Any Bitcoin handle starting with 1 is a P2PKH handle. It’s a recipe for setting up a P2PKH locking script.
Meaning the handle is a prefix adopted by a hash of a public key adopted by a checksum. All that’s wanted here’s a legitimate prefix, a bunch of random wanting bytes and the proper checksum. So it’s totally possible to select a bunch of bytes which might be the ASCII encoding of some sentence, fake its a hash of a public key and simply calculate the wanted checksum.
It would not matter that the bytes that needs to be a hash are usually not a hash of a public key as a result of nobody is ever going to assemble an unlocking script utilizing a corresponding non-public key.
There isn’t a method to inform if any unspent P2PKH handle is faux or actual — till somebody posts an unlocking script which you’ll verify in opposition to the locking script.
By “faux” I solely imply arrived at aside from by setting up a private-key and public key pair within the regular method.
Any Bitcoin handle starting with 1 is a P2PKH handle. It’s a recipe for setting up a P2PKH locking script.
Meaning the handle is a prefix adopted by a hash of a public key adopted by a checksum. All that’s wanted here’s a legitimate prefix, a bunch of random wanting bytes and the proper checksum. So it’s totally possible to select a bunch of bytes which might be the ASCII encoding of some sentence, fake its a hash of a public key and simply calculate the wanted checksum.
It would not matter that the bytes that needs to be a hash are usually not a hash of a public key as a result of nobody is ever going to assemble an unlocking script utilizing a corresponding non-public key.
There isn’t a method to inform if any unspent P2PKH handle is faux or actual — till somebody posts an unlocking script which you’ll verify in opposition to the locking script.
By “faux” I solely imply arrived at aside from by setting up a private-key and public key pair within the regular method.