See More CryptosHome

SHA

Safe Haven

Show Trading View Graph

Mentions (24Hr)

0

0.00% Today

Reddit Posts

r/CryptoMoonShotsSee Post

Introducing Galleoncoin / GALE : PoW privacy coin with masternodes.

r/CryptoCurrencySee Post

Comparing Supercomputer networks to Bitcoin - How to convert exaflop to exahash?

r/CryptoCurrencySee Post

Comparing Supercomputer networks to BTC - How to convert exaflop to exahash?

r/BitcoinSee Post

Bitcoin computes this SHA-256 hash function 550,000,000,000,000,000,000x times EVERY second

r/BitcoinSee Post

Entropy: only 121 bits (vs 128) on Blockstream Jade using dice rolls?

r/BitcoinSee Post

Why BTC is considered safe ?

r/BitcoinSee Post

Wise men still seek him...a Christmas thought

r/BitcoinSee Post

Do you think that Quantum Computing poses a threat to BTC encryption, algorithm, and/or security?

r/BitcoinSee Post

Tatsuaki Omamoto - creator of SHA-256 (1996!!!)

r/BitcoinSee Post

A.I. Could break bitcoin/SHA256

r/BitcoinSee Post

Bitcoin Qubit SHA256

r/BitcoinSee Post

Is it possible for the energy input to break the difficulty adjustment?

r/BitcoinSee Post

Bitcoin SHA-256 algorithm Quantum protection

r/BitcoinSee Post

Bitcoin Quantum Protection

r/BitcoinSee Post

Bitcoin Quantum Protection

r/BitcoinSee Post

Are P2WSH addresses the most quantum-secure addresses?

r/BitcoinSee Post

Will AI destroy bitcoin?

r/BitcoinSee Post

Does SHA256 have limitation?

r/BitcoinSee Post

Can anyone here explain how / why it is not possible to get AI involved in the bitcoin mining industry / process?

r/BitcoinSee Post

Is Bitcoin really created by the government?

r/BitcoinSee Post

Verifying latest block

r/CryptoCurrencySee Post

Decrypt the Shadows: Unearth a New Order of Decentralization [SERIOUS]

r/BitcoinSee Post

Bitcoin is such a large idea its hard to wrap my mind around it

r/BitcoinSee Post

Unexpected Record: Balance of 50k Bitcoins Found in Calculation - Seeking Advice

r/CryptoCurrencySee Post

Potential Security Loophole for all cryptocurrency.

r/CryptoCurrencySee Post

Funny story about WIRED magazine and how they threw away (and lost forever) 13.35 BTC in 2013

r/CryptoCurrencySee Post

Funny story about WIRED magazine and how they threw away (and lost forever) 13.35 BTC in 2013

r/BitcoinSee Post

China’s new supercomputer can crack SHA256

r/CryptoCurrencySee Post

SHA3D (our algorithm) isn't prone to 51% attack.

r/CryptoCurrencySee Post

Celebrating 12 Years of our Digital silver - Litecoin

r/BitcoinSee Post

ELI5: If Bitcoin Mining is really just guessing inputs to SHA256 until an output matching the difficulty comes up, how does a miner know what guesses to avoid (previous failed guesses) in order to mine most efficiently ?

r/BitcoinSee Post

Bitmain Antminer S21 Hyd

r/CryptoCurrencySee Post

Is The National Security Agency (NSA) Behind The Invention of Bitcoin?

r/CryptoCurrencySee Post

This Engineer Is Creating a Bitcoin Game Changer

r/CryptoCurrencySee Post

[1998] Hal Finney: A zero-knowledge proof of possession of a pre-image of a SHA-1 hash

r/BitcoinSee Post

[1998] Hal Finney: A zero-knowledge proof of possession of a pre-image of a SHA-1 hash

r/CryptoCurrencySee Post

Bitcoin mining on the blockchain, what exactly does a miner do? What is an ASIC? How the mining difficulty is adjusted? What if two miners find the answers at the same time? This post aims for the complete beginners as it is explained in very simple terms.

r/CryptoCurrencySee Post

A really well done & informative description of LTC by NDAX - A Canadian Exchange. Bravo!

r/CryptoCurrencySee Post

Satoshi, NSA and the SHA CRYPTOGRAPHY Algorithms

r/CryptoCurrencySee Post

Ken Shirriff showing how to mine bitcoin with pen and paper

r/BitcoinSee Post

Sha256/Nonce Question

r/BitcoinSee Post

ELIF - Why aren't ML and GNNs used to solve hashing in a Traveling Salesman Problem context?

r/BitcoinSee Post

One about Mining, Proof-of-Work and difficulty.

r/CryptoCurrencySee Post

One about UTXO's, new outputs, inputs and previous outputs.

r/BitcoinSee Post

One about UTXO's, new outputs, inputs and previous outputs.

r/CryptoCurrencySee Post

Bitcoin can survive brute force attack it's infeasible or impossible?

r/BitcoinSee Post

Satoshi era key

r/CryptoCurrencySee Post

One about HD-wallets, master keypair, child individual keys.

r/CryptoCurrencySee Post

One about HD-wallets, master keypair, child individual keys.

r/BitcoinSee Post

One about master key pair, child individual keys, addresses and signatures.

r/BitcoinSee Post

One about master keypair, child individual keys, addresses and signatures.

r/BitcoinSee Post

One about HD-wallets, master keypair, child individual keys.

r/CryptoCurrencySee Post

19 years ago today, Hal Finney officially released Reusable Proof of Work (RPoW)

r/BitcoinSee Post

why is it always a result of a SHA256 ?

r/CryptoCurrencySee Post

Lets Talk Quantum Computing

r/CryptoCurrencySee Post

What is a blockchain? - A noob explanation

r/BitcoinSee Post

Quantum computers coming back

r/BitcoinSee Post

Potential vulnerability?

r/CryptoCurrencySee Post

TIL: Bitcoin 101 - Hashing Algorithms

r/BitcoinSee Post

Open Source Initative | Documenting Bitcoin in a new way

r/BitcoinSee Post

Writing a summary on HD wallets, first part done, correct so far ?

r/BitcoinSee Post

Final part of SHA256 structure part.

r/CryptoCurrencySee Post

[ANN] AsicCoin (ASC) | SHA256 - The coin for ASIC Mining!

r/CryptoCurrencySee Post

This sub truly blows my mind….

r/BitcoinSee Post

I'm really worried about SHA-256

r/CryptoCurrencySee Post

How to (instruction) quickly make wallet with right balance of safety and usability

r/BitcoinSee Post

Verifying bitcoin core

r/BitcoinSee Post

Bitcoin uses SHA 256 hash functions

r/CryptoCurrencySee Post

Flaws of Bitcoin

r/CryptoCurrencySee Post

[Serious] Is Bitcoin secure? A reaction to “BTC whales are waking up, were their wallets hacked?"

r/BitcoinSee Post

Satoshis secret message

r/BitcoinSee Post

SHA-246 Visual w/ Mining Header

r/BitcoinSee Post

How can I fix this?

r/CryptoCurrencySee Post

Countering all the major anti-crypto arguments in one post.

r/BitcoinSee Post

Part of SHA256 Visual Mapping

r/CryptoCurrencySee Post

A quick explanation the CZ Interpol Red Notice Rumour

r/CryptoCurrencySee Post

phishing email "from" coinbase passes dkim?

r/BitcoinSee Post

Can ChatGPT4 have the computational power to break the SHA-256 encryption? Or does that have nothing to do with it?

r/BitcoinSee Post

Specter verify SHA256SUMS.asc Not Matching

r/CryptoCurrencySee Post

Computer Science IB Extended Essay

r/CryptoCurrencySee Post

Quantum computing and crypto developments

r/BitcoinSee Post

SHA 256 is a cryptographic hash function that is used to secure and validate transactions on the Bitcoin network. This algorithm was originally developed by the National Security Agency (NSA) in the United States as part of a series of secure hash algorithms.

r/BitcoinSee Post

Who would've thought that the algorithm used by the world's most popular cryptocurrency was originally designed for space exploration? That's right, NASA's SHA-256 algorithm is the backbone of Bitcoin's security and immutability.

r/BitcoinSee Post

Bitcoin’s SHA256, nonce hitting above the target.

r/CryptoCurrencySee Post

It's a Trap!

r/BitcoinSee Post

What do you guys think will happen to bitcoin if quantum computers break SHA256 and solve the discrete logarithm problem (ECDLP)?

r/CryptoCurrencySee Post

SHA256 vs Scrypt: How Comparing Hash Rates is Misleading | NKMAG

r/CryptoCurrencySee Post

Litecoin vs Ripple: Differences, and Everything You Need to Know

r/CryptoCurrencySee Post

MoneyShow announces the Peercoin blockchain will be used as an important part of its new newswire service.

r/BitcoinSee Post

How do I generate master key from the root seed

r/CryptoCurrencySee Post

Storing seed phrase on encrypted USB drives

r/BitcoinSee Post

I found the money, but I can't get it out

r/CryptoCurrencySee Post

Going back to basics, Bitcoin 101

r/CryptoCurrencySee Post

How does mining work?

r/CryptoCurrencySee Post

How mining works?

r/BitcoinSee Post

How mining works?

r/BitcoinSee Post

A few questions.

r/BitcoinSee Post

SHA256 Vs. Scrypt

r/BitcoinSee Post

Does Quantum Computing pose a threat to SHA-256?

r/CryptoCurrencySee Post

Do this to verify your BTC holdings in Binance new Merkle Tree Proof of Reserves And Liabilities

Mentions

You seem to be Bitcoin genius, now explain to me what shor's algorithm can do and it's limitation to SHA256. No AI, no chat gpt, explain it well.

