if everything is true about stealing, why they do not steal from everyone? There are milions of transactions every day. If this was the case, nobody was using bitcoin anymore...
We are speaking about small ranges to who range 1 to 75 belong (as an example). From the point you know the pubkey of one of those puzzles, triggered by the normal send transaction, you still have some seconds or perhaps minutes to highjack it and get the coins into your own wallet. In this process there are used bots running 24 hours a day, so that if such transaction is detected they will start a programm to find the private key from the public key of that low range puzzle. Nowadays there are very fast applications powered by GPUs, not knowing if they use BSGS, Kangaroo or other methodes. Please note, that this is only possible with small ranges, otherwise yes, this would endanger the whole BTC universe. 
|
|
|
Try to use spoofing after upgrades:)
If I'd only knew how, I would use spooping just to know the ranges that were already scanned and also to get the source code of your server and client...  But I guess spoofing is much more than ping and wget.
|
|
|
This isn’t my program — it’s originally by @FrozenThroneGuy. I just made a few tweaks here and there… maybe around a thousand extra lines of code  Yes, Dookoo2 is the creator of Cyclone having had his illumination from JLP VanitySearch and he also has the merit of having added GPU version. There were some other good derivations, but they went fishing... After deleting their whole GITHUB repository, because they feel atacked or offended by someone here at BITCOINTALK... 
|
|
|
Very creative!  This is your programm tough? prefixsuffix.exe --address 1PWo3JeB9jrGwfHDNpdGK54CRas7fsVzXU --prefix 4 --suffix 2 --range %range% --grid 512,512
|
|
|
Yes, that's an interesting approach. Perhaps you could add a feature to search a file with ranges, like NOMACHINE had done in the normal CYCLONE.
|
|
|
The difference in speed really stands out, and it makes a big impact on performance.
I am getting 2,5 billion keys /s with FixedPaul
|
|
|
With Little tweaks.. prefix enthusiast like this  Do you have it at github?
|
|
|
It can be calculated using this code: import base58
min_val = base58.b58decode('1PWo3Je111111111111111111111111111').hex() max_val = base58.b58decode('1PWo3Jezzzzzzzzzzzzzzzzzzzzzzzzzzz').hex()
# Total possible addresses in range (excluding checksum) n = (int(max_val, 16) - int(min_val, 16) + 1) >> 32
# Adjust for 40-bit partial match (assuming 70 bits fixed) n = n / (2 ** (160 - 70))
# Define the target range (0x400000000000000000 to 0x800000000000000000) range_size = 0x800000000000000000 - 0x400000000000000000
print("Average matching addresses per 40-bit pattern:", n) print("Range divided by n (range // n):", range_size // n)
|
|
|
When playing with some iceland tools which is https://github.com/iceland2k14/kangaroo i got this speed on CPU - [24894.64 TeraKeys/s][Kang 28672][Count 2^29.29/2^29.10][Elapsed 06s][Dead 1][RAM 53.4MB/46.0MB]
Is it good bad fake idk but like i know iceland tools are good iceland2k14 is proprietary and all his tools contain backdoor do not use iceland2k14 libraries unless you want to loose your keys or findings good luck If you suspect that there is a backdoor in it, you can always use it offline. If it doesn not work offline, than you should be worried about it. But I don't think ICELAND is puting some backdoors in his apps...
|
|
|
And this? Puzzle71/Puzzle 71.013.000.csv What kind of data does it contain? pubkeys? private keys in range b71?
|
|
|
So you also deleted your repositories from NoMachine1 ? @nomachine:
Thank you so much for your software and your effort.
Yes, I agree with you.
|
|
|
And moreover if you have some interesing ideas or questions you can always contact me on telegram.
Yeahh, I remember those days, and then you were gone.  I'll keep using Cyclone, but your code is always intersting.
|
|
|
Trying Point_Search_RC So, for puzzle 135 it would be;  134 135 25 02145d2611c823a396ef6712ce0f712f09b9b4f3135e3e0aa3230fb9b6d08d1e16
and it goes forwards and backwards?
|
|
|
So the table is not saved into a file?
|
|
|
You're right. I've already lost some coins to the virus. I paid them handsomely.  I remember the days, when I received some email to download the update of a BitGreen wallet software. It was a backdoor. By the time I had some other wallet that were not protected by a password. I've lost around 5000 usd at the time. I think in the year of 2018. I've started with crypto in 2017.
|
|
|
So there's no way a random seed for 135 could be found by chance—I'd have better luck winning the lottery.  Keep playing! Just keep playing before all puzzles are gone... 
|
|
|
20 bytes.  The bigger the length, the bigger the seed...
|
|
|
Theoretically, yes. Practically, it takes a long time to guess the correct seed. Also, you have to change the length from length = 8 to length = 9 in order to go up to 70....
If you're searching for 135, the lenght would be?
|
|
|
LOL  go ahead and give puzzle 51 (or 49?) a try  Nay, I was thinking of P135, but for that I have BSGS. 
|
|
|
- [Hops: 2^24.44 <-> 1982097 h/s] [00:00:10]
- PUZZLE SOLVED: Mon May 5 10:14:22 2025, total time: 10.73 sec, Core: 04
- HEX: 00000000000000000000000000000000000000000000000000022bd43c2e9354
I like you'!  I'm using only 1 thread... No money for electricity [+] [Kangaroo]: Mon May 5 20:38:50 2025 [+] [Puzzle]: 50 [+] [Lower range limit]: 562949953421312 [+] [Upper range limit]: 1125899906842623 [+] [Xcoordinate]: f46f41027bbf44fafd6b059091b900dad41e6845b2241dc3254c7cdd3c5a16c6 [+] [Ycoordinate]: eb3dfcc04c320b55c529291478550be6072977c0c86603fb2e4f5283631064fb [+] [Expected Hops: 2^25.64 (52198446)] [+] [Using 1 CPU cores for parallel search]: [+] [Core]: 04, [Random seed]: b'\xbc\x9b\x8cd\xfc\xa1?\xcf'
[+] PUZZLE SOLVED: Mon May 5 20:38:59 2025, total time: 8.82 sec, Core: 04 [+] HEX: 00000000000000000000000000000000000000000000000000022bd43c2e9354
|
|
|
|