Home  >  Article  >  Can Forgotten Crypto Wallets Be Saved? AI may be used to assist in retrieval

Can Forgotten Crypto Wallets Be Saved? AI may be used to assist in retrieval

WBOY
WBOYforward
2024-03-06 13:07:101174browse

Can Forgotten Crypto Wallets Be Saved? AI may be used to assist in retrieval

Author: Chloe, PANews

The crypto market continues to grow in popularity, as does the diversity and complexity of assets. Its popularity benefits from advanced technology and innovation application, but also increases the number of lost and unrecoverable assets. According to estimates, hundreds of billions of dollars of virtual currency are still in limbo on the market due to unexpected events such as forgotten passwords and hardware failures.

According to research, approximately 6 million Bitcoins out of the total supply of 21 million Bitcoins are believed to have been lost. Possible reasons include forgotten passwords, hardware damage, or the asset owner is no longer alive. And 29% of Bitcoins have not moved in the past five years, which of course may include long-term investors or users who trade for a long time. But in fact, there are many Bitcoins that are in a state of irrecoverability simply because users forget their passwords or cannot obtain them due to technical problems.

For example, in 2013, a British man, James Howells, accidentally threw away a hard drive containing 7,500 Bitcoins. Needless to say, its current value in the market is that the hard drive is still buried in Inside the garbage dump; Ripple’s former CTO Stefan Thomas also previously revealed that the 7,002 Bitcoins he owned were hosted in the private key of the hardware wallet IronKey, but he forgot the password and only had two remaining opportunities to guess the password out of 10 , once it fails, the private key and the 7,002 Bitcoins in custody will be deleted and permanently lost in the black hole.

Fortunately, with the continuous development of artificial intelligence technology, lost digital assets may be recovered. Crypto wallet recovery services can now help users recover lost Bitcoin or Ethereum from software or hardware wallets, regardless of the size of their assets.

AI GPU algorithm

The first is the AI ​​training model, especially the GPT-2 model based on OpenAI such as PASS-GPT, which has become the front-end technology for retrieving encrypted assets. PASS-GPT can analyze large amounts of data about user behavior, password patterns and analyze huge amounts of data. Through this data, the model can identify possible password structures and common vocabulary to predict the passwords that users may set, and PASS-GPT can also use stepwise sampling technology to generate a series of difficult-to-decipher password combinations, which is very effective for brute force cracking attacks. It is particularly important because it can efficiently generate password options that are not easy to think of directly, improving the chance of recovering lost assets.

According to the test, PASS-GPT is 20% better than other models in password guessing ability thanks to its stepwise sampling technology.

The powerful performance of modern GPUs and CPUs provides great computing advantages for the AI ​​models mentioned above. Today, the synergy of GPU (Graphics Processing Unit) and CPU (Central Processing Unit) has become a key factor in promoting the development of artificial intelligence.

GPUs were originally designed to process computer graphics and game images, and they are very efficient at performing massive parallel calculations. This means that GPUs can handle thousands of computing tasks at the same time, making them very suitable for "brute force" attacks such as password guessing. In this attack, the computer tries every possible password combination until it finds the correct one. Because GPUs can quickly process these calculations, AI models such as PASS-GPT are used in combination to upgrade both software and hardware to the highest level, making the entire computing system more powerful.

Finally, retrieving the encryption wallet password also requires the ability to strengthen protection against "Side-channel attack (SCA)". Side-channel attack is a security attack method that does not directly crack the password, but looks for vulnerabilities in the key information by analyzing the physical signals (such as power consumption, electromagnetic radiation) generated when the computer performs encryption operations. For example, if an attacker can detect subtle changes in hardware power consumption during specific operations, they may have the opportunity to deduce the cryptographic operations being performed or certain parts of the key.

To protect cryptocurrencies from the threat of such attacks, many AI algorithm experts are developing and deploying new strategies and techniques. Including, increasing randomness, that is, adding random operations in the encryption process, making it difficult for attackers to derive meaningful information from physical signals; improving algorithm design. When designing algorithms, the ability to resist side-channel attacks must first be considered, such as To ensure that the running method and execution time of the algorithm will not vary depending on the secret information processed (such as passwords, keys, etc.); finally, special hardware is used and special hardware components are developed, which make it Side-channel attacks can be resisted by consuming the same or similar amounts of power during different operations.

The security of Bitcoin and virtual currencies is two-way. It does ensure a certain degree of security, but it may also prevent yourself from doing so. Fortunately, advances in AI technology, hardware computing power, and algorithms have opened up new possibilities and brought more hope to users who accidentally lost their assets.

The above is the detailed content of Can Forgotten Crypto Wallets Be Saved? AI may be used to assist in retrieval. For more information, please follow other related articles on the PHP Chinese website!

Statement:
This article is reproduced at:panewslab.com. If there is any infringement, please contact admin@php.cn delete