Bitcoin Forum
June 21, 2024, 10:00:56 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 2 3 [4] 5 6 7 8 9 »
61  Bitcoin / Development & Technical Discussion / Re: same compressed pubkey for 2 different address on: September 30, 2021, 09:15:44 AM
The Second compressed Key Is wrong. It has to be
03469619dc9c10ce858a5359e9e948cb50d415f93f2b63490fefcc1c4013bcd284

The corresponding uncompressed key ends on the hex number f, which is decimal 15 meaning it is odd. So odd y => 03 prefix
62  Bitcoin / Development & Technical Discussion / Re: Is Bitcoin still experimental? on: September 30, 2021, 07:28:13 AM
Well, lets say I write a malicious BIP with Copyright to myself, were I propose to store the privatekeys on my private email address. Some on Bitcoin Team think it is very neat solution, and implement it. Now the Network adapts it and now I get the privatekeys. I steal now the privatekeys and make the great fire-sale. Are now the devs my accomplices? Or is my action of stealing the BitCoins the criminal act and the bitcoin devs just negligent?

Or in German law, you can not exclude any liability. So for example, you make an online lottery... you can exclude any liability by declaring that you can not sue if you not win. But you can not exclude e.g. the liability for bodily harm, even if it is not in the possibilities to get bodily harmed by a online lottery.

Is Bitcoin money? Or is it something else? Can it be actually stolen?

And last but not least:
Who do you sue, if they(the node owners) disable the whole bitcoin network? Participation in the bitcoin network is not obligatory. So you can not sue anybody if there suddenly a 51% attack is possible and somebody is running the whole bitcoin network on his raspi with McDonalds Wifi.
63  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: September 29, 2021, 09:36:13 PM
@WP

What tool do you use for bruteforcing x point only search?

@apvl
You are kind of in the wrong thread if you ask about VanityBitCrack in the Kangaroo-Thread
64  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: September 29, 2021, 04:18:50 PM
No, as they are different principles.

BitCrack gets a list of addresses and brute forces the privatekey. This means that if we have public keys, we can convert them to addresses and then bruteforce them in BitCrack, but we have the overhead of privatekey to public key to sha256 to ripemd160.
VanitySearch can as far as I know use directly the public keys so there is not that overhead, what we have in bitcrack to do the extra work of transforming the public key to the ripemd160
Kangaroo is not really bruteforcing the publickey but using a mathematical process to crack it.

So no, you can not mix them.
65  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: September 29, 2021, 03:53:45 PM
Note: There will be at least 2 keys that will solve original pub key's private key, in every range.

Please elaborate.

After you did the division twice?

Or because you only search for the xPub and thats why there are two?
66  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: September 29, 2021, 03:24:57 PM
Soooo

3  x 45d1745d1745d1745d1745d1745d1745d1745d1745d1745d1745d1741745d06a = beginning of the range
then ffffffff divided by 33 + begin of the range marks the end of the range?

67  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: September 29, 2021, 02:30:38 PM
@ssxb
The problem is, that you say "Well I know a secret, but I wont tell you the whole secret. I just say, that when you know something everybody knows, you will understand it". And than ... nothing. Just write what your "secret" is or just let it be...

@WP
I apologize, I misread that you set the range to that small one, but you wrote clearly that you chose another range, where you clearly knew it was twice there. Still... I dont know how you determine the other range?!
Does your Pollard Rho implementation can process multiple targets at once?

@Counselor
Well, you have to know the range, were you assume the privatekey. So how do you determine that range?

How do you know to search in  D1745D1745D1745D1745D1745D1745D06A31FA8E3252B1A53FDAAA73xxxxxxxxxxxxxxxx?

68  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: September 29, 2021, 02:10:41 PM
You set the range 1:ffffffff and you get a private key D1745D1745D1745D1745D1745D1745D06A31FA8E3252B1A53FDAAA7335FF288C

D1745D1745D1745D1745D1745D1745D06A31FA8E3252B1A53FDAAA7335FF288C is bigger than ffffffff.

Atleast in my math world Wink
69  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: September 29, 2021, 01:30:46 PM
But isnt this contradicting?
D1745D1745D1745D1745D1745D1745D06A31FA8E3252B1A53FDAAA7335FF288C is outside the range.
70  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: September 29, 2021, 01:18:12 PM
Would you please stop spamming ssxb?
Super annoying.
71  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: September 29, 2021, 12:48:39 PM
Do you have some example data? Can you provide them to me please?

