You are right, indeed pathetic, when you can have billions why ask for millions right? Well I like to earn honestly, plus I'm not greedy. But I'm glad you are not whining and laughing, laugh keeps us healthy, keep at it.😉
I need more people like, your comments gives me more incentive.
|
|
|
What is "farming" you refer to in your posts? Do you have live stocks, is it a wheat farm or ? Lol If by farming you mean account/merit farming then you are in the wrong place, you should go to bounties board, so many fruitless opportunities are present. Neither farming nor bounties have any future. To answer your question, merit sources should cry while meriting someone they don't like, and laugh otherwise.😂
Honestly unbiased sources are rare, but I hope they keep it that way. For example(rhetorically as if I'm a source) "I wanted to merit your post but mentioning "farming" made me think twice, which I will keep on my mind anytime I see your posts. However if you contribute selflessly, I might change my mind."
Edit: alright you got me, I'm an old dota fan, never liked WOW, just don't refer to farming, it's considered a bad thing around here.😉
|
|
|
Without a joke, I might have found a definitive solution to solve DLP, I'm not sure how I can implement an algorithm fast and precise to solve a key, but the equation in my head can solve DLP.
@Satoshi/ author/ designer of this challenge, I am willing to work for 1 years exclusively on this particular subject for a salary of $200m, which I would take $20m upfront and if after 1 year we reached the final solution I will take the remaining $180m, and if we couldn't find that solution, I keep the 20m.
I'm not 100% sure, I only discovered this new equation yesterday, but since all my calculations happen in my head, when I think about it I see the solution, I just need someone who I can trust and a professional programmer.
I will buy an apartment in another city to be alone and undistracted, then I will share the address and my ID. Obviously I accept no other sponsor/offer. If you are interested send dust to my digaran address with the same address you charged these puzzles, I will then encrypt my dedicated email address with your public key and post it here.
Disclaimer, I do not guarantee any satisfactorily results, this is just my term of business. Please note, I will continue working on this regardless, and God willing when I manage to solve a puzzle key, I will not share the method.
My dig add is on profile. Fun to know : There is a lot of controversy around my reputation, at one point in time, I "suggested" to charge $50 "bucks" from each garbage poster for the cost of their wrong doings. on behalf of forum, not for myself of course, now after 5 years, I'm asking for $200m from the #1 man of Bitcoin. Who could have thought that, right? Lol.
Anyways, I will do my best to keep a decentralized system such as Bitcoin alive and safe, for a better world, even if I'm only 1 man, it still counts.😉
|
|
|
Important message to the author : since we are "buddies" Visualize them in order, 0000380023a22094e68807800000e91c8910e9108f70e0000000000000000000 0000f7808480e79c861c851c800000000820145023880000742627242524252c 104028a0451082080080789c0b946a947b940000e6608440e45a8ddae0120013
When you are done, kindly visualize these on a king size bed.🙈 0000823c4424293c113001280104010000030002e00e82f09a908a90fa900000 You deserve them.😉
@zahid888, what is base58 match colorzz? Which tool has this feature? And finally how much is enough for you to kindly pull out of base58 match finding? Lol. I love it how you do your things without explaining anything.
I just found a new hobby, using btckeygen.com as a messenger medium.😂
|
|
|
Oh hi, welcome to my humble penthouse, thanks for your advices, but I am not concerned about my keys, as I was working on hash functions and collisions I got distracted from this topic by a more promising topic aka DLP solving challenge, I may never revisit my studies on hashes etc.
I believe the danger of solving the DLP is much greater than finding hash or ecc key collisions. So I had to choose what seemed to be the most impossible task, otherwise where would be the fun if not going after such difficult challenges, ehh. 😉
|
|
|
I can assume that the Satoshi was using some script (errors = ZERO) with Lagrange interpolation, determining the formula that generates the values may require a different approach, such as symbolic regression or other mathematical techniques together with random numbers and time. I am lost in numbers and hypotheses now. I need green grass.. ![Grin](https://bitcointalk.org/Smileys/default/grin.gif) What I understand from your post is ZERO, because I have no idea what you just said, while I could pretend that I understand, lol. Speaking of grass, yeah I haven't smoked for years.... wait are we talking about smoking them or hugging them?😂
Today I discovered something new, I just need to test a few things then I will post about it God willing. Ps, it's nothing important, just a few ideas to solve DLP, we shall see if it works or not.😉
|
|
|
Since when suchmoon and JellyGood became a trustworthy witness to determine whether someone is trustworthy or not, based on their words? I mean at least they should have used someone "reputable" and they should have done this in public, because good people would never conspire against others secretly, maybe they were afraid of a community backlash? I doubt they even care what the community thinks of them as they have openly and blatantly abused the system many times. ( typical Lauda like behaviour, different usernames but the same dark souls residing inside).
