3 lesser known Satoshi Nakamoto candidates

I didn't actually know this and find it very interesting. And even though @destriero points out the addresses are inactive, this is no way means they are inaccessible. Of course logistically, its doubtful he kept such good records that he would have keys to all of these addresses, and especially since they are all randomly generated so its not like he could have used a system for generating new wallets and only having to remember the system as to be able to reconstruct the private keys.

I understand the math of how long it would take for a collision to happen naturally, but its still crazy for me to think that there could be machines out there trying out random private keys all day long that would eventually hit a wallet with coins in them.

And then it hit me. If this is an actual fear, you could simply do a multisig setup. Finding one set of key by accident is said to be impossible for about 10,000 years, but now if you had to match it with another set of keys, well, that is magnitudes harder. But maybe what I don't understand is that perhaps two private keys simply go into a hash function and generate a private key that is still a 256 bit password. In this way, I wonder if its possible that one day, there could be some person who generates a new wallet address which would actually be the same as they private key that is used for a multi-sig setup. (my knowledge of multi-sig is very limited)

Mutlisig is a smart contract, you need 2 of 3, or 5 of 7, or n of y private keys to sign a transaction in order to transfer the bitcoins to a different address

upload_2022-11-25_10-54-58.png


----------

https://fortune.com/2017/04/15/bitcoin-collider/

https://lbc.cryptoguru.org/
 
When were multi-signs invented? I assume 2014ish? So it probably didn't exist back in 2012.

Satoshi's addresses are not multisig, they start with a 1 and was before the BIP (Bitcoin Improvement Protocol) upgrade for multisig was implemented

Legacy addresses work fine on the Bitcoin network. I still use Legacy addresses that start with a 1, but most times I use a segwit address as they use lower tx fees

https://news.bitcoin.com/everything-you-should-know-about-bitcoin-address-formats/
 
Mutlisig is a smart contract, you need 2 of 3, or 5 of 7, or n of y private keys to sign a transaction in order to transfer the bitcoins to a different address

View attachment 300230

----------

https://fortune.com/2017/04/15/bitcoin-collider/

https://lbc.cryptoguru.org/
Darn, can't read that article from Fortune since it's behind a paywall.

Do you think I am right in assuming that a multisig setup dramatically increases security and reduces the chance of a collision? I've seen enough info on quantum computing that it's still very far away from being a thing. But having to require two different keys to move funds from let's say a master wallet that has the bulk of your savings seems like an excellent strategy to mitigate loss of funds.
 
I will explain the rationale for my thinking. 24 words gives you the private key. If you use a passphrase on a hardware wallet, it gives you a totally different private key. It seems safer, because you need both the 24 words and the passphrase. But if this new private key is simply something that can be derived from a different set of 24 words, then it's not that much safer from a brute force hack perspective.
 
Darn, can't read that article from Fortune since it's behind a paywall.

Do you think I am right in assuming that a multisig setup dramatically increases security and reduces the chance of a collision? I've seen enough info on quantum computing that it's still very far away from being a thing. But having to require two different keys to move funds from let's say a master wallet that has the bulk of your savings seems like an excellent strategy to mitigate loss of funds.

The number of private keys are so large that there's not enough atoms in the known universe that having a multisig only increases the number private keys that contain bitcoins insignificantly i.e. a few millions or let's say even billions

----------

Bitcoin Wallets Under Siege From ‘Large Collider’ Attack
BYJEFF JOHN ROBERTS
April 15, 2017 at 2:19 PM PDT

A group called the “Large Bitcoin Collider” claims it can smash open bitcoin wallets by using a so-called brute force attack, which directs mass amounts of computer power at individual wallets in order to guess their private keys.

The project, which has been underway for months, relies on a distributed network of computers (similar to bitcoin itself), and invites anyone to participate—those who do could potentially share in the proceeds of the wallets cracked open.

A “trophy list” on the home page of Collider (an apparent reference to the Hadron Collider) suggests the group has successfully opened over a dozen wallets, though only three had any bitcoin in them. It’s unclear if the group is motivated by financial gain or the cryptographic challenge of smashing wallets—the answer is probably both based on the site’s webpage and outside observers.

A Q&A list on the Collider’s website says robbing even a tiny amount from non-profit group like the Internet archive “would make you an unconditional jerk.” But it also suggests other wallets are fair game, and that proceeds would be divvied up among the Collider participants.

Meanwhile, others think the wallet-smashing endeavor is a fool’s errand, according to Motherboard, which first reported on the Large Bitcoin Collider. In this view, the project is too hard and the rewards too low and infrequent (as this Reddit commenter explains) to pay off.

But some speculate the goal of the project is not to rob a whole lot of wallets, but instead to strike a mother lode from a long-lost wallet from bitcoin’s early days:

“About 10% of Bitcoins were created early, before 2012, and have never been traded. If somebody ever finds the key of the early lost Bitcoins, they’ll have a huge payoff, over a billion dollars. Speculation is that either “Satoshi Nakamoto”, whoever he is, is holding onto them for a big payoff, or somebody lost the private key for all those early Bitcoins. As the years go on, the second explanation seems more likely,” said the top comment on the site Hacker News.

As for the process of cracking open wallets, it involves the laborious task of creating private keys—which are dozens of characters in length—and trying them against existing bitcoin addresses. The Collider has so far created and checked 3,000 trillion private keys, a researcher told Motherboard.

As for the legality of all this, it’s unclear. On one hand, the law is pretty clear that you are not supposed to join a conspiracy in order to rob people. But on the other hand, as the group’s website points out, “It is not illegal to search for colliding private keys.”

For bitcoin owners, the risk of the Large Bitcoin Collider performing a stick-up on your private wallet is pretty tiny for now. But if the process also results in someone creating a collision for bitcoin’s general hashing algorithm—as happened with the longtime crypographic standard SHA-1 (cracked by Google this year)—that would spell a lot more trouble, though as one reader points out, bitcoin’s encryption algorithm can be upgraded.
 
Similar video to the one posted in the OP, discussing Le Roux and Adam Back:


Personally I think it was 3 of them, Hal Finney, Nick Szabo and Adam Back.

On Blockstream:

 
Last edited:
Thanks for the copy and paste. I notice it's from 2017 so I'm curious about the updates. Will be checking out their website!

I contributed hash to it for a few months in 2017 or 2018 in order to put my mind at ease that Bitcoin private key system is secure as I understand it to be

During my time of participation, I was using 3 AWS large instance, 16 and 32 CPU's, this is from memory but I believe in aggregate my throughput was around 600 Million private keys per second processed

It was at the height of the LBC project's popularity due to that article. Very controversial project on r/Bitcoin due to the possible theft of bitcoins

I believe at that time, LBC was processing over a trillion private keys per day
 
Back
Top