Bitcoin Attacks that are Probably not a problem - Discussion

Welcome to this discussion thread. Feel free to ask questions or discuss things related to this section.

1 Like

I am wondering that since the SHA256 hash function is often doubled hashed in Bitcoin (e.g. address creation, Merkle Tree of transactions) does this not mean that in the event that SHA256 is broken then there is adequate time to upgrade to a new more secure hash function?

Nothing to add other than this course is very useful!


Hi, an hash function is not same as encryption one.
Search the web to learn more about this difference, example at

A broken hash function would only mean it’s hash result could give a same output but for 2 different inputs, double hashing would mean the same for the broken prove, because in the event that there is a not equal to b and if A=hash( a ) and B = hash ( b ) and if A=B then hash(hash(a)) = hash(hash(b))

So I would left here your question in other words would perhaps be: Why Bitcoin uses double hashes sometimes in its operation?

1 Like

I notes a lot of people say it the only way to keep your funds save from government and etc. But when FBI tracks criminal they still find a way to find out information to theirs wallets and confiscate theirs BTC. So it still big change if government want they can take it from you.

1 Like

So if Ray is right will monero be the only decentralized coin?

How can you connect to a satellite?!

1st, you need to get tracked. Don’t let them find you. Use TOR networks, which provide multiple bifurcation of your online address.

2nd, encrypt your data. They may find you and hold your data, but without your password, your BTC will be immovable.

3rd, don’t put all your eggs in 1 basket. Use multiple wallets/addresses and diversify your hodlings.

4th, don’t engage in criminal activities!

1 Like

Thank you cme for your information and the link. I will definitely check it and try to read more about it. Interesting.

And I also would like to know why Bitcoin sometimes uses double hashes in its operations?

my 1st search was lost so
after new search on google I found

and also

and also from CW (pseudo-Satoshi) one pseudo-answer:

I can see why this is going to be a dispute reason between public-open-source against try to have sw-patent.

TLDR: “So why does he hash twice? I suspect it’s in order to prevent length-extension attacks.”


Thank you so much for the reply and the links. I really appreciate it.

1 Like