hit a specific private key, we try to hit a valid private key, how likely is it that we'll hit it? ... I know it's extremely difficult for someone to brute force my private key, but if instead of trying to
pull down to refresh
How are you so certain there is no private key? Every address requires a private key. ... Unless you are saying they just typed the public address without knowing the private key?
You take one of the private keys (12/24 words) and generate a master private key, then generate the xpub ... You can do this with all 3 private keys, but this is definitely not fail safe ;-) ... Maybe I'm incorrect, but if you have access to all 3 private keys, then you actually have access to all
Is the private key used in any other way for hosted channels though? ... How does the client's private key factor into the creation and use of hosted channels? ... Private key can be used for other generic signing tasks and on-chain bitcoin things. ... I'm thinking that the private key can be used to create the client's pubkey so payments can be routed
Ist there a chart which wallet has the best private key randomisation.
you control the private key or you don't. ... the private key could be stored in your head as a simple poem. ... you don't need bitcoin core or a computer to have custody of your private key.
Miners cannot guess a private key. ... A common multisig UTXO requires 2-of-3 private keys to spend the UTXO. ... Mining hardware does not do the correct math to generate private keys. ... To spend a multisig UTXO, you need however many private keys the UTXO specifies. ... working together couldn't guess any private key before the end of the universe.
What is a private key? ... public key, keeping your private key safe. ... Public Key Cryptography: Private keys are part of public key cryptography. ... Security: Private keys should always be kept secret. ... Your public key is derived from your private key through a complex mathematical algorithm.
But it does prove someone signed a message with Hal's private key. ... The content in the message is not proven by the signature, because the private key is Hal's not Satoshi's
Same for the private key
private key? ... So the scammer was generating addresses that they had the private keys for, then giving the user an uncorrelated
of the private key. ... A seed is simply another private key, as it is used to generate other private keys. ... The private key, as the name suggests, must be kept private. ... the same private key if they are generating their keys correctly. ... possible to create a signature for that public key without also having the private key.
not share my private key with third parties? ... How safe is it to enter my Nostr private key into Nostr clients? ... Hello, I like Nostr protocol, but how can I trust that entering my private key on a Nostr client will
so I lost my private my and I can't log in. it was stored in primal.net but it dosen't show up anymore ... i'm also logged from iris.to but it shows only read and can't find the secret key in settings.
private keys? ... How does HodlHodl set up 2-3 multisig without knowing your private keys and without you knowing their
Also, import the private key, not the 12 backup words, because the way jaf's software derives private ... keys from the backup words changed and consequently you won't get the same private key anymore if you ... in the latest version you can import a private key from another device but you have to clear your cookies
Someone finding my private key on that site that has all the private keys.