Cameri on Nostr: Public keys are derived from private keys using cryptography. You basically do that ...
Public keys are derived from private keys using cryptography. You basically do that over and over with a random private key each time until you get a public key that has a desired pattern (like starting which a bunch of zeroes at the beginning). Since no one can guess what a public key is going to look like from a private key, you have no choice but to try many different random private keys until you end up with a public key that matches your criteria.
Similar to how Bitcoin blocks are mined.
Published at
2022-09-01 03:18:48Event JSON
{
"id": "e9ecc5640cc08e625cd15603204d5cf979fc43be81a34b5fbf37e4fc801cb32b",
"pubkey": "00000000827ffaa94bfea288c3dfce4422c794fbb96625b6b31e9049f729d700",
"created_at": 1662002328,
"kind": 1,
"tags": [
[
"e",
"74d0d7ea0bd3f1b040702652d5790845b496063d73d00165d798981314334b6b",
"",
"reply"
],
[
"p",
"c7eda660a6bc8270530e82b4a7712acdea2e31dc0a56f8dc955ac009efd97c86",
"",
"reply"
]
],
"content": "Public keys are derived from private keys using cryptography. You basically do that over and over with a random private key each time until you get a public key that has a desired pattern (like starting which a bunch of zeroes at the beginning). Since no one can guess what a public key is going to look like from a private key, you have no choice but to try many different random private keys until you end up with a public key that matches your criteria.\nSimilar to how Bitcoin blocks are mined.",
"sig": "b4ab8d9f9833445727ac98050c2126dd3ef9fc7653beef68c50279e27fb7107cad49b65710fd9c089f4896ec5d940f7148fffed17a54588592885eaa1b204a35"
}