Mentions:#SHA

I've been thinking a lot about why people who so clearly don't understand the space they're in would stick around in it to complain about it. They watch 1 second charts, constantly following crypto news, consuming influencer swill, and interacting with the market multiple times a day. They obsessively check their portfolio and get raging mad when the price goes down, and feel nothing when the price goes up because they bought way higher. The average "crypto investoor" is someone who's never heard of Bitcoin or cryptocurrency before. They have no idea what blockchain does, they've never heard of SHA256, Satoshi Nakamoto isn't a name they've ever been familiar with. The only reason they've even heard about the market is because they were scrolling youtube (without an adblocker) and saw some ad from one of their favourite influencers talking about making SO much money in cryptocurrency! 100x coins WOW! GET RICH HERE! At the very height of the run, at all time highs. They clicked the embedded ad and got a video of the influencer saying how he was going balls deep in this hot new coin, WIF! It's a picture of a dog with a hat! WOW! It's at $4.50, which is a 5000x gain from when people originally bought it, but it has SO MUCH ROOM to go up still! Smiling, the investoor follows the steps in the video, slapping down a huge chunk of change on Coinbase that he sends from a wire transfer after KYCing and verifying his identity. He goes back to his life, completely forgetting he ever bought WIF but is confident that in a year he will be richer than king midas, holding the newest in digital technology. He comes back a few months later, wondering what is happening with his huge investment. Surely it's at least $20 each by now he thinks, logging into coinbase. He looks in shock - The price is $0.40, a 90% loss! How could this happen! What's going on! Did my account get hacked! He goes to look at his favourite influencers recent videos and there is no mention of WIF, instead he is talking about something called PI Network. The investoor is shocked. Why would the influencer abandon such a sure thing? He watched the video and was so sure he was going to make money. He logs into Reddit, angrily decrying the coin as a scam. He was set up! The market is rigged! Cryptocurrency is nothing but a sham! After a few months of decrying it as a scam, he finds a place called buttcoin, where people like him also say the market is rigged. He becomes a buttcoin poster, making sure to log in every day to post about how Bitcoin is now dead and the market is a hoax. The investoor could sell and cut his losses, but to do so would mean accepting that he is to blame for his own decisions. To push that button, that awful sell button would make him responsible for the things he's done, so it becomes something growing inside of him, something he can never do, something he can never accept responsibility for. Maybe it'll go up eventually, he thinks. Years pass, eventually even spamming Reddit and buttcoin grows old. He forgets the password to his coinbase account, and the coins are forgotten forever. He never learned about Bitcoin. He never had a need to enter a space where you trade person to person, or had a reason to get off the banking rails the rest of society uses. He wasn't a cypherpunk, he wasn't even an idealist or libertarian. He was just a gambler who thought he pushed the right combination of numbers because someone else told him to.

> SHA256 graph networks leading to quantum entanglement based clairvoyance I understand SHA256. I understand the concept of a SHA256 graph. I understand what a network is. I understand the concept of quantum entanglement. I understand the concept of 'clairvoyance.' Putting those words together like that, is complete nonsense as far as I'm concerned. You may as well said "Quick, hand me the headlight fluid" or "Go get me the elbow grease"

Mentions:#SHA

Correct, but that is only known now, or more recently known because of the Snowden leak. Before that, no one outside the NSA had the information needed to tell which algorithms were safe and which ones were quietly weakened. So the question is why Satoshi chose SHA-256. Was it random? I do not believe that. Was it just personal taste? Possible, but unlikely given how many other hash functions were more common and more widely adopted at the time. The stronger explanation is that someone involved had access to knowledge the public did not. Either they were a genuine expert with insider level understanding of cryptographic weaknesses, or they were in a position where they already knew SHA-256 was the only safe choice based on information that did not become public until years later. It is hard to deny that this makes a strong argument.

Mentions:#SHA

SHA-256 was invented in 2001 by the NSA. However, btc is based on a lot of other technology dating back decades before that.

Mentions:#SHA

You are arguing against something I never claimed. I never said SHA-256 has a backdoor. In fact I said the opposite. The entire point is that SHA-256 is one of the few NSA designed primitives that does not have a backdoor, while others from the same era did. That is exactly why it raises the question. Back then the public could not tell which algorithms were safe and which ones were weakened. Only the NSA had that internal knowledge. Bitcoin then ends up using the one NSA linked algorithm that actually turned out to be solid. We cannot prove it has no backdoor, but all current evidence and more than 20 years of analysis strongly indicate that SHA-256 is clean. It has had even more scrutiny since the Snowden leaks, and nothing suspicious has ever been found.

Mentions:#SHA

I see your point but it is speculation to assume just because the Snowden leaks revealed that the NSA had implemented a backdoor in Dual\_EC\_DRBG, it does not automatically mean SHA-256 has a backdoor. Claiming that SHA-256 is compromised without any direct evidence is guesswork in my opinion.

Mentions:#SHA

That would make sense if people already knew which algorithms were genuinely secure at the time, but they didn’t. The only group that had the internal knowledge to know which designs were actually solid and which ones were quietly weak was the NSA. The rest of the world found out years later, in 2013, when the Snowden leaks exposed the fact that some NSA promoted algorithms were intentionally compromised. So the idea that SHA-256 was simply “the most secure and everyone knew it” does not hold up. Back then there was no proven way for the public to know which hash functions had hidden weaknesses. The NSA, however, did know. And Bitcoin happened to use the one NSA linked algorithm that turned out to be the genuinely safe choice. Which is why there is a strong argument to say the NSA was involved in some way either directly or an employee who was exposed to this knowledge.

Mentions:#SHA

It is quite clear why they created weak algorithms alongside strong ones. You promote the encryption that you can break so the rest of the world adopts it, and you keep the one that you know is solid for your own use. That is exactly what happened with Dual_EC_DRBG. They pushed it as a secure option while keeping the backdoor to themselves. SHA-256 ended up being one of the few primitives with no weakness, which fits the pattern of an agency knowing exactly which designs were safe and which were compromised. Now ask why SHA-256 was used when other more popular and widely adopted hash functions existed at the time. Why was the one truly secure option chosen for Bitcoin. And often the simplest answer is the right one.

Mentions:#SHA

The really question is why SHA-256 was chosen at that time, over the others. SHA-256 was developed by the NSA, and it is one of the few NSA designed primitives that has held up with no evidence of a backdoor. This matters because the NSA has pushed algorithms in the past that did contain a backdoor. The best example is Dual_EC_DRBG, which the Snowden leaks confirmed was intentionally weakened. There is also the often referenced research paper titled “How to Make a Mint - The Cryptography of Anonymous Electronic Cash” written inside a US government agency in the mid 1990s. It describes a digital cash system with several ideas that later appeared in modern cryptocurrencies. That shows the concept of government researchers thinking about anonymous digital money long before Bitcoin existed. So the question is, and it is a valid one, how did Bitcoin end up using the one NSA linked algorithm that actually turned out to be safe, at a time when only the NSA would have known which designs were truly solid. It does not prove anything, but it does make it more believable that the NSA had some involvement, or that an employee with insider knowledge of which algorithms were secure played a part.

Mentions:#SHA

SHA-256 was developed by the NSA, and it is one of the few NSA designed primitives that has held up with no evidence of a backdoor. This matters because the NSA has pushed algorithms in the past that did contain a backdoor. The best example is Dual_EC_DRBG, which the Snowden leaks confirmed was intentionally weakened. There is also the often referenced research paper titled “How to Make a Mint - The Cryptography of Anonymous Electronic Cash” written inside a US government agency in the mid 1990s. It describes a digital cash system with several ideas that later appeared in modern cryptocurrencies. That shows the concept of government researchers thinking about anonymous digital money long before Bitcoin existed. So the question is, and it is a valid one, how did Bitcoin end up using the one NSA linked algorithm that actually turned out to be safe, at a time when only the NSA would have known which designs were truly solid. It does not prove anything, but it does make it more believable that the NSA had some involvement, or that an employee with insider knowledge of which algorithms were secure played a part.

Mentions:#SHA

SHA-256 was developed by the NSA, and it is one of the few NSA designed primitives that has held up with no evidence of a backdoor. This matters because the NSA has pushed algorithms in the past that did contain a backdoor. The best example is Dual_EC_DRBG, which the Snowden leaks confirmed was intentionally weakened. There is also the often referenced research paper titled “How to Make a Mint - The Cryptography of Anonymous Electronic Cash” written inside a US government agency in the mid 1990s. It describes a digital cash system with several ideas that later appeared in modern cryptocurrencies. That shows the concept of government researchers thinking about anonymous digital money long before Bitcoin existed. So the question is, and it is a valid one, how did Bitcoin end up using the one NSA linked algorithm that actually turned out to be safe, at a time when only the NSA would have known which designs were truly solid. It does not prove anything, but it does make it more believable that the NSA had some involvement, or that an employee with insider knowledge of which algorithms were secure played a part.

