A METHOD AND SYSTEM FOR SECURING COMPUTER SOFTWARE USING A DISTRIBUTED HASH TABLE AND A BLOCKCHAIN (patentscope.wipo.int)

A computer-implemented method (100) and system (1) for determining a metadata M for securing a controlled digital resource such as computer software using a distributed hash table (13) and a peer-to-peer distributed ledger (14). This is a blockchain such as the Bitcoin blockchain. The method includes determining (110) a data associated with the computer software and determining (120) a first hash value based on the computer software. A second hash value based on the data and the computer…

Bitcoin

Precomputed table of addresses attack [duplicate]

This question already has an answer here:

is it possible to start generation new bitcoin addresses and save them into database and then check if any of generated addresses is already in use and has some balance then steal it? The genereated adrresses might not be used but could be used in the future ?

Thank you.

Recent Questions – Bitcoin Stack Exchange