CRYPTODEEP
CRYPTODEEP

CRYPTODEEP

Financial security of data and secp256k1 elliptic curve cryptography against weak ECDSA signatures in BITCOIN cryptocurrency [email protected] - Email for all questions. The creators of the software are not responsible for the use of materials Donation Address: ♥ BTC: 1Lw2gTnMpxRUNBU85Hg4ruTwnpUPKdf3nV ♥ETH: 0xaBd66CF90898517573f19184b3297d651f7b90bf ♥ YooMoney.ru/to/410011415370470


DUST ATTACK blockchain transaction with confirmation of isomorphism for a total amount of 10000 BTC

4 Feb 2024 16 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH     Video: https://dzen.ru/video/watch/65be9256df804947fbd96fd7 In this article we will cover a broad topic: “Dust Attack” known as: "Dusting Attack"or "Crypto Dust". Perhaps every cryptocurrency user or holder of a large amount of...

Padding Oracle Attack on Wallet.dat password decryption for the popular wallet Bitcoin Core

4 Dec 2023 8 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH   In this article, we will use the classification of common attack patterns from the cybersecurity resource [CAPEC™] . The “Padding Oracle Attack” was first discussed on Wallet.dat back in 2012 (on the vulnerability management an...

How to find a private key in binary code from Bitcoin Lightning Wallet Vulnerability in Quasar Framework

12 Nov 2023 6 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH   In this article, we will focus on a smartphone application iOS and Android the popular Bitcoin Wallet that supports fast payments through (Lightning network) BLW: Bitcoin Lightning Wallet . Unfortunately, many autonomous nodes of...

Milk Sad vulnerability in the Libbitcoin Explorer 3.x library, how the theft of $900,000 from Bitcoin Wallet (BTC) users was carried out

5 Nov 2023 9 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH  Cryptanalysis Video: https://dzen.ru/video/watch/65478a2f6d9f3f7ec9641804   Slowmist researchers conduct regular research into the security of the Bitcoin blockchain . They disclosed a vulnerability in the Libbitcoin Explorer 3.x l...

LATTICE ATTACK 249bits we solve the problem of hidden numbers using 79 signatures ECDSA

1 Oct 2023 13 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH In our earliest work, we published an article on the topic “LATTICE ATTACK” as a complete solution to the HNP [Hidden Number Problem] , but with the recent emergence of a new attack “POLYNONCE ATTACK” , we decided to supplement the...

ShellShock Attack vulnerability on “Bitcoin” & “Ethereum” server discovered in GNU Bash cryptocurrency exchange

9 Sep 2023 25 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH In this article we will look at a series of web server software vulnerabilities discovered in the  GNU Bash program  . Many Internet services , including Bitcoin blockchain web servers, use Bash to process some requests, for exa...

Attack 51% : Cryptocurrency Vulnerability Revealed

29 Aug 2023 3 minute read 0 comments CryptoDeep

An Exploration of a Vulnerability That Shakes the Foundation of Digital Coins . VIDEO: https://youtu.be/mr0r0Yoe7QU In the dynamic world of cryptocurrencies, security is paramount. The decentralized and transparent nature of b...

POLYNONCE ATTACK we use BITCOIN signatures as a Polynomial to an arbitrarily high power of 128 bits to get a Private Key

17 Aug 2023 11 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH In this article, we will again touch on the topic: “Bitcoin’s Critical Vulnerability” and use the brand new attack of 2023 “POLYNONCE ATTACK” on all three examples . The very first mention of this attack is described in an articl...

Cryptanalysis of the DAO exploit & Multi-Stage Attack

27 Jun 2023 27 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH     In this article, we will look at a bug in the DAO code. The hacker exploited a bug in the code of the DAO and stole more or less $50 million worth of ether. I will focus here only on the main technical issue of the exploit: T...

Phenomenon from Blockchain Cryptocurrency Solidity Vulnerable Honeypots

22 Jun 2023 32 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH   Following the article: “Solidity Forcibly Send Ether Vulnerability to a Smart Contract continuation of the list of general EcoSystem security from attacks”. In this article, we will continue this topic related to vulnerabilities a...