Discussion about this post

User's avatar
Anonymous Confused Person's avatar

Would this kind of approach be vulnerable to the same kinds of attacks we've seen against vanity address generators? I am assuming that in order to make this work, whatever function is generating the hash would have to keep at work until it generates the *right kind of hash*. I imagine this isn't something you'd want to do with every transaction (but it could be I'm just misundersatnding).

Expand full comment

No posts