The act of defaming others like this is the lowest of the lowest levels of humanity. Honestly I'm not here to defend Royse777, I don't think there is any need to vouch for or defend him when people have eyes they can see the truth.
One thing I know for sure, evil is predestined to fail and lose at the end.
|
|
|
Why do you use linux time? Satoshi was using windows, either vista or seven, maybe even 8, or xp. 😂 we just need to look for all the keys. Lol You know what we should do? We should use the same technic to search for rmd160 hash patterns and find collisions. 🙃
|
|
|
Have you tried from 2000 up to 2015? You should also try 1990 to 2000, don't leave anything to chance, because for all we know he was a random guy using time and date to produce entropy. 😉
|
|
|
That is trust.
Alright, since this topic is about something else, I will make it short, trust is based on risk assessment, first you measure " how much this person has to lose if he runs with my money"? If he can earn $1m in a year by honest work, you could trust him with $1m, if you trust him with $2m, then you are fine with trusting "services" with usual amounts such as $200, $1000, since it shows you never had 2m to begin with. That's monetary trust, while there is another form called trusting the judgement of a person, and from what OP is complaining about, it appears he has found out that you can rarely trust someone's judgements around here, because they only care about themselves and not what is right. But yeah, haha hah fits the situation when all you know about trust is based on your forum experience, you have a lot to learn. Bottom line, you can't find more than 10 people with good judgement calls here, and 10 is a generous estimation.
|
|
|
Why would anyone use a third party to hold their keys? And this was supposed to be what exactly, an easy target for "hackers"? By the time people realize not to trust their money with none other than banks, I'd be long gone, universe would be long gone, meaning people will continue to do this. Bitcoin is a currency and a bank, if you want to give your funds to third parties for whatever reason, give them to banks and if banks don't offer such services, maybe they have a good reason.
This will keep on happening as it has several times in the past, simply because they don't want to listen to the warnings.
|
|
|
@digaran So I ran the code and I got 63 pubkeys I need to ask what would be the target 1 and target 2 and how can I further divide the pubkey of 130 to as low as 100 or 90 or 80 bit range after hitting a target from the public key results, how would I further calculate the private key to get my target private key
You should try to put 130 pub on target 1 and put G on target 2, and then calculate the range like this: Suppose we have a key in 130 bit range, dividing it by 64 gives us what? Lets try 2^130/64= 2^124, so you would need to have 2^124 public keys saved to compare the results of subtraction with, now if you divide 2^130/2^124= 64, now you only need to store 64 public keys starting from 1 to 64 for comparison, but you don't need to generate 2^124 divisions, just a few millions which would take a few days with my slow script, so first you need to boost the speed. I have already discussed about the possibility of finding a solution to solve private keys, and this is it, I won't be guiding anyone step by step on how to do it, if Satoshi or anyone who really cares about bitcoin and actually is an expert, they will figure it out soon enough, I have promised God not to reveal the final steps to anyone, let's hope nobody figures it out. Note, it's not an easy task, because solving each key requires a lot of steps, so many tries, so many errors but it can be done.
|
|
|
You mean that apart from your failed attempts to scam on the forum and your abuse of the trust sytem, you are now also the owner of the forum and decide who can and cannot reply to your thread? I would expect nothing less from you.
Wow, do you really believe if someone asks for loan without collateral is a scammer? And where is this trust abuse? Is OP a DT member? Because as long as you are not a DT member, it doesn't matter what you do with trust system, even if you were a DT member nobody would care if you abuse it or not, I have evidence to prove it.
Also if you are not a DT, you should at least try to help people on this board instead of adding salt to their wounds. However if Op had scammed some people in the past, I would have stopped the casino to pay him anything and would have requested for confiscation of his balance to make the victim(s) whole. Otherwise have some decency when you are judging people "you don't know".
