top | item 5713154

(no title)

acebarry | 12 years ago

If they wanted to make a memorable address, they would have to run something like Shallot [1]. This is essentially brute forcing private keys until you find the public key you want. Depending on the name, that could take a very long time.

[1] https://github.com/katmagic/Shallot

discuss

order

zokier|12 years ago

I don't really understand how they can claim that shallot-generated keys are as secure as normal keys. If you are able to essentially brute force your key (to create the customized address), wouldn't the adversarial (with presumably much greater computing power) be able to do the same?

Serow225|12 years ago

Thanks, that's what I was thinking of.