Mentions:#SHA

The quantum issue is a global problem. Not reusing addresses, using segwit, maybe taproot, and everything else, are some possible solutions. We have 1211 QUBITS today, if I remember correctly, running unstable for micro seconds. To break SHA256, it takes around millions, for about 9 hours in a stable way. We are very far away. Until then, there will be a solution. And if there isn't, relax, it's not your share on the stock market that's safe, it's not your bank balance.

Mentions:#SHA

SHA-256

Mentions:#SHA

Do people compute SHA256 hashes in their head if they aren’t at a computer? Schiff is a goof but this is nonsense. 

Mentions:#SHA

So House Democrats and Jamie Raskin say Donald Trump ran the “most corrupt crypto startup” because he made money, held billions in assets, pardoned executives, and dismantled regulators. That’s political turbulence. Bitcoin is aerodynamics. You can accuse presidents, shut down agencies, write reports, and chase scandals — none of that changes the thermodynamic truth of a decentralized monetary network that produces a block every ten minutes, immune to politics, corruption, or human error. You can investigate a politician. You can’t investigate SHA-256. So honestly… what does any of that have to do with Bitcoin?

Mentions:#SHA

Look, talking about the U.S. invading Venezuela for resources is like arguing over how to shovel more coal into a steam engine while everyone else is flying in hypersonic jets. Bitcoin is an energy-optimized thermodynamic monetary network. Oil, land, borders… that’s outdated tech. Trying to secure prosperity through invasion is basically running 20th century geopolitics on a system that’s already been replaced by encrypted digital scarcity. You can invade Venezuela. But you can’t invade SHA-256. You can’t occupy a decentralized consensus mechanism spread across the planet like a self-repairing electrical grid. If anything, more geopolitical chaos just speeds up the move into Bitcoin because people want the strongest, most energy-anchored asset ever engineered. So really… what does any of that have to do with Bitcoin?

Mentions:#SHA

Used Grok to answer your question since I didn't want to type the entire thing out myself: Bitcoin mining in 2025 is basically solving complex math puzzles to validate transactions and earn newly minted BTC plus fees. You do this with specialized hardware called ASICs (Application-Specific Integrated Circuits) that crunch the SHA-256 hash function nonstop. The network difficulty is extremely high, so solo mining with anything you can buy as an individual is effectively impossible—you’d win a block maybe once every few centuries. **What to buy (realistic home/retail level):** * A modern ASIC miner: Bitmain Antminer S21, S21 Pro, or MicroBT Whatsminer M60S series (200–350 TH/s, 3,500–6,000 W power draw). Expect to pay $2,000–$6,000 new, less on secondary market. * Cheap electricity (under 6–8¢/kWh) or you’ll lose money. Good cooling/ventilation (these things are loud and hot). * A decent power supply (PSU) if not included, and a mining-friendly wallet. **Pool or solo?** Always join a pool. Pools combine thousands of miners’ hash power and pay you tiny fractions of every block proportionally (e.g., Foundry USA, AntPool, F2Pool, ViaBTC). Solo mining today is like playing the lottery with one ticket while pools give you steady, small payouts (think salary vs. hoping to hit Powerball). Even with one S21, a good pool will pay you $5–20/day before electricity costs (at \~7¢/kWh you might break even or slightly profit, depending on BTC price). Bottom line: Unless you have access to very cheap power (<5¢/kWh) and can handle noise/heat, mining at home is usually not profitable in 2025. Most people buy Bitcoin directly instead.

Mentions:#BTC#SHA#USA

NSA created SHA256 remember.

Mentions:#SHA

If quantum computing becomes a threat, the safety of your bitcoin is in your own hands, anyone can quantum proof their btc as quickly as they'd like to. The safety of any money you have in a bank is out of your control, tied to its institutional timeline. Banks need to coordinate with regulators, migrate their legacy systems, update the payment clearing networks, etc. You avoid all of this. SHA-256 is quantum resistant for the foreseeable future, so you can even do it today if you want to. All that involves is creating a SHA256-only UTXO, wrapping it in P2WSH or Taproot (this allows the network to accept custom scripts) and sending your coins to it. Moving them out is harder, you'd need to manually build the transactions (though there are libraries like python-bitcointx that make this easier) and broadcast them from a node.

Mentions:#SHA#WSH

serious question, if SHA-256 is breakable or whatever. What do we need to do, re-encrypt the whole ledger? How is something like that even feasible. We would need to render disabled all the ledgers out there, and force clients to re-download? just curious

Mentions:#SHA

Quantum FUD comes up every few months but the reality is pretty simple. First, hardware capable of breaking SHA-256 might never exist in practice. The theoretical requirements are so absurd that even experts in the field agree we are nowhere near it. Second, Bitcoin can adapt. If quantum ever became a real threat, the network can upgrade its cryptography long before anything breaks. There is nothing sacred about SHA-256. Bitcoin is not a static rock. And honestly the question is almost irrelevant. If quantum computers could crack Bitcoin’s security, they would also break banks, the military, nuclear command systems, the entire internet, pretty much every form of encryption we rely on. Bitcoin would be the least of humanity’s problems at that point. So no, quantum does not “render Bitcoin useless.” If anything, it exposes how little people understand the scale of the problem.

Mentions:#FUD#SHA

SHA-256 is NSA patent on their website. Bitcoin Core devs will try to quantum proof SHA-256. At least I hope they try or else..

Mentions:#SHA

I see, well this is what Ive learned so far if you’re interested: The expectation now is that a quantum computer capable of breaking the SHA-256 hashing algorithm (what basically the entire internet uses for security among other things) wont appear until a few decades in the future. In the meantime scientists are already researching quantum proof algorithms. Since this is top priority for the entire world I believe they’ll get it done long before quantum becomes a threat. That said, Satoshi’s wallets with 1 million btc are on legacy wallets. If quantum can “break SHA-256”, it means it can simutaneously try a ton of combinations and brute force the private key of these old wallets. The market will be flooded with new btc, which will inevitably cause a crash. Once all old wallets are quantum hacked, all btc will be on quantum secure wallets and we can all move on with our lives.

Mentions:#SHA

If the hashing algorithm is then BTC can and will be improved to overcome that. The transition would be chaotic, but even Satoshi has already thought and talked about this. The biggest concern would be getting everyone to agree on the new hashing algorithm, since miners who have dumped a lot of money into hardware specific to SHA256 would stand to lose a lot switching to an algorithm their hardware can't perform on.

Mentions:#BTC#SHA

Lmao ya'll are so naive and shortsighted, it's actually mind-blowing. >old technology Lmao it's a first-of-its-kind decentralized network that can be upgraded as necessary. People like you are the same types that fall for the quantum-resistant crypto narratives, and have almost no idea that if SHA-256 was broken we would literally have to change the entire traditional TradFi system first. Crypto would be the least of our worries in that scenario. We can see WLFI wallets. They are still accumulating BTC. If you are talking about altcoins like Melania, or Trump coin then anybody who purchased those absolutely deserve to get pwned in a rug pull.

Mentions:#SHA#WLFI#BTC

Not really man. Quantum computing is decades away from being applicable in the manner you think and really if it made SHA-256 and other encryption redundant, there's much bigger problems we face than the price of BTC.

Mentions:#SHA#BTC

SHA256 is the hashing method. Encryption scrambles the data. Hashing ensures the data hasn’t changed.

Mentions:#SHA

SHA-256 = NSA Federal reserve 2.0 15year prime mover advantage. Genesis block is US GOV The NSA and Bitcoin: Origins of the SHA-256 Hashing Algorithm https://share.google/WCtA2WoZFQiA8vZk2

Mentions:#SHA#GOV

Zcash wallet has Tor integrated and you should always use a SHIELDED address. I just said the public SHA256 transaction is corrupted. What’s the problem? Fu** the NSA.

Mentions:#SHA

It will all make sense when you lookup who created SHA265... It was the NSA.