@Op, lol I like the way you talk about hustling them, while you forget "house always win", what if in the future you lose more than $3000+ to them or any other casino? Would that be hustling? I wonder why nobody from that casino post here to clear things up?
|
|
|
I couldn't believe it until I saw them myself, at high altitude after midnight, first I thought they are asteroids but then I noticed they move in different directions orbiting each other moving at least 10 times faster than any airplanes I have ever seen, they didn't have any lights, they were high enough to reflect sunlight. I just hope we never see them face to face, have you seen how fe'd up they look? 🤣
|
|
|
So after I checked one of your trust feedbacks left on "Jolly good boy" 😂, can you tell me what is the difference between you and her kind? Is it really not a sin to hold people's reputation hostage for something they have done in the past, in your opinion? I'm telling this because it seems you have been touched by the grace of God, and understand wrong and right.
It's not that he/she deserves defending, I'm more interested to know why did you act like "them"? If you knew "Lauda" (known manipulator, obsessed with trust system, abuser) you could realize how they share some uncanny characteristics, share the same ideology and morale standards.
I'm just saying this because I see your potentials of being a good DT, I have tried to do the same for some of them in the past but I realized they can't be saved so I stopped.
|
|
|
From its name, it is linked to the market or places where transactions take place, not the boards designated for discussions. Also, its display may affect the quality of discussions, given that when people do not trust someone, they may question his ideas.
Isn't that exactly what mainstream media doing? Discredit or defame who ever they don't like. And if someone is influenced purely by a trust feedback no matter what the person is saying, whether they are quoting Shakespeare or Descartes, if you dismiss them simply because the person has neg, or if you take it to your heart and follow that person step by step because of pos trust. Well then, congratulations you have been successfully manipulated by social engineering tactics like 90% of people on earth.
I wonder, do people trade in all of the mining boards to have trust system enabled there? Also note that we have some topics posted on project development board which requires a level of trust and even involves purchases. Shouldn't trust be displayed there? Even if it's displayed, default trust score holds no value in a system based on pure anarchism, after all not everyone can be like Satoshi to eliminate the need of trust by writing codes and protocols, nobody is even trying to be like him.
|
|
|
Are we now the masters of Bitcoin security after reading 2 tips, 2 tools and 2 best practices? This forum has been active ever since Bitcoin was released by Satoshi, even after 14 years of activity we can't call anyone a master of security. Anyways my amigos! Never use closed source wallets, or install unofficial shields(whatever that means), once you give access to your private keys to any third party, you better be ready to say good bye to your funds at any moment.😉
|
|
|
As the "master math guru" of this community 🤥😂 I have always wondered, can God make it so when 2+2 you get 5, I mean he can do anything right? So how could we believe all of the rules of physics, mathematics? If it's possible to change the rules like that? It would be like saying since God can do anything, he should be able to clone himself infinitely, or more importantly, can God kill himself? These questions are taunting and impossible to know the answer for sure, but logic says he shouldn't be able to make 2+2=5, or create clones of himself or self destruct, that means logically even God has limits to his power. But is that really the case? Did he create the rules out of nothing or were these rules always there along side him?
I believe we are only one of the versions of infinite possible versions, so yes it is possible to see 2+2=5 under different governing rules of different universes, while it doesn't make any sense to us because we only know of 2+2=4, governing principles of our universe does not allow us to figure out how it is possible to have two plus two equal five, this is our limit, we can't go beyond this limit.
