Would this kind of approach be vulnerable to the same kinds of attacks we've seen against vanity address generators? I am assuming that in order to make this work, whatever function is generating the hash would have to keep at work until it generates the *right kind of hash*. I imagine this isn't something you'd want to do with every transaction (but it could be I'm just misundersatnding).
Would this kind of approach be vulnerable to the same kinds of attacks we've seen against vanity address generators? I am assuming that in order to make this work, whatever function is generating the hash would have to keep at work until it generates the *right kind of hash*. I imagine this isn't something you'd want to do with every transaction (but it could be I'm just misundersatnding).