Mentions:#SHA

with CBDC’s coming up on the horizon and virtually everybody being against them I don’t see crypto being more than a speculative counter currency, and even possibly we’ll go all the way to zero like the tulip bubble in Holland. We aren’t there yet though. Institutions are trying to force crypto on people, and it’s basically surveillance capitalism mixed with the complete demise of Fiat so people are wising up to the facts that banks in central banks are the ones creating CDCs and all crypto NSA created SHA256 encryption which runs bitcoin, and isn’t particularly special given that cell towers use it email uses it. It’s not special. The only difference is that bitcoin app pens, a ledger to each coin. I think the idea of proof of work being an energy battery is almost interesting, except that the energy could be used to create actual physical products instead of having to basically double that energy to do the same thing. So instead of “storing “the energy in bitcoin it should just immediately be spent because you’re not actually getting the energy back, it is literally pretend, and everybody is agreeing that it has value, but when you actually think about it you are just having to expend energy twice. It is similar to debt as money. That’s part of why it works, but also part of why it’s volatile which makes it bad as a currency. For a currency to be adopted, it needs universal adoption, which is why it’s being forced on us through CBDCs, the problem, though is that the money inside of cryptocurrency is being gambled by the ultra wealthy, so they actually have access to the keys of CBD sees at the very least, if not bitcoin, which I believe was created by the NSA. It would be absolutely idiotic to think that the NSA creates SHA256 encryption in 2009 then bitcoin comes out. Nobody knows who Satoshi yakamoto is, then at the same time the bank of international settlements in Basel Switzerland, which is the central bank for central bankers, has all of these endeavors to re-engineer the financial, digital infrastructure, and at the same time all of these countries are fighting them while the media doesn’t show these revolutions happening in Mexico in London etc. Bitcoin was not a grass roots movement, it was a top down movement created by governments in order to experiment with currency and to keep the US dollar predominant across the globe, which is why Trump is now backing the US dollar with bitcoin. Paper money and Fiat is so much better for an anonymity that it’s almost farcical to think that a digitally traced currency could possibly be more anonymous. If you understand anything about how data is transferred through servers, you would know this is a joke. It’s just too complex for most people to wrap their heads around. But you don’t need to understand it on a technical level to realize it’s just locked up money in a cage that elite people can access while you’re not using it to gamble with it in highly risky, so-called assets like derivatives, other meme coins, scam, coins, and rug poles in order to transfer wealth from the lowest classes to the upper class “legitimately”. That is the narrative that will end cryptocurrency, but unfortunately, I don’t even know what will take its place.

Mentions:#SHA

bitcoin is only protected with SHA-256 encryption, like most internet traffic.

Mentions:#SHA

Addresses that exposed their public key (by sending coins) aren't protected by SHA256. They are only protected by ECDSA, which will be vulnerable sometimes in future. Estimated 6-6.5 million BTC has public key exposed. Some of them would move once quantum-proof cryptography is ready, but inactive coins including those belonging to Satoshi likely won't. The only way to prevent a gold rush to crack exposed public key is to freeze them, but that is very controversial because it is against principle that who has the key control the coins.

Mentions:#SHA#BTC
r/BitcoinSee Comment

Bitcoin keys use ECDSA. All articles about "seized" bitcoin should be read as "surrendered" bitcoin. No they did not use some imaginary SHA256 backdoor to crack ECC based bitcoin keys. Those are not the same things. Pull up a grokipedia page on both and read them.

Mentions:#SHA#ECC
r/BitcoinSee Comment

"The origins of SHA-256 can be traced back to ***intelligence services in the US***, namely the National Security Agency, or the NSA for short." quick google search can prove it

Mentions:#SHA
r/BitcoinSee Comment

"SHA-256 was developed by the U.S. National Security Agency (NSA) in 2001"

Mentions:#SHA
r/BitcoinSee Comment

Because the government has a backdoor to all crypto, bitcoin uses SHA-k algorithm, which was created by the NSA funnily enough, decentralized my ass..

Mentions:#SHA
r/BitcoinSee Comment

Yes and no. Any new cryptocurrency using PoW in the way Bitcoin uses it has a decision to make: 1. Use SHA-256 like bitcoin, and get access to huge amounts of hashrate from existing bitcoin miners 2. Use another hash algorithm and go through the process of building hashrate in the same way bitcoin did (CPU mining > GPU mining > FPGA mining > ASIC mining) In any case, it doesn't mean bitcoin is unique. Bitcoin was just first.

Mentions:#SHA#CPU#GPU
r/BitcoinSee Comment

You aren't going to make any money mining bitcoin unless you have access to very cheap electricity and you are willing to buy some efficient SHA-256 hashing application specific integrated circuits. If you just want to buy a cheap bitcoin miner to tinker with and do some mining for fun, then you can buy a small cheap lottery miner like a Bitaxe.

Mentions:#SHA
r/BitcoinSee Comment

I think this would be true for an altcoin that uses SHA256 as a hash to mine by itself. However, you can use an alternative hash incompatible with the ASIC mining rigs used for bitcoin. Also, some coins (e.g. Rootstock) use merged mining that piggybacks on bitcoins hashrate but doesn't harm it. When done, it actually makes the crypto more secure and provides miners with extra revenue. https://www.binance.com/en/academy/glossary/merged-mining

Mentions:#SHA
r/BitcoinSee Comment

Don’t store raw crypto private keys (seed phrases / raw private keys controlling funds) in SafeNotes or any general-purpose note app on a phone if you value those funds. You can store lower-value secrets there with strong mitigations, but private keys/seed phrases deserve hardware-backed storage (hardware wallet / secure element) or a dedicated wallet with audited key management.  Why — quick threat rundown • Mobile note apps (even “encrypted” ones) rely on symmetric encryption derived from a passphrase. If the KDF, AES mode, IV/tag handling, or backup format are implemented incorrectly, ciphertext can be weakened or integrity lost. I could not verify the exact KDF & AES-mode from the repo page alone. That’s a critical implementation detail.  • Even correctly-implemented local encryption can be defeated if the device is rooted, infected with malware, or if backups are stored unencrypted in cloud storage. SafeNotes explicitly warns features can’t be guaranteed on rooted devices and there are open issues suggesting backup encryption concerns. That increases risk for keys.  • Phone memory, clipboard, screenshots, Android/iOS backups, ADB access, or poorly-protected export files are all common leakage vectors for secrets stored in apps. An attacker with device access or a malicious app can often escalate to extract key material unless the app uses hardware-backed key stores and zeroes memory properly. Specific things I found (relevant to key storage) • Project claims AES-256, local storage only, and automated encrypted backup. Those are good signals, but claims ≠ proof — the security depends on how keys are derived, which cipher mode is used (AEAD like AES-GCM vs. CBC+HMAC), and whether backups are actually end-to-end encrypted.  • There are issues on the repo regarding backups and decryption (e.g., “Backup Date Not Encrypted”, “Decryption of json-backup”). That suggests backup handling and encryption of exported files is an active pain point. I’d treat backups as suspect until confirmed otherwise.  If you must store keys in SafeNotes (how to reduce risk) If you absolutely must keep a private key on the phone in SafeNotes, apply all of the following — missing any one substantially raises risk: 1. Use a very long, high-entropy passphrase (passphrase ≫ password). No dictionary words. Treat it like a seed. (If an attacker brute-forces your passphrase, the app encryption collapses.)  2. Confirm the app uses a strong KDF (Argon2 or PBKDF2 with ≥100k iterations for PBKDF2-SHA256) and per-note salt. If not, don’t store keys. (I couldn’t confirm the KDF/iterations from the public repo pages — you should check the code.)  3. Ensure the app uses AEAD (AES-GCM or ChaCha20-Poly1305) for encryption so ciphertext integrity is enforced (no silent tampering). If it uses AES-CBC, verify an HMAC is applied correctly. (Again: confirm in code.)  4. Disable cloud backups of the app data and do not allow automatic cloud sync of backups (unless the backup file itself is E2EE with the same passphrase). Exported JSON/backup files must be encrypted with the passphrase-derived key and authenticated. If the app exports plaintext JSON or a backup that’s not protected by the passphrase, treat it as plaintext. (Repo issues suggest this area needs checking.)  5. Enable biometric/OS-protected keystore wrapping if the app supports it: keep derived keys wrapped by Android Keystore / iOS Keychain (hardware-backed) rather than writing them to plaintext secure storage. Verify the code uses flutter_secure_storage or platform keystore correctly.  6. Don’t copy seed phrases to clipboard or screenshots. Use the app’s secure display only. Revoke clipboard content immediately. 7. If you remove the key later, overwrite the note and backups and rotate passphrases. On many phones, secure deletion is not guaranteed — assume recovery is possible unless device encrypts at disk level and key is destroyed. 8. Keep device firmware and OS patched. No amount of good app crypto helps a rooted/compromised device. Better alternatives (ranked) 1. Hardware wallet (Ledger, Trezor, or equivalent) — best for real funds. Keys never leave secure element. 2. Dedicated, audited mobile wallet that stores keys in the hardware-backed keystore and is designed for private key security (use audited apps with reproducible builds). 3. If you must use a note app: use it only for low-value secrets and apply all mitigations listed above.

Blockchain isn’t secured by CPU power alone it’s secured by complex mathematics, specifically cryptographic hash functions like SHA-256. CPU or ASIC power just performs the math at massive scale but actual security comes from the cryptographic difficulty of reversing or faking those hashes. Without that math all the computing power in the world wouldn’t matter. and even that math isn’t invincible because quantum computing will eventually break the cryptography it relies on. Once quantum machines can efficiently reverse SHA-256 or derive private keys from public ones BTC entire security model collapses. It’s not a question of if, but when. The only defense will be migrating to quantum-resistant algorithms, and that’s not a trivial upgrade for a global decentralized networks. Now about that “the traditional banking system would fail before BTC,” I'm sorry but man that's just wishful thinking. Banks depend on regulation, liquidity, and policy, not hash power. Bitcoin’s network is technically resilient, but its value still relies on human trust and speculative belief. Don't get me wrong, Bitcoin can survive a bank run, but not a collapse in confidence and DEFINITELY not the inevitable quantum breakthrough.