Now what is my point? There is a solution to solve these keys, also there is a relation between rmd160 and ecc keys, just because we can't think what they are doesn't mean they don't exist. If you seek knowledge, ask the source of knowledge. But if you quit trying midway, you will get nothing, so chop chop and God bless you.😉
Edit : this is my achievement after working on elliptic curve cryptography for more than 8 months. I set it to print the result of subtraction, if you want to see the result for scalar_1 remove "print" from the third line and add "print" to first line, so result_1 is the result of scalar_2 division, this happens when I work by myself and a world dominating AI. 😂 import gmpy2 as mpz from gmpy2 import powmod
# Define the ec_operations function def ec_operations(start_range, end_range, scalar_1, scalar_2, n, divide_1_by_odd=True, divide_1_by_even=True, divide_2_by_odd=True, divide_2_by_even=True): for i in range(start_range + (start_range%2), end_range, 1): # divide scalar 1 by odd or even numbers if i%2 == 0 and not divide_1_by_even: continue elif i%2 == 1 and not divide_1_by_odd: continue try: # calculate inverse modulo of i i_inv = powmod(i, n-2, n)
# multiply the scalar targets by i modulo n result_1 = scalar_2 * i_inv % n result_2 = scalar_1 * i_inv % n
# divide scalar 2 by odd or even numbers if i%2 == 0 and not divide_2_by_even: continue elif i%2 == 1 and not divide_2_by_odd: continue
# subtract the results sub_result = (result_2 - result_1) % n
# print results separately (f"{i}-{hex(result_1)[2:]}") (f"{i}-{hex(result_2)[2:]}") print(f"{i}-{hex(sub_result)[2:]}")
except ZeroDivisionError: pass
if __name__ == "__main__": # Set the targets and range for the operations scalar_1 = 0x0000000000000000000000000000000ff9450a667168a48762abcbe86653a6a1 scalar_2 = 0x0000000000000000000000000000000000000000000000000000000000000001
n = mpz.mpz("0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD0364141")
start_range = 2 end_range = 65
ec_operations(start_range, end_range, scalar_1, scalar_2, n) Note, you can also change "1" in the following line to divide by odd or even, for i in range(start_range + (start_range%2), end_range, 1): Replace 1 with 2 and print subtraction result to see it divides by 2, 4, 6 etc, replacing it with 3, will divide by 2, 5, 8, 11 etc, since our start range is 2 it will start from 2 and adds 3 each step. Even though I have already posted the script for point calculations, to make it easier for you to havd both scripts in one place, here goes the same script operating with public keys: import gmpy2 as mpz from gmpy2 import powmod
# Define the EllipticCurve class class EllipticCurve: def __init__(self, a, b, p): self.a = mpz.mpz(a) self.b = mpz.mpz(b) self.p = mpz.mpz(p)
def contains(self, point): x, y = point.x, point.y return (y * y) % self.p == (x * x * x + self.a * x + self.b) % self.p
def __str__(self): return f"y^2 = x^3 + {self.a}x + {self.b} mod {self.p}"
# Define the Point class class Point: def __init__(self, x, y, curve): self.x = mpz.mpz(x) self.y = mpz.mpz(y) self.curve = curve
def __eq__(self, other): return self.x == other.x and self.y == other.y and self.curve == other.curve
def __ne__(self, other): return not self == other
def __add__(self, other): if self.curve != other.curve: raise ValueError("Cannot add points on different curves")
# Case when one point is zero if self == Point.infinity(self.curve): return other if other == Point.infinity(self.curve): return self
if self.x == other.x and self.y != other.y: return Point.infinity(self.curve)
p = self.curve.p s = 0 if self == other: s = ((3 * self.x * self.x + self.curve.a) * powmod(2 * self.y, -1, p)) % p else: s = ((other.y - self.y) * powmod(other.x - self.x, -1, p)) % p
x = (s * s - self.x - other.x) % p y = (s * (self.x - x) - self.y) % p
return Point(x, y, self.curve)
def __sub__(self, other): if self.curve != other.curve: raise ValueError("Cannot subtract points on different curves")
# Case when one point is zero if self == Point.infinity(self.curve): return other if other == Point.infinity(self.curve): return self
return self + Point(other.x, (-other.y) % self.curve.p, self.curve)
def __mul__(self, n): if not isinstance(n, int): raise ValueError("Multiplication is defined for integers only")
n = n % (self.curve.p - 1) res = Point.infinity(self.curve) addend = self
while n: if n & 1: res += addend
addend += addend n >>= 1
return res
def __str__(self): return f"({self.x}, {self.y}) on {self.curve}"
@staticmethod def from_hex(s, curve): if len(s) == 66 and s.startswith("02") or s.startswith("03"): compressed = True elif len(s) == 130 and s.startswith("04"): compressed = False else: raise ValueError("Hex string is not a valid compressed or uncompressed point")
if compressed: is_odd = s.startswith("03") x = mpz.mpz(s[2:], 16)
