23
Comments (5)
sorted by:
1
deleted 1 point ago +1 / -0
2
deleted 2 points ago +2 / -0
1
deleted 1 point ago +1 / -0
2
MickHigan2 [S] 2 points ago +2 / -0

I have read it thoroughly enough (as much as I could understand) and it seems to show an algorithm that can bypass hash checking; theoretically. It passes the numbers in a way it tricks the recipient hash value check as being unaltered. Crazy shit.

1
deleted 1 point ago +1 / -0