Mentions:#CPU#SHA#BTC
r/BitcoinSee Comment

Bitcoin solved a very specific technical problem: the double-spend problem in a decentralized setting. Before Bitcoin, you couldn't have digital money without a central authority keeping the ledger clean. Bitcoin's consensus mechanism and proof-of-work made it possible for a global network of strangers to agree on one transaction history without trusting each other. Things like manipulation, institutional hoarding, or general "means of exchange" are secondary effects or use cases, not the core breakthrough. Is Bitcoin natural or artificial? It’s an artificial system built by humans, but it relies on natural economic and mathematical principles: scarcity, game theory, thermodynamics, and cryptographic hardness. Utility: \- censorship-resistant value transfer \- predictable monetary policy \- global access without permission \- strong settlement guarantees \- store-of-value potential, especially where local currencies fail As for the algorithm: Bitcoin uses SHA-256, which was designed by the NSA and standardized by NIST in 2001. Satoshi(whoever it is) simply adopted it for Bitcoin.

Mentions:#SHA

Post is by: YokubariMP and the url/text [ ](https://goo.gl/GP6ppk)is: /r/CryptoMarkets/comments/1oqf8jt/bitcoin_ii_bc2_a_second_chance_to_join_the/ **Bitcoin II (BC2)** is a proof-of-work cryptocurrency using the **SHA-256 algorithm**, just like Bitcoin, with a **maximum supply of 21 million coins**. But unlike simple forks, BC2 launched with its **own genesis block**, giving everyone a **fresh start** : no pre-mine, no baggage, and a level playing field. 👉 **Project Philosophy:** BC2 isn’t trying to replace Bitcoin. It aims to be its **“sister chain”**, built on proven technology but designed for wider adoption and real-world use. The core idea: *“What if you had a second chance?”* That’s the essence of Bitcoin II : a fair opportunity to join a PoW blockchain from the ground up, without the massive entry barriers of BTC today. 🪙 **Key Features:** * **Algorithm:** SHA-256 (same as Bitcoin) * **Max Supply:** 21,000,000 BC2 * **Not a fork:** brand-new chain * **Fresh genesis block:** fully independent from BTC * **Low initial difficulty:** accessible mining for everyone * **Halving schedule:** every 210,000 blocks * **Goal:** simple, decentralized, and fair PoW crypto for daily use * **Current price :** around $0.70 ⚡ **Why It’s Exciting:** BC2 is one of the few chances today to join a **proof-of-work network early**, built on Bitcoin’s fundamentals — scarcity, security, and transparency. It’s a modern “reboot” of the Bitcoin concept, bringing back fair mining, community growth, and true decentralization. 🌐 **Official Links:** Website: [https://bitcoin-ii.org](https://bitcoin-ii.org) The explorer, whitepaper, and technical details are available right there. *I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/CryptoMarkets) if you have any questions or concerns.*

We can all get together and do SHA over and over and over again by hand! Mining the old school way

Mentions:#SHA

Q. What problem did bitcoin solve exactly? Manipulation? Institutional hoarding? A meams of trading and exchange? Is it even natural or artificial? What utility does it hold? Who wrote the algorithm for bitcoins SHA-256? Love to know ppls thoughts apart from hyperbole

Mentions:#SHA

LOL thanks for the comics. I do not have ANY problem finding my addresses now that I know in detail what does it means P2WPKH, P2SH, P2PKH, Purpose Coin type Account Receiving or change Index BIIP32/44/49/84/86/141, Entropy, BIP39, Checksum, Seed, Bech32, PBKDF2-HMAC-SHA512 ​(Password; Salt; Iterations; dkLen), HMAC(Password;m) =SHA-512((K′⊕opad) ∣∣ SHA-512((K′⊕ipad) ∣∣ m)), IL, IR, xprv, xpub, zpub, RIPEMD160, base58, digest, Witness program, etc etc. It is just that I find very strange that I had to build my own tool for calculating and printing all this, i want just to keep a simple paper wallet, no hardware wallets BS. I made the following tentatives : 1) Excel -> no way (it does not have built-in crypto hash functions, too complicated with VBA/Python outer call) But it was useful as a learning experiment. 2) Python -> do you really want me to learn another programming language? Even with chatGPT help it is too complicated to get there. 3) Html by Ian Coleman : even for the version offline I do not trust code with fetch() - network requests , document.cookie, Long Base64-like strings, XMLHttpRequest - classic XHR snippet, sorry. 4) [learnmeabitcoin.com](http://learnmeabitcoin.com) same as above, call me paranoic At the end i just resigned myself to copy and paste by hand all the values to a txt file and print it offline for each wallet - password, mnemonic, script, path, seed, xpriv, address, key of the address, etc. For the wallet apps there is less and less options : Exchange -> not your keys not you coins Exodus -> closed source so no (BTW it creates one BIP44, one BIP84 and one BIP86 address and then decides by itself which one use as receiving/change). So pratically only Electrum, but if you want all your address (BIP44, BIP84, BIP49) you need different wallets (only one script type per wallet? WTF). Even if there is no official organisation, still complicated standards have been negociated and approved, so why not a simple wallet derivation tool? I mean how "normal" people who does not want to engage with all this complicated mess can trust this system?

Maybe someone found a way to crack SHA-256 algorithm and he only targets dromant lost wallets. Just saying

Mentions:#SHA

"Quantum ready" is just marketing fluff. Since Bitcoin hasn't yet updated to be quantum ready, we don't know current wallets would support it. It uses conventional ECC and SHA-256 like any other wallet.

Mentions:#ECC#SHA

Never heard of it but I own several old *scrypt* ASICs in that same form factor. Zeus Blizzard / GawMiners Fury You can unscrew it and slide it out and read the chips. Google the chips to see if they are SHA256 or Scrypt.

Mentions:#SHA

Not all lost BTC is in P2PK outputs (though, yes, most of it). Any lost Bitcoin sitting as P2PKH, P2WPKH, P2SH or P2WSH UTXOs will actually be lost forever, since the RIPEMD160(SHA256(x)) hash is irreversible, even in a post-quantum era.

Mentions:#BTC#WSH#SHA
r/BitcoinSee Comment

the LunaBit modular Bitcoin miner, pitched as "LEGO for Bitcoin mining," is a highly appealing concept that successfully targets the niche market of Computer Science and Blockchain students with free dorm electricity. The device’s core value proposition lies in its educational utility providing hands-on experience with SHA-256 hashing and network protocols in a silent, desk-friendly format, which is a significant advantage over loud, industrial equipment. However, the projected €3.50 monthly earning is highly vulnerable to the Bitcoin network's ever-increasing difficulty (especially post-Halving), which means the product must be marketed almost exclusively on its learning features and modularity, not its profitability. To maximize appeal, you should position it as a "Blockchain Compute Unit," open-source the controller software to engage the DIY community, and address the high cost of expansion boxes to fully realize the promise of "grow as you want" customization.

Mentions:#SHA

Incorrect. Bitcoin mining requires specialized hardware (ASICs) to perform billions of SHA-256 hash calculations per second. AI models (like LLMs) run on GPUs/TPUs optimized for matrix math, not hashing — they’re orders of magnitude too slow for profitable mining. Even if you used AI to control mining rigs (e.g., optimize pool selection or difficulty prediction), the actual hashing must still be done by ASICs.

Mentions:#SHA
r/BitcoinSee Comment

The threat of quantum computers breaking Bitcoin’s ECDSA and SHA-256 cryptography isn’t imminent — it’s probably 8 to 12 years away at best. Even if you’re all in, it’s a good idea to re-evaluate every 2–3 years based on the current environment. We should all keep an eye on upcoming BIPs and to push for community consensus on migrating to quantum-secure cryptography by around 2030. If the network drags its feet or remains too rigid about forking, I will start to worry in 5 years. I think we’ll figure it out, but there will inevitably be some hard-headed holdouts who overestimate the safety of the current protocol and resist change. Anyone all-in on BTC should advocate early and often for a move to quantum-secure signatures to help ensure the network stays strong for the long term.

Mentions:#SHA#BTC
r/BitcoinSee Comment

I get it… but quantum computers won’t actually “break” SHA-256. The real vulnerability lies with **ECDSA (Elliptic Curve Digital Signature Algorithm)** ...jd that’s what secoures Bitcoin’s private-public key pairs. So, technically, **only addresses that have already revaeled their public keys** (like old walets, early miner addreses, and even Satoshi’s coins) are exposed if quantum supremacy ever becomes real. SHA-256 itself remains solid… it’s ECDSA that could be craked to derive private keys from public ones. In that sense, whoever achieves true quantum supremaycy could, in theory, **claim or steal** those old, untouched coins. But once that happens, the rest of the network will just migrate to **quantum resistant cryptography**, leaving those few early addresses as the only real casualties. So yeah… the first one to reach quantum supremacy might get “rewarded”(ethically wrong in my opinion but thats how the world works I guess)… but the rest of Bitcoin will evolve and survive...so nothing to worry,, and this assumes that we truly achieved quantum supremacy which is exciting as it will be aweesome,, more cool inventions...

