You two still arguing? Take it to the PM's lads you guys derailed this guys topic. For what it's worth I have used Kano's firmware all be it long time ago on the S3's and it actually was much better than what shipped at the time so I can confirm what he says he know's his shit. Now OP... Their probably is ways to track miners just people don't like to talk about it because it's probably going on. Best bet is to stay away from modified firmware and stick to OEM stuff. At the end of the day it's a running a OS and could quite easy have something installed on it. I doubt the security of older miners is that robust anyone with some Kali skills and access to a machine could easy add some form of tracking to the machine. A while back a lot of miners got infected some people claim they got infected even with stock firmware and really secure passwords I never did find out more about it but I am sure if you google it you will find the info about them.
|
|
|
Never say never.
While it's possible the famous Satoshi is gone forever we do not know for sure the coins have not been left to someone or for someone to find.
I think in a few years a lot of things are going to come out that people have missed that could lead to the discovery of a fortune left behind for those who have the power and ability to seek for it.
Where ever you are Satoshi..
Thank you!
|
|
|
78 bit into the compressed and uncompressed addresses.
78 bits is far too small for a secure private key. You can see in threads here that people have successfully cracked keys quite a bit larger than 78 bits. So unless you're intentionally creating an insecure key for puzzle purposes, you probably don't want to do this. It's not for anything specific nor will it be used to store any funds just for some testing purpose. Thanks all for the info!
|
|
|
So you are wanting WIF plus addresses? example: you feed the script: some private key, 4EF3B2767693340 and in your output file you want what??: public keys: uncompressed 045E498CF31DE7E9768E9D457C66222BAE9B461B96B5CFC8CE931BFF8A12430341A2D24891A1DF7 97DE32341AA57D9E95D993C45812E8442C6E5E6F16A4BF98AC4 compressed 025E498CF31DE7E9768E9D457C66222BAE9B461B96B5CFC8CE931BFF8A12430341 public address: uncompressed 1DrKT3o3PALKNuKC3yGUxrA7WndyBQxtKU compressed 16m928aDT71pp7qb9ZhPiNHLoBprFZ2AnY you mentioned public key, which is not the same as public address. And you want the WIFs as well?? Don't reinvent the wheel, use this: https://github.com/geniusprodigy/mega-tool-pvkmassconvert/blob/master/mega-tool-pvkmassconvert.pyMod it as needed, if you want to print the public keys as well. Thanks @WanderingPhilospher the code above was from another project it just so happened to spit out the WIF should be no trouble to adjust it to get what is required. I will have a look at the tool posted above also thanks for the advice guys! Sorry I am out of merit I own you one! Magic
|
|
|
Thank you @BlackHatCoiner!! This is exactly what I was looking for. So for the Elliptic curve base points we would be looking at something like def modinv(a,n=Pcurve): lm, hm = 1,0 low, high = a%n,n while low > 1: ratio = high/low nm, new = hm-lm*ratio, high-low*ratio lm, low, hm, high = nm, new, lm, low return lm % n
def ECadd(a,b): LamAdd = ((b[1]-a[1]) * modinv(b[0]-a[0],Pcurve)) % Pcurve x = (LamAdd*LamAdd-a[0]-b[0]) % Pcurve y = (LamAdd*(a[0]-x)-a[1]) % Pcurve return (x,y)
def ECdouble(a): Lam = ((3*a[0]*a[0]+Acurve) * modinv((2*a[1]),Pcurve)) % Pcurve x = (Lam*Lam-2*a[0]) % Pcurve y = (Lam*(a[0]-x)-a[1]) % Pcurve return (x,y)
def EccMultiply(GenPoint,ScalarHex): if ScalarHex == 0 or ScalarHex >= N: hashing(); ScalarBin = str(bin(ScalarHex))[2:] Q=GenPoint for i in range (1, len(ScalarBin)): Q=ECdouble(Q); if ScalarBin[i] == "1": Q=ECadd(Q,GenPoint); return (Q)
And for the hashing side of things. def hashing(): global blockSize, blockNumber,y,n,x while (x<1): start1() x=0 n=0 y=0 startRange = blockNumber*blockSize+1 endRange =startRange+blockSize for key in range(startRange,endRange): PublicKey = EccMultiply(GPoint,key) uncompress = "04" + "%064x" % PublicKey[0] + "%064x" % PublicKey[1]; uncompressbin = str(uncompress).decode('hex') outputsha256 = hashlib.new('sha256',uncompressbin).digest() outputripemd160 = hashlib.new('ripemd160',outputsha256).digest() q=outputripemd160.encode('hex') print find(q,satoshiKeys,key) if x>0: keyHex = hex(key).split('x')[-1]; keyHexf = '80'+('0'*(64-len(keyHex)))+str(keyHex) decodewin = str(keyHexf).decode('hex'); checksumSHAa = hashlib.new('sha256',decodewin).digest() checksumSHAb = hashlib.new('sha256',checksumSHAa).digest() checksumwin = checksumSHAb.encode('hex') preWIF = str(keyHexf)+str(checksumwin[0:8]) decodewin2 = str(preWIF).decode('hex') encodeWIF = base58.b58encode(decodewin2) print encodeWIF break print ""
This should give the encodedWIF which can then be used to output the public addressing? Thanks again!
|
|
|
I can create a file with the lines I want to import that should be no problem.
|
|
|
So I was looking for a way to convert a decimal number 78 bit into the compressed and uncompressed addresses.
