\u003eCheers,\n\u003eRusty.\n\u003e[1] Weirdly, the bitcoin network is doing this much work every 57\n\u003e days, for about $92M. If that's all the attack costs, it's under\n\u003e 1M in 10 years.\n\nDon't get too caught up in Moore's law here - more likely the attack will become feasible because SHA2 is partially weakened, as happened with SHA1. Having industry standard safety margins would make such a weakening be an academic problem rather than an emergency.\n-----BEGIN PGP SIGNATURE-----\n\niQE9BAEBCgAnIBxQZXRlciBUb2RkIDxwZXRlQHBldGVydG9kZC5vcmc+BQJWk1Jc\nAAoJEMCF8hzn9Lncz4MH/RYReh4+oPkt8D4uW2FhiB/BlzY5Q1FP94nyi/jQAAh9\ner3cUA47RhSLLd2ukC2XDgbw8CZzhnzECs7vBVsXacc3dGpzV59n8L/pnX47IRJh\ni1BPWHzEl/UeE/uBYUVgmy+kCVkJ80gnL2GGgZ3IXL5P+CHYY9dvhBrr53Q3HSpi\naEXVivBvBnX0GeATMVY5TAiailUfsUbUmPdEHu0x5hqqTh0sUpi+R+wXWJfPESB2\nhzMVZd8ALz1SJhDqbkmBNHy2CX0fhGlnMSapm6EkQksfshkcwJ7tj8s2CEOYD68T\n4mR7Xh+FsOA2bbZP8M/lMd3rrXbwFzXi0rWPa70mxqI=\n=2W58\n-----END PGP SIGNATURE-----",
"sig": "cc5705213561327f6a7dc32ca4440b84884cc9b06a46f97f53b762919116c16aa5c126e5855e66665d7a8b8906632c3b87860b0ff1880b285561bf7d805e066f"
}