Mentions:#SHA
r/BitcoinSee Comment

The article doesn't specifically mention bitcoin and talks about encryption security where messages are made unreadable without a decryption key. If you want to see the current state of the future quantum computing concern run some searches on your favorite AI: What is the difference between encryption and cryptography? Follow ups: What cryptographic method does Bitcoin use? Will Bitcoin's use of ECDSA and SHA-256 for authentication and blockchain security have vulnerabilities to attacks using quantum computing in the future?

Mentions:#SHA
r/BitcoinSee Comment

do you think it takes 2^2 bits to solve SHA-2? mining is just brute-forcing operations until you find one with a sufficient number of 0 bits. it's not like you are factoring a number. you're just generating sha sums as fast as possible. 2^256 is the number of possible outputs. there are an infinite number of inputs. is a quantum computer really going to find inputs that generate all possible 2^256 outputs?

Mentions:#SHA
r/BitcoinSee Comment

That's above my paygrade, tbh. From what I understand, the current consensus seems to be that there is no sufficiently strong algorithm to reverse SHA256 functions, that's why it's considered quantum safe. There's Grover's algorithm, but it's not considered to be powerful enough. For ECDSA there's Shor algorithm, which can be used with quantum computing. Can't claim to understand much about it though, so if you have more knowledge, I'm happy to learn :)

Mentions:#SHA
r/BitcoinSee Comment

# 🧑‍💻 Satoshi Nakamoto still being alive **Odds:** Plausible but uncertain — maybe a **few percent** chance. * If Satoshi was middle-aged when active (2008–2011), they’d likely be in their 40s–60s today, so survival is not inherently improbable. * The disappearance could’ve been voluntary — a desire for privacy, legal caution, or ideological consistency — not death. * There’s also no direct evidence of their death; no known PGP keys revoked, no coins moved, etc. So while unlikely we’ll ever *hear* from them again, it’s very reasonable to think they could still be alive and silent. # ⚛️ Quantum computing “cracking” crypto this year **Odds:** Essentially **zero** for 2025. * Breaking Bitcoin (e.g., cracking SHA-256 or ECDSA) would require a *fault-tolerant* quantum computer with **millions** of stable qubits. * As of late 2025, the largest demonstrated quantum systems are still in the **hundreds to low thousands of qubits**, and none are close to the required error correction scale. * Even the most optimistic public roadmaps (Google, IBM, IonQ, etc.) talk about *post-2030* before achieving that level of fault tolerance. So: > If you want a rough numeric intuition: * Satoshi alive: 1 in 10 to 1 in 50 * Quantum crack this year: 1 in a billion (or lower)

Mentions:#SHA
r/BitcoinSee Comment

SHA256 is considered quantum safe, it's about ECDSA being vulnerable to a (potential) quantum attack. The larger targets that you mentioned are centralized and can update their systems much faster than bitcoin, or simply roll back changes (banks). > why would they target Satoshi’s Bitcoin first and announce they have the capability? Good point, perhaps the random coins have been exhausted or they just want to be greedy, or want to make some point of "being able to", who knows.

Mentions:#SHA
r/BitcoinSee Comment

If someone had the ability to break cryptography with quantum computing why would they target Satoshi’s Bitcoin first and announce they have the capability? More likely they would target random Bitcoin if even Bitcoin at all. Breaking SHA256 means there are far larger targets to be had (govt systems, banking systems, military systems etc).

Mentions:#SHA
r/BitcoinSee Comment

Granted it's poorly worded, but his "supercomputer" worry is still a valid concern, no? I'm assuming he was referring to the fear that SHA-256 could eventually get cracked

Mentions:#SHA

You’re mixing two different questions: attack cost and who can control the rules. Both PoW and PoS can be attacked and censored if a majority colludes—the mechanisms and costs are just different. 1) “PoW can’t be censored” → not true. A miner (or cartel/pool) with majority hash can absolutely censor by simply refusing to include certain txs and by reorging blocks that do. That’s textbook 51% behavior. PoW’s defense is miner diversity and the cost to sustain that majority—not an impossibility of censorship. 2) Cost model (why the incentives differ): PoW = OPEX/rentable. Majority can be rented or redirected (hash from other SHA-assets, NiceHash, etc.). It’s pay-as-you-go; you can attack, leave, and there’s no in-protocol penalty for the attacker. Defense is social fork / user-activated rules. PoS = CAPEX/illiquid. To sustain censorship you must own or control the stake over time. In slashing systems you get burned; in no-slashing systems (Algorand/Cardano) your stake value is directly tied to the chain you’re attacking (you nuke your own bag) and the community can socially fork you out. Either way, it’s expensive to hold the attack. 3) “Even tiny PoS chains haven’t been taken over” vs “many PoW 51%’s.” We’ve seen multiple PoW 51% reorgs on mid-caps. For larger PoS networks, the attack vector is not “attacking yourself for fun,” it’s acquiring enough stake and holding it—which is hard, public, and illiquid. That’s why you don’t see easy smash-and-grab reorgs on serious PoS either. 4) Control vs rules: Neither PoW nor PoS lets an attacker unilaterally rewrite monetary rules without the social layer (nodes, exchanges, users) following. A PoW cartel changing block limits or supply fails if users reject their chain. Same for PoS. Ultimate governance is social consensus in both models. 5) Concrete trade-offs (useful framing): PoW: strong history, simple model; attacks are rentable, censorship possible with pool/cartel; no slashing, relies on fee/issuance “security budget.” PoS (Algorand/Cardano): attacks require stake control over time; censorship needs ongoing majority participation; Algorand adds private VRF committees + deterministic finality; Cardano uses probabilistic finality with a big, diverse SPO set. So the real question isn’t “PoW can’t be censored and PoS can.” It’s: Do you prefer a security budget paid in external energy (rentable) or in internal capital (stake that’s costly to hold and visible)? Both depend on decentralization of their respective power centers (pools/ASICs vs stake custody/pools), and both ultimately answer to users.

Mentions:#SHA#SPO

Jesus Christ man what is wrong with you? I’m sorry do you not do any research at all? Seriously!! I don’t understand how stupid this world has become!! Just bloody research it man!!! For Gods sake! Sha256 is a NSA project from the fucking 90’s!! This is decades old shit! Ecash is decades old! You think bitcoin is the first one and only? No!!! It’s been done before. America was always going to fail eventually. Most empires last around 250 years or so. You can’t keep printing money to no end. We’ve seen that play out before. So China and Russia and Indian are joining forces which makes it very bad financially for America. Saudi Arabia had a contract with America for the last 75 years. It was the petrodollar contract. That’s what kept America so powerful. The contract ended last year. Trump wanted to renew it. The Saudi said no. Do you understand the level of impact that had?? A 75 year contract ended. Now all trades will be done in local currency. This is all public knowledge, there’s no weird hidden secret here. The dollar has lost significantly over the past few decades and now it’s spiralling out of control. America can not keep printing money. We are at 38 trillion. If China decides to stop dealing with America, then it’s done. USA will crash completely. There will be riots and civil unrest. America needs the world to use their money to stay alive and rich. America does not provide the majority of the world with anything. Asians and Arabs can deal with everything they need from their side of the world. America is a useless country to the rest of the world. That’s a fact. China India Russia can provide all of their neighbours with everything. We have all the oil on our side. We have everything we need here. The only reason America is in Middle East was the petrodollar contract. That’s done. That’s why trump is flip flopping with tariffs! He knows that they can afford to lose him now. They don’t need America. China is 1000x better than America in every single way. They’ve just made the fast car on Earth. And it’s electric. China will provide Asia will all the new tech. Cars. Computers. Ai. Medical. You name it. America is done. You guys will have to lick each others asses now and eat hamburgers all day. By the way why do you think he’s attacking South America. America needs it to survive. This is ALL PUBLIC KNOWLEDGE. Ecash was the first peer to peer exchange. It didn’t work out. Bitcoin is the second version. SHA256. This runs on the NSA NETWORK. They created it. It’s public fucking knowledge! Who created SHA256??? If you don’t know what that is then you are far from home. And I can’t help you. Grow up. Also while you’re doing for research…find out what satoshi nakamoto actually translates to from Japan to English. If that doesn’t wake you up well then goodluck in your bubble. THIS IS ALL PUBLIC KNOWLEDGE.

Mentions:#USA#SHA
r/BitcoinSee Comment

Network hashrate is not a value that can just be read. It is estimated. So when estimate says 1.2 ZH/s, is it counting sha256 hashes, or is it counting the entire operation SHA256(SHA256(Block_Header))? The latter would imply there are actually twice as many sha256 hashes done to equate to reported network hashrate of 1.103 ZH/s.

Mentions:#SHA

The only thing he understands about SHA-256 is that the number is 250 above the age of people he likes to "hang around with."

