Show Posts
|
Pages: « 1 2 3 [4] 5 »
|
Since not all QR Code reader handle inverted images... thought I just post it here.... its still the one leading to http://qr.w69b.com/g/t2lFujr0I nothing new..sorry love these puzzle's, they remind me of movies like National Treasure, or Tv series like McGyver, CSI or NSCI ( rule 36 in particular )
|
|
|
What do you do in an ARG when stuck? Backtrack the steps that were made, just to see if clue's were missed. The Morse code topic was brilliant, I've been puzzling long on the remaining code, until the enderman overlay popped up. Too bad the overlay image was hard to find, google is not always your friend :-( With the overlay the bit .ly adress had to be found. This hint was availlabe 24 hours before the result was posted on the forum That, and the fact that you are actually the owner/creator of the bit. ly/mindthecraft link makes you the puppet master. bitly .com/u/xavier46930 The trip through MineCraft... I could not track. The current status, the 7z file... bitly .com/1juqeCj+ This link has been created on 28th of Juli... thats a couple of days after the start of the quest. So Xavier.... one question, if you please. It there an excisting live trail that leads to the price, or are we only making the progress while the puppetmaster is awake and is the trail made as we go along. Don't get me wrong, I don't mind spending time to search/find clue's.... last clue I found... off the trail, but sharing the info anyway. bitly .com/u/coinartist
|
|
|
finally I can participate It helps to be an expert in QR.. I figured out the size, mask and error correction level...... --snip -- Decoded .... http://qr.w69b.com+g/rLp The "+" is allready faulty... too many errors to complete... sorry I can't decode it with my QR reader, is it complete yet? This code is missing the last parts and the error correction, but the part with the actual content is already displayed. If there is no fault in the data.. (cannot be confirmed) then I can read it what is there.... Just need size, errorcorrection and mask... And the tools I developed over the last two years if bottom left pop's up, 3 parts might be sufficient........
|
|
|
finally I can participate It helps to be an expert in QR.. I figured out the size, mask and error correction level...... Decoded .... http://qr.w69b.com+g/rLp The "+" is allready faulty... too many errors to complete... sorry
|
|
|
Update 6/28:
Do not rely solely on Users for solves, double check solves for user errors: #checkuser404
Lots of clues of as today, but no way to verify... pitty.....
|
|
|
I have a notion we hit a bad trail. I don't think that we should be hacking a Amazon server, that requires a ECDSA key... something we need for the bitcoin address itself So I tried to analyse the bit(dot)ly link. Add a plus sign to that link to get the stats. It shows a user that made two links @ 21 june. My guess is that we need to fish for "Pufferfish" Hmm thats the default link when making an account...
|
|
|
Sorry I do not know how to read or interpret it. Can you please give me an example? thanks.
Basically most Crypto-Coin addresses are generated the same way. Independent of Scrypt/SHA etc. A new private key is SHA256 hashed. Next step is a RMD160 Hash. A prefix (coin depended the -X) is added to this result generate a checksum, add the checksum to the result and display the result in a Base58 representation. In order to get the resulting bitcoin address to start with ("1") the prefix equals 0, this is the default setting in the software If you require a lite coin address ("L") the prefix used is -X 48 For a DogeCoin address ("D") the prefix is -X 30 see also https://en.bitcoin.it/wiki/Technical_background_of_version_1_Bitcoin_addressesMost of the addresses are generated this way, just use the table with a fixed setting of your first character. calculate a test result, and insert the result in a wallet to verify the generated address.
|
|
|
Just brightened the image for the overlay... haven't found a relevance yet........
|
|
|
Huzzling the words on the right and the left side left: 'IMLi.byTB.F' 'bit(dot)ly.iMFb'
Blue dot indicating a web link, the other dot is a separator. But there are just too many [Suspicious link removed] bit(dot)ly possibilities. right 'DntheCraA.t' 'Death.trACn'
again the dot as a seperator, I'm on a Death Track here all the letter: 'DIMnLith.byeTCraAB..Ft' 'MineCraFt' --> subtract 'DILth.byTAB..' --> remain '.bILD.BAth.yT'
You probably only get the right solution if you are in bath with YT...
|
|
|
Foroplus thanks a lot. But I wanted a guide for windows 7.
At the moment the tool is command line (no Gui) the source is cross platform, you will have to build the executable. Hey is this for windows? And is the process for all cryptos same? Is this a .bat file? And why does it have 3 steps. I don't get it. I am a noob to this. Please can you explain.
