Functions, Hash Functions, Cryptography - Discussion

interesting, I didn’t know that functionality existed in some wallets. good to know thanks,

1 Like

Just finished functions section , moving straight to hash! love it :adult:‍:computer::adult:‍:computer::adult:‍:computer:

2 Likes

I am going to interact with this discussion group just so i can genuinely mark complete for the task, but have scrolled through a lot of conversations and found this link
https://www.youtube.com/watch?v=GT6AuURD8Y0&feature=youtu.be
For those as lost on this subject as me i think this may be a good place to start.
I think i have an idea on how this works but i definitely could not explain it to someone else so i clearly don’t understand it well…off to do research

4 Likes

You just pick a random number yourself for a private key if you want.

Or even choose your own 12 words for a mnemonic phrase. But the 12th word is a checksum, so you can’t choose the 12th word yourself.

With a mnemonic phrase, you generate an xpriv / xpub wich is some kind of master private key where you can derive many more multiple keys using a derivation path.

https://themoneymongers.com/bitcoin-mnemonic-generator/

https://iancoleman.io/bip39/

2 Likes

If the NSA generated the SHA256 hashing function, why wouldn’t they have the key to how it works and therefore be able to reverse the hash to get the message?

SHA256 was invented in 2001 and was before they became bad guys :man_shrugging: just my guess, but it is know that it doesn’t have any backdoors because its open source and has been audited by many independent third parties.

3 Likes

I wish i was spending more time on class right now, but I can’t look away from the charts at the moment :stuck_out_tongue_winking_eye:

1 Like

Newbie here xD, I will go straight to the courses. I think the only thing that I could say about hashrate is that the more it goes up the more miners are active and the more robust the network becomes. :slight_smile:

2 Likes

I don´t see any pending questions and I don´t have any inquiries on my side at this point so I will just continue enjoying this nice course :face_with_monocle:

2 Likes


https://youtu.be/GT6AuURD8Y0

This video has a great explanation, but has horrible sounds in the background that are truly unsettling
Please I would love to hear a response. The sounds I hear are @ 47:20

1 Like

I have no further questions.

1 Like

Very interesting but i will revise two more times so is engraved in my blockbrain :crazy_face:

2 Likes

Functions?? I don’t have a clue, Just don’t understand.
I am so lost on these 4 questions

You mean the math functions?

Is it mere computing power that prevents us from reversing a hash to get the original input data :thinking:

Computing power mostly. :slight_smile:

Just wanted to say, peaked in this discussion before doing these modules for this part of the course, feels a bit over my head…but…just want to say thank you to all the bucks throwing down there brain cells and sharing these pertinent links - this is a real special place to be…
thank You again.

1 Like

It seems hashtag is so important , i am happy to start learning about it.

1 Like

Ivan - thank you for explaining smart contracts and dapps. Mind-blowing…so much innovation to be had. Truly enjoying myself.

2 Likes

What are hash functions and crytography? Are they smart contracts and dapps?