notably, the elliptic curve group secp256k1 also is interesting because it's based on the Mersenne Primes which are prime numbers 1 less than a power of two... so the pattern is actually deeper even than this guy discovered. there are other interesting numbers involved in bitcoin's protocol beyond this also, the sampling period for difficulty adjustment is also a "interesting" number too, and 3, 6 and 9 appear repeatedly in the factors of many of the constants in Bitcoin. although somewhat unrelated, the edwards twisted curve, which is very popular with shitcoiners, is a special prime that is a prime number less than a power of two, in that case it is 25519, where the curve group got its name. iirc, it's 19 less, so, not a mersenne prime. and also the group expansion function part of it is somewhat more efficient mostly, except that secp256k1 has a special optimization because it's based on a mersenne prime, and performance-wise, they are actually very close, especially if you consider taproot/musig2 schnorr signature algorithm, which is almost identical to the edwards in most other ways. the only difference is that supposedly shor's algorithm, which supposedly enables quantum computers to reverse the pubkey derivation, doesn't work on edwards, and does work on the secp256k1 mersenne prime based group. also, just saying' but this is why it's super suspicious that taproot reveals the pubkey on receiving, instead of at spend like the previous address types.

Replies (1)