Functions, Hash Functions, Cryptography - Discussion

You raise a serious issue. I’m only in BTC for as much USD as I can squeeze out of it. If you might, and for this old man, elaborate more on what this “bug bounty program” is and how BTC could be attacked or destroyed. Somehow or someway the big boys are going to destroy it to own it all. BTC is a distributed node ledger. Who is to say the CIA or Fed Res can’t find these people and make offers they can’t refuse to rig rig, fool the silly people conned into thinking it is anything beyond a money laundering scheme? Anything digital can be hacked. The only way BTC can stay strong is if the node holders stick to their guns but everyone has a price. Rothschild knows this. They have their ways. I could be crazy on this but I don’t think so. It’s how gangs work.

Here’s my take – the integrity of the miners or node holders or those who own and run the operations could easily be bought out by Federal Reserve to put full stop to reap all the digital gold as their plan is to issue so much debt as all the world ever country, every person on earth owes them. They are slaves to this system. IF the integrity of all the node holders and miners and their families stay true to this mission long enough to see the Fed and Rothschild’s complete and utter destruction, Earth shall be free of their 300 year long plot against all of humanity. This must include the complete destruction of Israel and all its infrastructure. When one understands Talpiot, one might understand why Israel and their “vaccines” cannot stand, period, the end. My generation is aged out. You guys must carry forward.

In the video, it was stated that the private key is used to sign the transaction and the sender’s public key can be used to verify that the transaction came from the sender itself. In that case, does the bitcoin program has to search for all the public key of all the wallets to determine the match for the signature and consequently determine who the sender was? won’t that be an inefficient process? please correct me if I am wrong.

The public key is actually included in the tx structure. So you don’t need to query all the blockchain. :slight_smile:
You can have a look at it here:
https://developer.bitcoin.org/examples/transactions.html

3 Likes

In the article “What is Bitcoin hash” I found this part difficult to understand:

The article text:
In order to successfully mine a block and receive compensation, mining software needs to hash the block’s header in order to get it equal to or less than the target. The target is a 256-bit alphanumeric code which all Bitcoin clients share. The lower the target’s value is, the harder it is to generate a new block.
Mining is considered a lottery because rewards are not based on work done. Each hash provides a random number between zero and a maximum 256 digit value. If your hash is below this target, you win the lottery. But oftentimes you will get a value above this target and the mining software will need to increment the nonce (block’s header). This involves changing the hash and trying again, over and over again.

“Mining software needs to hash the block header in order to get it equal or less than the target” …… what does that mean, to get it equal or less?

And how does this translate to:

“The lower the target is, the harder it is to generate a new block”

Thank you for help

The hash is basically just a random 256 bit number and for a block to be valid it has to be below a specified target set by the network.
Miners are mining the hash number by changing the nonce number and comparing it to the target, once they find a hash that fits, they have successfully mined a block. :slight_smile:

2 Likes

Thank you, I got it now :slightly_smiling_face:.

0 is an even number. And you posted your homework in the wrong thread.

Functions is a computation with unique input and unique output.

a. f(2) = 4
b. f(7 )= 17
c. f(0) = 0

f(x) = (x/4)-5

1 Like

You posted your homework in the wrong thread.

Thanks for the corrections.

I am excited about learning everything that’s coming up! i am as beginner as they come! I’ve never had any social media or anything like it. In fact, I have about 5 minutes in this message at the beginning of this sentence. NO JOKE!!

1 Like

Hi @ivan I have a question regarding the 2nd Use Case of Public and Private Key Cryptography.

Question: When sending Bitcoin to others, I need to “SIGN” my message using my Private Key? If that’s the case, will other people know my Private key (Which is kept as my secret)? Or can others derive my Private key from my “Signature”?

Thank you for your answers

Others can’t derive the private key from the signature. They can only verify by using your private key that you are the one that signed the transaction with it. :slight_smile:

1 Like

How does the Bitcoin hashing function vary the difficulty? Difficulty is apparently recalculated every 2 weeks.

It works by setting the difficulty so a block is found approximately every 10 minutes based on the 14 day average as you mentioned. :slight_smile:

If you want to know how big 2^256 is, watch this video:
https://www.youtube.com/watch?v=S9JGmA5_unY&ab_channel=3Blue1Brown

1 Like

These threads are a life saver! it’s great to have an idea or head start before you dive into the subject.

The videos were helpful. The link for the code to run the Merkle tree seemed like something that may come in handy soon.

1 Like

I will survive posting in the wrong thread. Thank you for letting me know. I’m getting the hang of the forum more and more.

It’s easy for me to complete a 450 piece fabric quilt/puzzle. I have BTC fabric coming and will make a symmetrical quilt.