Privatekey, derived pubkeys and some of their privatekeys counterparts?

I am really interested to analyze your findings.
72  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: September 29, 2021, 12:23:38 PM
Is according to your empirical test this range reduction valid for small ranges like 2^120 also?
73  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: September 29, 2021, 09:33:56 AM
And what is the actual algorithm? It is so annoying.

brainless: Check my magic numbers
me: What are those.
brainless: See this post, were is just post them without any explaination
me: lets see, what is it? check it out and search what those are... they are the divisors of N-1 Ok. Check in Wolfram Alfa, seems legit
me: What now?
brainless: You do something with them and get less keys
ssxb: You add, subtract multiply divide in some arbitrary order and get less keys.


Wow
What is the fucking algorithm? Is there some pseudocode?

But hey, he wants 0,75 BTC for a Rig. Sure...
74  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: September 29, 2021, 07:30:18 AM
brainless.... are you kidding me? Come with some reasonable arguments and not with conjectures.


2520 will get you stuck, but 30240 will work. Old Babylonian Astronomers knew this.

Source(s): Dude trust me
75  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: September 29, 2021, 07:24:56 AM
So no new knowledge  Cool
76  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: September 29, 2021, 06:48:14 AM
@WP
I take a 255 bit pubkey, divide it by 33. Now I only have to search the 2^255/33 ~ 2^252  range to find the key. What a reduction.

@ssxb

Well but what is the new knowledge?
77  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: September 29, 2021, 06:16:36 AM
I saw that you posted before I could post. I had already invested about 20 minutes for the post and was like: "Well, it is already said, but not from everyone" and so I posted it anyway.

Also the 33 division makes sense as the distance between each point will be the mod inverse of 33 or so. Its like cutting the whole N into ranges, as mentioned before. Only problem is, that you are only getting one in the lower bruteforcable range and then can jump from that one and can determine the other 32 private keys.

And yes, you just have to multiply the privatekey times your divisor and then mod N to get the right result.
78  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: September 29, 2021, 05:58:07 AM
What about 2520?

2520 = 2³ * 3² * 5 * 7

2520 / 10 = 252
2520 / 9 = 280
2520 / 8 = 315
2520 / 7 = 360
2520 / 6 = 420
2520 / 5 = 504
2520 / 4 = 630
2520 / 3 = 830
2520  / 2 = 1260
2520 / 1 = 2520

Only difference is, that dividing by 8 will get you a odd number. If you want that it is even when dividing by 8, then just double 2520. So 5040 is much smaller than 30240. So why is according to you only 30240 dividable from 1 to 10? If it is even relevant as 30240 is not a divisor of N-1.

References:
https://en.wikipedia.org/wiki/Highly_composite_number
https://mrob.com/pub/math/numbers-14.html#lc5040

 

79  Bitcoin / Development & Technical Discussion / Re: Try please someone find a privkey for this pubkey ? range - not more 75-80 Byte. on: September 28, 2021, 10:07:44 PM
Yeah it is unprofessional to not even check Google to exclude the most obvious errors. Also the chuzpe to pressure people to calculate their pointless ideas, is unbelievable impertinent
80  Bitcoin / Development & Technical Discussion / Re: Try please someone find a privkey for this pubkey ? range - not more 75-80 Byte. on: September 28, 2021, 04:59:55 PM
now comes the magical part where we get some explanation, on btc balance of the key? or stop continue looking for 120..
thanks COBRAS.

Sorry, Buddies, some kind of incomprehensible situation came out with 120, I have different approaches to my intermediate public keys secretscan.org in which there is a calculator of the public key from the compressed to the unpacked format, for the public keys(2 pcs) found in many ways, it shows the one and the same address  1HT7xU2Ngenf7D4yocz2SAcnNLW7rK8d4E !!!!:Smiley. Force majeure. I am very tired, so I will write a little later.

If you search for 1HT7xU2Ngenf7D4yocz2SAcnNLW7rK8d4E you will realize that this address is a burner address, as the publickey is not on secp256k1.
Pages: « 1 2 3 [4] 5 6 7 8 9 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!