🚀 Gate Square “Gate Fun Token Challenge” is Live!
Create tokens, engage, and earn — including trading fee rebates, graduation bonuses, and a $1,000 prize pool!
Join Now 👉 https://www.gate.com/campaigns/3145
💡 How to Participate:
1️⃣ Create Tokens: One-click token launch in [Square - Post]. Promote, grow your community, and earn rewards.
2️⃣ Engage: Post, like, comment, and share in token community to earn!
📦 Rewards Overview:
Creator Graduation Bonus: 50 GT
Trading Fee Rebate: The more trades, the more you earn
Token Creator Pool: Up to $50 USDT per user + $5 USDT for the first 50 launche
Analysis: Due to the regularity of the "random number generator" used by LuBian Mining Pool to generate Private Keys, hackers discovered a flaw in the pattern that led to the theft of 120,000 BTC.
BlockBeats news, on October 17th, crypto KOL @chaowxyz published an analysis of how 120,000 BTC were stolen from Lubian. "To put it simply, a Bitcoin Private Key is a combination of 256 bits of 0s and 1s. Generating a Private Key is easy; you take a coin and toss it 256 times, recording heads and tails, where heads represent 0 and tails represent 1, and that becomes a Private Key. If two people toss and get the exact same result, they will have the same key. The later person can then directly access the previous person's Wallet. But the probability of this 'luck' happening is almost zero. Because the possibility of 2 to the power of 256 is greater than the total number of atoms in the universe. The chance of duplication is extremely low. The security of a Private Key does not come from luck, but from mathematics. However, there is a prerequisite: it must be 'truly random'. So how were those 120,000 BTC lost? The problem lies in the 'random number generator' that the LuBian Mining Pool used to generate the Private Keys — that machine, which should have fairly tossed the coin, was broken. It did not randomly select from nearly infinite possibilities, but instead, like a stuck machine, always picked numbers from a very small, regular range. The Hacker discovered the malfunction pattern of this machine and then easily replicated the Private Keys it could generate, emptying all corresponding Wallets.