Mentions:#SHA
r/BitcoinSee Comment

Exactly. They're already thinking of making fusion cheaper by generating gold as part of the process. Gold would basically be waste that they'd dump on the market to help offset the costs of running a fusion plant. Not only is there's a much clearer path to this process being viable than there is to breaking SHA-256 with QC, but Bitcoin can adapt to QC, while gold can't fight against excess supply. https://www.marathonfusion.com/

Mentions:#SHA

If quantum can crack SHA256 encryption we are all fucked. Not just bitcoin

Mentions:#SHA

Gotcha. Mixed up SHA-xxx with RSA and asymetrical procedures (which SHA is not)

Mentions:#SHA#RSA

Uh... no. I don't think you understand just how much more difficult 512 is than 256 (or 1024 than 512). Grover's Algorithm has the advantage of finding a SHA collision in the square-root of the input length - so it will only take, on average, 2^(128) operations to crack SHA-256, a massive speed up. But it will still take 2^(256) operations to crack SHA-512. That's not *twice* as hard as SHA-256; that's *3.4 \* 10**^(38)* times as hard.

Mentions:#SHA

The difference between "secure" and "insecure" is, fundamentally, the time it takes to crack something. For SHA specifically, a quantum computer will halve the bit length for the purposes of similar security. So a QC could crack SHA-256 in the time it would take an equivalent conventional computer to crack SHA-128 (and SHA-512 like SHA-256, etc.). So the takeaway is that if you throw enough bit-length at SHA, it'll be secure even against quantum computers.

Mentions:#SHA

I call bullshit. How's any SHA quantum-safe? Just adding multiple layers on top just makes it a little bit harder

Mentions:#SHA

[Here's their claim for dice](https://duel.com/fairness?returnTo=/dice): >Before each round begins, our house games generate a: Server seed - a random string provided by us Client seed - a random string provided by you Nonce - a number that increases with each bet We then send you the hex-encoded SHA-256 hash of our server seed before you place your bets, to prove we won’t change our minds. Then we combine all of these values to generate a random result for each round: Fair result = Server seed + Client seed + Nonce By allowing you to include your own client seed, players can have a direct impact on the outcome of the game. I couldn't find example values to test these, but off the top of my head I wonder: 1. Are we sure the client seed is really from the client? 2. Can we run the "fair result" calculation ourselves (without using their site)? 3. Do they always use the same calculation (not just 95% of the time or some nonsense like that)? 4. Are they pig butchering? Or making money from data collection and ads? On the [verify page](https://duel.com/fairness/verify?returnTo=/dice) they have a snippet of JS that looks ok at a glance (just math, no API calls or libraries), and might be used to satisfy #2. Note: I'm a skeptic and not a gambler, so I naturally look for scams at sites like this.

Mentions:#SHA#API
r/BitcoinSee Comment

The advantage is that quantum resistant algorithms are not nearly as battle tested as SHA256. The longer we wait, the more reasonable it is to believe the quantum resistant algorithms are secure, because more time will have passed without them being broken.

Mentions:#SHA
r/BitcoinSee Comment

# Missed Bitcoin at $1? Here’s Something Different # Most of us have heard the stories about Bitcoin back when it was under a dollar — a time when almost nobody believed it would matter. That era is long gone, and no one expects it to come back. But there’s a new project that’s taking a similar path from the very beginning: **BC2 (Bitcoin II).** It’s built from the same base code as Bitcoin, using **SHA-256 Proof-of-Work**, the same **21 million limit**, and the same **halving schedule.** No meme branding, no shortcuts — just a clean restart of the original idea. Right now it’s trading around $0.95, roughly the price of a coffee. What’s interesting is that BC2 isn’t trying to replace Bitcoin or reach its price. It’s not about competing — it’s about revisiting what made the first network special in the first place: fairness, simplicity, and transparency. The community is small but active, with miners, developers and early holders helping shape the network from the ground up. Everything’s transparent; you can check the explorer and live dashboard at bitcoin-ii.org. It’s already listed on **CoinEx**, so it’s more than just a whitepaper idea. No one here is pretending this will become the next Bitcoin — that’s not the goal. The point is to rebuild the same foundations, start fresh, and see what can grow when things are still open enough for individuals to make a real impact. bitcoin-ii.org

Mentions:#BC#SHA

Missed Bitcoin at $1? Here’s Something Different Most of us have heard the stories about Bitcoin back when it was under a dollar — a time when almost nobody believed it would matter. That era is long gone, and no one expects it to come back. But there’s a new project that’s taking a similar path from the very beginning: **BC2 (Bitcoin II).** It’s built from the same base code as Bitcoin, using **SHA-256 Proof-of-Work**, the same **21 million limit**, and the same **halving schedule.** No meme branding, no shortcuts — just a clean restart of the original idea. Right now it’s trading around $0.95, roughly the price of a coffee. What’s interesting is that BC2 isn’t trying to replace Bitcoin or reach its price. It’s not about competing — it’s about revisiting what made the first network special in the first place: fairness, simplicity, and transparency. The community is small but active, with miners, developers and early holders helping shape the network from the ground up. Everything’s transparent; you can check the explorer and live dashboard at bitcoin-ii.org. It’s already listed on **CoinEx**, so it’s more than just a whitepaper idea. No one here is pretending this will become the next Bitcoin — that’s not the goal. The point is to rebuild the same foundations, start fresh, and see what can grow when things are still open enough for individuals to make a real impact. bitcoin-ii.org

Mentions:#BC#SHA
r/BitcoinSee Comment

Missed Bitcoin at $1? Here’s Something Different Most of us have heard the stories about Bitcoin back when it was under a dollar — a time when almost nobody believed it would matter. That era is long gone, and no one expects it to come back. But there’s a new project that’s taking a similar path from the very beginning: **BC2 (Bitcoin II).** It’s built from the same base code as Bitcoin, using **SHA-256 Proof-of-Work**, the same **21 million limit**, and the same **halving schedule.** No meme branding, no shortcuts — just a clean restart of the original idea. Right now it’s trading around $0.95, roughly the price of a coffee. What’s interesting is that BC2 isn’t trying to replace Bitcoin or reach its price. It’s not about competing — it’s about revisiting what made the first network special in the first place: fairness, simplicity, and transparency. The community is small but active, with miners, developers and early holders helping shape the network from the ground up. Everything’s transparent; you can check the explorer and live dashboard at bitcoin-ii.org. It’s already listed on **CoinEx**, so it’s more than just a whitepaper idea. No one here is pretending this will become the next Bitcoin — that’s not the goal. The point is to rebuild the same foundations, start fresh, and see what can grow when things are still open enough for individuals to make a real impact. bitcoin-ii.org

Mentions:#BC#SHA
r/BitcoinSee Comment

Well but at the same time if you’re talking about quantum computing breaking SHA256 encryption, BTC is the last thing you’ll worry about.  That level of quantum will collapse world economies, and also everything related to military and space (which will be a war scenario) and also to mention NO single bank or encryption service has any defense against quantum yet, so yeah.

Mentions:#SHA#BTC
r/BitcoinSee Comment

Quantum computing cracking SHA-256 will mean the entire world is in trouble. Bear cases that are similar to the zombie apocalypse or aliens invading will be troublesome because that risk applies to everyone... APPLE, GOOGLE, AMAZON, GOVERMENTS, etc. So that risk isn't valid to counterargue BTC, as all tech is under fire. And we live in a tech world I personally think quantum computing is not a worry, we are very far away from that finishing development which is what I gather from what I have researched into it

r/BitcoinSee Comment

Bitcoin keys use ECDSA. SHA is used primarily for mining. It has nothing to do with "seizing" or "cracking" bitcoin keys.

Mentions:#SHA
r/BitcoinSee Comment

All of those are centralized and can roll out updates very quickly, compared to the bitcoin ecosystem. Or even reverse changes. So not a great comparison. However, OP being concerned about SHA256 is not relevant either, since SHA256 is considered to be quantum resistant. The more interesting issue is the ECDSA algorithm, which is *not*.

Mentions:#OP#SHA
r/BitcoinSee Comment

Yup. That’s the issue. In Satoshi’s time SHA-256 PoW itself seemed amazing. He assumed as everyone did that Moore’s law would stay in effect allowing decentralization of mining to happen naturally. Basically he thought that in 2020 the computers would be to 2000 as 2000 was to 1980. Oh boy was he wrong.

Mentions:#SHA
r/CryptoMarketsSee Comment

Lmao the people worried about quantum have to either be too young to understand that if SHA-256 gets cracked, the entire internet would break. Not just crypto, but banks, governments, wall street, hedge funds, literally almost everyone would be at risk because most of the internet cryptography is SHA-256. Or they have to be too old and are just parroting anything they hear that sounds smart and edgy. Quantum resistant cryptos might be necessary someday, but investing in them now is like investing in a future where the entire infrastructure of the internet must be changed to continue operating securely. It's a doomer bet. The reality is that even if quantum computers could Crack SHA-256, literal governments would have interest in stopping it until they figure out a quantum resistant solution based on data and evidence and not just their cryptography algo they *think* will be robust enough to be quantum resistant.

