Blog

$ 120k Bounty to break Bitcoin, Ethereum and Solana


Naoris, a cybersecurity firm dedicated to guarding digital assets from the threats to computing volume, offers bounties to anyone who could break the algorithms of being the censorship that captures the major blockchain networks.

In an announcement shared with Cointelegraph on Thursday, Naoris said it set a large amount of $ 120,000 – equivalent to approximately a bitcoin (Btc) – For successful compromise of major cryptographic algorithms used in the crypto industry.

The largest bounty, $ 50,000, is for anyone who can break the SECP256K1, the standard cryptographic that undergoes Bitcoin, Ethereum and many other protocols. A $ 30,000 reward will be available for destruction of ED25519, which Solana uses, as well as the enecrypted messaging services such as Signal and WhatsApp.

Naoris also offers $ 20,000 for a successful attack on the NIST P-256, the elliptic curve used in the Transport Layer Security (TLS) protocol, which ensures Internet traffic. Another $ 10,000 was set aside for destroying other elliptic curves, including the P-224, P-384 and P-521.

What happens if cryptography is damaged?

The bounties are set for destroying elliptic curve parameters, which are values or sets of values that determine a specific elliptic curve used in the cryptographic, thus determining the security and functioning of the cryptographic system.

Related: Computers volume can be restored to life the lost bitcoin: Here’s how

The modern world is highly dependent on cryptography, and the consequences of being compromised will be terrible and distant.

Cryptocurrencies, security, bitcoin prices, quantity computation, adoption of bitcoin, features
Blockstream CEO Adam Back said the threats in Bitcoin were not likely within the next decade. Source: Adam returned

If SECP256K1 is compromised, Bitcoin and many other blockchains, the Lightning Network, many Ethereum layer-2 protocols and others will be destroyed. Present Estimates Suggest breaking this algorithm will require nearly 10 billion trillion years using today’s GPU technology.

A successful attack on ED25519 will compromise the OpenSsh protocol used for the server’s safe access, disrupt the GIT version control systems and threaten parts of the DNS security layer.

NIST P-224 is often used in legacy systems, such as old smartcards, and is set to be Removed After 2030 by the US National Institute of Standards and Technology. It is almost 30,000 times easier to break than 256-bit curves such as SecP256K1.

Related: Bitcoin’s quantity has begun, Naoris CEO says

The volume of the sword of the grasocles hangs above the head of Bitcoin

While computers volume is unlikely to break modern cryptography anytime soon, many experts believe this is a question when instead of if. As a result, despite the quantity computers estimated to need ten -ten million quubits to break the systems, the crypto community began to prepare.

Bitcoin, in particular, takes the first steps. A new Bitcoin (BIP) improvement proposal has been introduced this month aimed at dealing with the threat obtained by computers volume By phasing out Bitcoin’s legacy signature scheme.

“A successful volume attack on Bitcoin will result in significant economic disruption and damage to the entire ecosystem,” the proposal reads. “Beyond its impact on the price, the ability of miners to provide network security can be significantly affected.”

In an interview in mid -April with Cointelegraph, early Cypherpunk Adam back, mentioned by Satoshi Nakamoto on the white role of Bitcoin, suggested that computing computing pressure may reveal If the pseudonymous creator of the blockchain is alive.

He explained that the computation of the volume could make the Bitcoin held by Satoshi Nakamoto who was vulnerable to the stolen, forcing him to move it to maintain it.

Researchers are also looking for more blockchain-magnostic solutions. Earlier this week, Sui Research introduced a cryptographic framework that could provide Protection against threats in computing quantity to multiple blockchains Without the need for hard forks, address of changes or primary updates.

However, while the particular solution boasts compatibility with all EDDSA -based blockchains, this request does not include Bitcoin and Ethereum. Blockchain compatibles include Sui, Solana, close and cosmos.

https://www.youtube.com/watch?v=rtdyrl1uami

Magazine: Bitcoin vs. computer volume threat: timeline and solution (2025–2035)