I would like to feed a specific set of numbers into a small program that will then generate the related compressed and uncompressed addressing for that decimal number.
What is the exact process to go from something like :
158458943549846849875450169348572156946031654895118510018735188216379120187838
Into the address format?
Has anyone got a small python or C# program that I can pipe in the numbers like this and output the address.
I do not mind coding something up but what is the exact process to go from the above to a public key.
Best regards.
|
|
|
They made sanctions on businesses that don't use chivo wallet and refuse to use BTC as a medium of financial transaction
Damn. No freedom for their own citizens to choose their own payment methods? In other news, in a matter of hours, they just lost 10% in the value of their assets. If you think Bitcoin is suitable for major countries to actually adopt, then you're just wrong. It is nothing more than free PR, no government in the world would ever give up the privilege of printing money and tracking their own citizens. It's not that I don't think Bitcoin is totally unsuitable for your daily transactions, but it is just wrong to think that they're doing it purely because they actually want to adopt Bitcoin as a currency. That's not to say they can't track them with BTC could actually be done very easy if the insist on you using a wallet they supply probably packed with all kinds of tracking tech. I also see a lot of their people resisting the change what a crazy world we live in these days.
|
|
|
Would not surprise me if the file had a virus in it for unwitting people like yourself to come along and run it. 9/10 these things lead to you being infected with RAT (Remote Access Tool) or some hidden miner will run on your machine. Unless the code is supplied on GitHub and can be verified stay away from solutions like this. A simple python script can be used to import them to Electrum or Bitcoin Core. DO NOT download random programs you find on YouTube. Especially ones that have comments like this under them. Here is some python code to batch import keys to Bitcoin Core.. it requires the Peter Todd implementation of Python BitcoinLib to work correctly. https://github.com/petertodd/python-bitcoinlibYou also may want to limit how many you import in one go split your keys down into batches and import them a batch at a time just to ensure your don't crash core while attempting the import. 5 Million keys is a lot but I doubt you will find anything with a random key import like this. If your looking to "crack" a puzzle look at things like this Pollards Kangaroo or LBC projects around the forum. One script is for IMPORT and one is for EXPORT Good Luck! #Import.py # from bitcoin.core import COIN import bitcoin.rpc bitcoin.SelectParams("mainnet")
proxy = bitcoin.rpc.Proxy() with open("priv.txt") as f: lines = f.readlines()
i = 1 for line in lines: addr = line.strip() #print (addr) print (i) print(proxy.call("importprivkey", addr, "ImportWrongWalletAddr" + str(i), False))
# Main.py # from bitcoin.core import COIN import bitcoin.rpc bitcoin.SelectParams("mainnet")
proxy = bitcoin.rpc.Proxy() with open("walletlist.txt") as f: lines = f.readlines() for line in lines: tokens = line.split(";") addr = tokens[2].replace("\"", "") addr = addr.strip() # print (addr) print(proxy.dumpprivkey(addr))
|
|
|
Probably not the best idea even if your need more than one of them to spend.
If your going to the trouble of using Multi-Sig then why keep the keys online?
Seems pretty stupid.
|
|
|
Great project looking forward to trying this out will post some feedback once I have had a play about with this!
Keep up the good work Coding Enthusiast!!
|
|
|
403d without a block starting to wonder if one will ever come round again
|
|
|
Got what I was looking for topic now closed.
|
|
|
Because he is a scammer that stole a LOT of money from people on telegram and via there malicious casino software that let them drain a hotwallet of a client.
|
|
|
Ordered there before no issue's just wondered if anyone had any kicking about open to negotiations for the right amount of miners.
Let's negotiate then. I'll double your money if you can deliver 20 or more L3++'s to a US address. I'll pay $110 for each. That's easy $1000+ profit for you for doing basically nothing. Please don't de-rail my topic suchmoon.. I am not selling miners I am looking to buy them.
|
|
|
Santader & Barclays have also started to close users accounts that are transacting in crypto exchanges it's also concerning that the biggest crypto card provider in the UK Wirex have also just been told to halt deposit's by UK customers by the FCA on top of that the FCA have also banned UK traders from participating in trading any type of crypto derivatives such as futures contracts ect.
The UK is becoming a very hostile place to crypto and that is a shame because all there doing is stunting the growth of a emerging market.
|
|
|
S C A M
DO NOT PUT YOUR MONEY INTO THIS SCAM...
LOOK AT PAGE 1 ALL NOOB ACCOUNTS SAYING THE SAME THING..
ALARM BELLS SHOULD BE RINGING..
|
|
|
Ordered there before no issue's just wondered if anyone had any kicking about open to negotiations for the right amount of miners.
And no one deserves cheeky comments this board has become a shit show because of such things.
|
|
|
|