A full explanation of how Keys & Addresses work. (see comment)

2 comments

  1. boxhit - Reply

    So there’s a lot of feedback I could give, it’s a 1+ hour video after all, but I just wanted to pick one: there has been no deliberate intrusion of a strongly generated private key. However, there are few successful guesses of weaker keys. “123456”, etc.

    Other than that, really meaty video (still just a third of the way through at the time of my comment). I like how you explain it in a way that you can basically do this stuff on paper.

Leave Comment

Your email address will not be published. Required fields are marked *