# Calculate y-coordinate from x and parity bit y_square = (x * x * x + curve.a * x + curve.b) % curve.p y = powmod(y_square, (curve.p + 1) // 4, curve.p) if is_odd != (y & 1): y = -y % curve.p
return Point(x, y, curve) else: s_bytes = bytes.fromhex(s) uncompressed = s_bytes[0] == 4 if not uncompressed: raise ValueError("Only uncompressed or compressed points are supported")
num_bytes = len(s_bytes) // 2 x_bytes = s_bytes[1 : num_bytes + 1] y_bytes = s_bytes[num_bytes + 1 :]
x = mpz.mpz(int.from_bytes(x_bytes, byteorder="big")) y = mpz.mpz(int.from_bytes(y_bytes, byteorder="big"))
return Point(x, y, curve)
def to_hex(self, compressed=True): if self.x is None and self.y is None: return "00" elif compressed: prefix = "03" if self.y & 1 else "02" return prefix + hex(self.x)[2:].zfill(64) else: x_hex = hex(self.x)[2:].zfill(64) y_hex = hex(self.y)[2:].zfill(64) return "04" + x_hex + y_hex
@staticmethod def infinity(curve): return Point(-1, -1, curve)
# Define the ec_mul function def ec_mul(point, scalar, base_point): result = Point.infinity(point.curve) addend = point
while scalar: if scalar & 1: result += addend
addend += addend scalar >>= 1
return result
# Define the ec_operations function def ec_operations(start_range, end_range, target_1, target_2, curve, divide_1_by_odd=True, divide_1_by_even=True, divide_2_by_odd=True, divide_2_by_even=True): # Define parameters for secp256k1 curve n = mpz.mpz("0xfffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd0364141") G = Point( mpz.mpz("0x79be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798"), mpz.mpz("0x483ada7726a3c4655da4fbfc0e1108a8fd17b448a68554199c47d08ffb10d4b8"), curve )
for i in range(start_range + ( start_range%2), end_range, 1 ): # divide target 1 by odd or even numbers if i%2 == 0 and not divide_1_by_even: continue elif i%2 == 1 and not divide_1_by_odd: continue try: # calculate inverse modulo of i i_inv = powmod(i, n-2, n)
# divide the targets by i modulo n result_1 = ec_mul(target_1, i_inv, G) result_2 = ec_mul(target_2, i_inv, G)
# divide target 2 by odd or even numbers if i%2 == 0 and not divide_2_by_even: continue elif i%2 == 1 and not divide_2_by_odd: continue
# subtract the results sub_result = result_1 - result_2
# print the results separately (f"{i}-{result_1.to_hex()}") (f"{i}-{result_2.to_hex()}") print(f"{i}-{sub_result.to_hex()}")
except ZeroDivisionError: pass
if __name__ == "__main__": # Set the targets and range for the operations curve = EllipticCurve( mpz.mpz(0), mpz.mpz(7), mpz.mpz("0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFC2F") )
target_1 = Point.from_hex("03db8705a402eabb367c23a611249d01f4c631c0a449093ca97ff5d19a5cbce7aa", curve)
target_2 = Point.from_hex("0279be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798", curve) start_range = 1 end_range = 65 ec_operations(start_range, end_range, target_2, target_1, curve) Special thanks to @mcdouglasx for dividing by range code, and to @nomachine for gympy2 and mpz introduction. Ps, I'm not working to solve these puzzles, I am just studying elliptic curve, I haven't tested my methods on puzzle keys.
|
|
|
merit-receipt improvement consultant.
Thanks for the advices, I meant everything sarcastically, I can't handle this bitter truth/reality that people are actually happy and satisfied with themselves when they rank up or receive merits, it seems like this thing is all they should focus on, I no longer see (for many years) anyone talk about their goals about the time they will stand before their maker. Idk, every where I go I end up either off topic or come off as a troll, one can no longer discuss about other aspects of certain subjects. We should see people celebrating the important stuff, now I wonder what did we do wrong to reach this point? Are we going to "change the world" when all people care here is either trust gain, money earn or merit/ rank all pointing to $$$. I mean, wouldn't be better if we could rank good / quality contributors in one go, after at least 6 months of being active with a good track record? So they could focus on other things than just merit/ rank, that could statistically and gradually improve our standards, people would compete to contribute on things that matters. God knows how many potentially talented individuals are busy with pity things such as rank up/ merit etc while we could try and harness their true power and hidden talents. Make no mistake, Bitcoin is not just a currency, it is the crack in the shackles of capitalism. But take a look at our army against the giant of capitalism.☹
|
|
|
I always wondered, how animals hear us? Can they hear the words coming out of our mouth? I suppose some people are like that, they can't really understand.
It doesn't matter what others "think" of you, when they trust you with millions, you can say they trust you, but on the internet there is no such a thing as trust, only idiots trust random anonymous individuals.
|
|
|
|