When generating a key for a third party the result would not be secure. If you just gen a plain address, both you and the person you send the result to will have access to the wallet..... step 1: you request a public key from the person you are going to generate the key for. step 2: With this public key, generate a new vanity address. (-P flag) step 3: the two private keys need to be combined for a new private key, only known to one person
|
|
|
@MICRO i need a guide to generate addresses for others without knowing their private key. The provide me with a public key and I have to generate for them. Do you have a guide link for that? ./keyconv -X 30 -G Pubkey (hex): 040db67a259fb8cf231fcf6f7249dc1191d793d5c5148ca6cfa5346ba8c4b8ce1f64e319c626fc50bad44700a5b0e2219304baf399429713cce581046a87637a68 Privkey (hex): 1F97DB4905104EFACAF237D0C5478137B0581080D851105131FC1DE799CD9F36 Address: D5KYFpU1daMsrhH9v6K2RnM2vNaNPxkzZL Privkey: 6JNXsxrb37hirsR2QMFRjJ1PTfPaJdY5HC5WSXLTxbiq2nTXJLY ./vanitygen -X 30 -P 040db67a259fb8cf231fcf6f7249dc1191d793d5c5148ca6cfa5346ba8c4b8ce1f64e319c626fc50bad44700a5b0e2219304baf399429713cce581046a87637a68 DLR Difficulty: 1353 Pattern: DLR Address: DLRFhUnETpuKN9YyzXG8FPGCbHAzb6WWK1 PrivkeyPart: 6KwUrr32oqY8ge5gaADx9codyb4MtafzDmsFY1jSAcJkc2Xn3Ey ./keyconv -X 30 -c 6JNXsxrb37hirsR2QMFRjJ1PTfPaJdY5HC5WSXLTxbiq2nTXJLY 6KwUrr32oqY8ge5gaADx9codyb4MtafzDmsFY1jSAcJkc2Xn3Ey Address: DLRFhUnETpuKN9YyzXG8FPGCbHAzb6WWK1 Privkey: 6JEegwXYMJhr756ZqLnWDvUyMytfNGUcr3wdSaQgmJzHwJakXq4 Here is roughly the procedure. the -X 30 is for DogeCoin, if left blank the software will default to BitCoin the first step, gen of the new key, and the last step combining the keys need to be done by your third party for security reasons. The generation of the new key is your work.
|
|
|
http://minecraft.gamepedia.com/User:CoinArtist06:35, 22 June 2014 (diff | hist) . . (+66) . . Enderman (→Beta 1.8+) File:Endermen.jpg|A haunting of Endermen enjoy a cryptic evening. 03:48, 23 June 2014 (diff | hist) . . (+66) . . m Enderman (Undo revision 660263 by Orthotope (talk)) File:Endermen.jpg|A haunting of Endermen enjoy a cryptic evening. 05:26, 23 June 2014 (diff | hist) . . (+27) . . N File:InvisibleEndermen.jpg 05:31, 23 June 2014 (diff | hist) . . (+138) . . Enderman (→Beta 1.8+) File:InvisibleEndermen.jpg|Endermen under the effects of an invisibility splash potion. In this case you can attack what you do not see. 05:02, 24 June 2014 (diff | hist) . . (0) . . File:InvisibleEndermen.jpg (CoinArtist uploaded a new version of "File:InvisibleEndermen.jpg") 05:09, 24 June 2014 (diff | hist) . . (+7) . . File:InvisibleEndermen.jpg (→Licensing) {{license Mojang}} 05:10, 24 June 2014 (diff | hist) . . (0) . . File:InvisibleEndermen.jpg (CoinArtist uploaded a new version of "File:InvisibleEndermen.jpg": Reverted to version as of 05:26, 23 June 2014) (current) 21:20, 24 June 2014 (diff | hist) . . (-50) . . Enderman (→Beta 1.8+) File:InvisibleEndermen.jpg|Endermen under the effects of an invisibility splash potion. All activity of CoinArtist on the listed website website. It could be the Mojang license if of importance... Too bad I do not have time to puzzle today.....
|
|
|
They cannot attack what they do not see
I guess a riddle. What do you not see? omission? !DO!!!"DONOT"
make me think the (---.) equals (!) (and what about the quotes??) in computer programming ! equals NOTSo here is the (updated) Morse-code, including inverted(!) Morse code - .-.. .-- --. ---. -. -.-- .- . ..-. -.. -- .... - .... -- . - -. -.-- - .-- - . .-- - .--. ---. -.- . ..- . .- .-.. . -. . -.. .-.. .- .-- T L W G (---.)N Y A E F D M H T H M E T N Y T W T E W T P (---.)K E U E A L E N E D L A W E Y D U V A L N T Y W I (----)E(----)I T E A L E D E T D E X V R T G T N Y T A T W Y N D I've been pursuing this line of thought....... equals another restless night note: TLWG could stand for thai font...
|
|
|
- embedded morse code: "They cannot attack what they DO not see," has been solved.
Why is there a comma? Am I going paranoid?
|
|
|
I did a recheck on the Morse code. Using the following suggested site for translation The character that could not be translated : "---." stands for "!" according to this table. this translates the last series of columns after "THEY CANNOT ATTACK WHAT THEY DO NOT SEE" ISTOPW ORDS T LWG ! NY AEFDMH THMETNY TWTEWTPOE KEUEAL ENEDLAW Still brewing on the BTC transactions sequence... [0.00404][0.005]@O[0.0009]#CHCKUSER[0.00404]!DO!!!"DONOT"HTTP I translate the 404 to --> Not found, possibly indicating we did not find the (complete) clue. The 0.0009 is strange, its is not binary due to transaction fees and the "9" seems to be right shifted one digit too far to indicate a number. coinartist seems to have vanished from all kinds of social sites. --> checkuser?--> not found.... cannot attack? Do not see? Using Google cache a transcript of her last twitter post can be found, referring to this puzzle. dimensions are mentioned (23" * 36") (first columns then rows... it could have been a hint....) Link to the source is mentioned. "i.imgur.com/Uc6VAnV.jpg" Could do with a new hint thought, riddles are not my thing...... and a couple of restful nights and productive days... :-)
|
|
|
|