Mentions:#SHA
r/CryptoCurrencySee Comment

I wouldn’t say that. Depends on what encryption is in use. ECDSA will be cracked first. SHA-256 will be broken but it will happen later. When it comes to most cryptocurrencies, the lowest hanging fruit for quantum computers is ECDSA. For example, around 25% of all Bitcoin would be in immediate danger, including Satoshi’s coins. The concern is that those wallets could be compromised and the coins dumped on the market. El Salvador recently moved its holdings to new wallets that are better protected, though not quantum resistant in the long term. It’s worth noting that quantum resistant cryptocurrencies already exist. For instance, QRL, which was mentioned in the article, is designed to be secure from the first block, built entirely around quantum safe cryptography. All future crypto must be or become quantum resistant in one way or another.

Mentions:#SHA#QRL
r/BitcoinSee Comment

I've not tried running your code, but what's your implementation giving you? In what way is it failing? Every time I've played around with block hashing, it's been byte ordering & big-endian versus little-endian representation which has most often tripped me up, so that's something to double check. Also, mempool.space has a useful API for getting block data, e.g.: https://mempool.space/api/block/000000000019d6689c085ae165831e934ff763ae46a2a6c172b3f1b60a8ce26f/header ...returns the block header for the genesis block: 0100000000000000000000000000000000000000000000000000000000000000000000003ba3edfd7a7b12b27ac72c3e67768f617fc81bc3888a51323a9fb8aa4b1e5e4a29ab5f49ffff001d1dac2b7c ...which gives the original block hash of (reverse byte order): 6fe28c0ab6f1b372c1a6a246ae63f74f931e8365e15a089c68d6190000000000 ...after applying SHA(SHA()).

Mentions:#API#SHA
r/BitcoinSee Comment

No, GPUs are completely worthless for bitcoin mining, as it cannot compete with ASICs (very "dumb" chips which are optimized for one and only one purpose: to find "correct" SHA256 hashes)

Mentions:#SHA
r/CryptoCurrencySee Comment

tldr; The Monero GUI 0.18.4.3 'Fluorine Fermi' has been released, offering enhanced protection against spy nodes when using a local node. Key updates include support for Ledger Flex, Qt 5.15.17, and P2Pool v4.11, along with minor bug fixes. The release involved contributions from four developers and includes 18 commits. Binaries are available for Windows, macOS, and Linux, with verification guides provided. Users are encouraged to verify downloads using SHA256 hashes and GPG signatures to ensure authenticity. *This summary is auto generated by a bot and not meant to replace reading the original article. As always, DYOR.

Mentions:#GUI#SHA#DYOR
r/CryptoMarketsSee Comment

Probably yes! Chinese are actively working on Quantum Computing to break SHA256 codes, there is a reason for massive green limitless energy

Mentions:#SHA
r/CryptoMarketsSee Comment

IONQ reached 64 qbits earlier than expected and their roadmap is aggressive they expect to read 2,000,000 qbits in 2030s. The companies they bought out are really interesting from satellite quantum internet to diamond lenses used for stabilizing the ions. QRL has been quantum resistant since 2018 and the whitepaper was established in 2016. Since genesis of QRL its quantum resistant. Oddly the price movement of quantum stocks and QRL price have been comparable. It’s not the SHA-256 people need to worry about it’s the ECDSSA that’s used in majority of all blockchains.

Mentions:#QRL#SHA
r/BitcoinSee Comment

Bitcoin is not backed by a government, a physical asset like gold, or a central bank. Instead, its value is maintained by a combination of a decentralized network, a fixed supply, and its technological security. Decentralized network No central authority: The Bitcoin network operates on a global, peer-to-peer network of computers called nodes. This distribution means no single person or entity, such as a government or corporation, has control over it. This decentralization makes the network resistant to censorship and shutdowns. Rules and incentives: Participants in the network—both miners who secure it and users who run nodes—are incentivized to follow the network's rules. Adhering to the protocol is profitable, while attempting to cheat or alter the rules is not, as a majority of the network would reject the changes. Fixed and scarce supply Hard cap of 21 million: The Bitcoin protocol has a hard-coded limit of 21 million bitcoins that can ever be created. Predetermined issuance schedule: New bitcoins are issued on a predictable, fixed schedule. The rate of new supply is cut in half approximately every four years in an event known as "the halving," which is enforced by the code and publicly verifiable. Scarcity and demand: This predictable and finite supply, combined with adoption and demand, is a key driver of its value. Some compare this feature to the scarcity of physical gold. Cryptographic security and energy consumption Secure transactions: Bitcoin uses cryptographic algorithms, such as SHA-256, to protect ownership and validate every transaction on the network. This makes it virtually impossible for someone to forge a transaction. Energy-backed security (Proof-of-Work): "Miners" compete to validate new blocks of transactions by expending vast amounts of computing power and electricity in a process called "Proof-of-Work". This energy expenditure secures the network and makes it extremely difficult and expensive to attack. Immutable ledger: All transactions are recorded on a public, distributed ledger called a blockchain. Because each new block of transactions is linked to the previous one with a cryptographic hash, altering any past transaction would require re-mining every subsequent block, which is computationally infeasible.

Mentions:#SHA
r/BitcoinSee Comment

So funny people constantly bring this up… we can migrate to quantum safe encryption long long LONG before we are able to crack SHA256. The way encryption schemes work is that it is always trivially easy to increase complexity, while going backwards is always magnitudes of complexity larger. The downside is that it generally slows down whatever process you are running encryption on. By the time we have computers that can break SHA256, we will have more than enough compute to perform well on quantum safe encryption. The methods already exsist, they are just cumbersome in our current age.

Mentions:#LONG#SHA
r/BitcoinSee Comment

Yes, we have about 20-30 years left for SHA256 until the best quantum computers have a chance to crack it. They need to increase their qubits from currently 100 to about a million times more than that. If public keys are exposed, this may happen earlier. But yeah, Bitcoin works with currently available, good encryption mechanisms. If mechanisms come along that are orders of magnitudes better, they need to be incorporated.

Mentions:#SHA
r/BitcoinSee Comment

Bitcoin is great, but a sufficient number of qubits on a quantum processor is theorized to reduce the complexity of cracking SHA256 to the point that it can be done in a reasonable timeframe. We are many orders of magnitude of qubits away from doing that, but the fact that algorithmic complexity is a solvable problem fundamentally makes Bitcoin an incomplete solution.

Mentions:#SHA
r/CryptoMarketsSee Comment

SHA256 isn’t what you need to worry about, it’s already considered relatively quantum secure (ie: a quantum computer wouldn’t be able efficiently compete with classical ASICs at finding valid nonces). What you need to worry about is the elliptic curve cryptography used in signing transactions.

Mentions:#SHA
r/CryptoMarketsSee Comment

It's as secure as SHA-256 gets brother 

Mentions:#SHA
r/BitcoinSee Comment

That's not how Bitcoin works. 51% of the hashrate cannot agree to increase the maximum supply of BTC or change any of the other consensus rules. The maximum supply of BTC would not change even if 99% of the hashrate wanted to increase the maximum supply of BTC. Increasing the maximum supply of BTC would require a hard fork and that would create a new altcoin with its own separate blockchain, but only as long as some cryptocurrency miners are willing to mine this separate altcoin. Bitcoin would still exist with its own separate blockchain and nothing about Bitcoin would have been changed. In fact, this has already happened many times. There have already been more than a hundred altcoins that have been created by forking off from Bitcoin. You've heard of a 51% attack before and you came up with this incorrect idea in your head that it only takes 51% of the hashrate to agree to change the consensus rules or increase the maximum supply of BTC. That's just not how Bitcoin works. A single miner and node can change the consensus rules, it doesn't take 51% of the hashrate, but that wouldn't change Bitcoin. It would create an altcoin that has forked off from Bitcoin. And this has already happened many times. A 51% attack does not enable the attacker to change the consensus rules. A 51% attack would be pointless because a successful 51% attack would only enable them to reverse their own transactions and double spend their own coins. This would be temporary and it would cause them to waste a fortune on electricity because they wouldn't even receive the block reward or transaction fees. And an attacker would need an incredible amount of SHA-256 hashing ASICs to control at least 51% of Bitcoin's hashrate. They would need far more SHA-256 hashing ASICs than are available to purchase.

Mentions:#BTC#SHA
r/BitcoinSee Comment

Because mining blocks is memory-less. You apply SHA-256 to strings until one works, but previous attempts don't help you for future attempts. That's why it's called memory-less. And memory-less phenomena follow exponential laws

Mentions:#SHA
r/CryptoCurrencySee Comment

Unfortunately, that's not the way that bitcoin is vulnerable to quantum computing. You could only do this if you'd cracked SHA-256, which isn't known to be vulnerable to quantum computing. The actual way quantum threatens bitcoin is by calculating private keys from public keys. So insta-mining is a no-go, but stealing from Satoshi's wallet is entirely feasible.

Mentions:#SHA
r/CryptoCurrencySee Comment

Wouldn’t we just fork? With … 4 ROUNDS OF SHA-256 THIS TIME !! HA HA!!

Mentions:#SHA#TIME