From what he told, he used a password or passphrase which then lead to a BTC address and than mined to that address. He does not have a wallet file.
Judging from that, it must be a brainwallet. I 'd start looking there. I 'd try with multiple possible passphrase, to see if the addresses that are generated are indeed theirs and have unspent coins there. I agree, that's why I am testing with the script so that I can create several addresses from passphrase. Right now I am looking for a BTC address check service so that I can automate the process. BTW, there will be both BTC and BTH, looks like!
|
|
|
Are you sure the passphrase wasn't the password of his encrypted wallet file instead? What your script is doing, it's to use the passphrases as private keys of adresses hashed with SHA256. So it's a brainwallet basically. But if it was so "simple" I guess your friend would have already tried it with one tool or another during those 10 passed years, especially with the exponential increasing price of BTC, don't you think? Anyway I hope you will be able to find more clues. May Santa Claus be generous with you.
I do not know how in 2014 mining worked in the sense, wallet and mining to the btc address happened at the same time? It was transparent to the miner? Not sure. From what he told, he used a password or passphrase which then lead to a BTC address and than mined to that address. He does not have a wallet file.
It's for a friend who think he has the passphrase and wants to see if the addresses have Bitcoin!
If your friend mined bitcoin in 2014, but now has a wallet passphrase, he can unlock the wallet file and access his bitcoin. If not, he need an unenrypted wallet file to access his bitcoin. You can not brute force Bitcoin private key from Bitcoin public addresses that has balance, because if you can do it, many other people would have done it before you. Private key > Public Key > Public address, it's always one-way process, not way to do backwards like Public address > Pubic Key > Private key. Ad I mentioned he does not have a wallet file. He thinks he knows the passphrase or password used to create the address at command line for mining. He knows that he mined some coins. I do not know what process was back than. I am guessing, enter a password and than everything else was not so explicit and than started to mine. I am not trying to brute force anything. As I explain we have a "known" passphrase / password and want to use the script to create the pkey which leads to an address to see if it exists and contains coins. The script above takes some passphrase or passowrd, creates pkey, than creates a valid address and than it checks if the address has bitcoin.
|
|
|
I do not know and the guy does not remember how passphrase were used on command line. The miner/wallet he used and such!
If the script is correct and creates a valid address (for 2014 code) than I guess the passprhase/password he has are not correct since those addresses I generated with the script do not contain any coins!
I will continue digging the issue to see if I can trace back to 2014 enviroment. Maybe will go to check the Bitcoin code back than.
Thx for the help and if you get any idea pls post here! Happy Holidays!
|
|
|
What passphrase are you talking about? Does your friend know exactly how he generated his addresses? The way that you're generating addresses would be similar to how brainwallet used to generate legacy addresses, which can work only if your friend generated his Bitcoin wallet in this way. Depending on how weak the passphrase is, they should be empty by now.
Anyhow, if your friend is sure that he generated his addresses this way, you can easily just query any blockexplorer with the addresses generated. Else, you should probably try to find out how exactly was he generating his addresses.
P2SH-P2WPKH is probably the most common method that people would utilize a passphrase for when used in conjunction with P2SH. However, it didn't exist in 2014.
Passphrase or password. In 2014, mining bitcoin was possible on a computer (he did on a mac) and it was all command line. That's what my friend was doing. So we are trying to generate valid bitcoin addresses (not on the blockchain, nor wallets), to check if those addresses contain bitcoins. I am trying to help him by having the script generate valid addresses but since 2014 the hashing to create the private/public keys have been changed so I am trying to figure out if the script above is valid to create bitcoin addresses created at that time. Does it make sense? thx for the comments!
|
|
|
Hello, I am trying to "generate" bitcoin addresses from 2014 to see if they have some satoshi. It's for a friend who think he has the passphrase and wants to see if the addresses have Bitcoin! I am using AI to create a script to do the following: write a script to create bitcoin P2PKH and P2SH formats valid addresses starting from several passphrase. Print the passphrase for each address indicating the address formats. Check also if the address has bitcoins.
The scripts works but I do not know if these addresses are correct. I check on https://www.blockchain.com/explorer/ if these addresses exists and it tells me if they are P2PKH and P2SH format. Any ideas? import hashlib import base58 import requests
def generate_p2pkh_address(passphrase): # Generate a public key from the passphrase private_key = hashlib.sha256(passphrase.encode()).hexdigest() public_key = hashlib.new('ripemd160', hashlib.sha256(bytes.fromhex(private_key)).digest()).hexdigest() # Create P2PKH address p2pkh_prefix = '00' p2pkh_address = p2pkh_prefix + public_key p2pkh_address_checksum = hashlib.sha256(hashlib.sha256(bytes.fromhex(p2pkh_address)).digest()).digest()[:4] p2pkh_address += p2pkh_address_checksum.hex() p2pkh_address = base58.b58encode(bytes.fromhex(p2pkh_address)).decode() return p2pkh_address
def generate_p2sh_address(passphrase): # Generate a public key from the passphrase private_key = hashlib.sha256(passphrase.encode()).hexdigest() public_key = hashlib.new('ripemd160', hashlib.sha256(bytes.fromhex(private_key)).digest()).hexdigest() # Create P2SH address p2sh_prefix = '05' p2sh_address = p2sh_prefix + public_key p2sh_address_checksum = hashlib.sha256(hashlib.sha256(bytes.fromhex(p2sh_address)).digest()).digest()[:4] p2sh_address += p2sh_address_checksum.hex() p2sh_address = base58.b58encode(bytes.fromhex(p2sh_address)).decode() return p2sh_address
def check_balance(address): response = requests.get(f'https://api.blockcypher.com/v1/btc/main/addrs/{address}/balance') if response.status_code == 200: return response.json()['final_balance'] return None
passphrases = ['passphrase1', 'passphrase2', 'passphrase3']
for passphrase in passphrases: p2pkh_address = generate_p2pkh_address(passphrase) p2sh_address = generate_p2sh_address(passphrase) p2pkh_balance = check_balance(p2pkh_address) p2sh_balance = check_balance(p2sh_address) print(f'Passphrase: {passphrase}') print(f'P2PKH Address: {p2pkh_address}, Balance: {p2pkh_balance} satoshis') print(f'P2SH Address: {p2sh_address}, Balance: {p2sh_balance} satoshis')
|
|
|
Hello,
any chance for a macos version? thx
|
|
|
Hello,
what is the best dual mining algo pair that can be used with this miner? thx
|
|
|
Hello,
I just restarted some miners after long time. I am using 5.5c on 580 8Gb since later versions gave me errors. They are all around 29/31 Mh, can I squeeze some more hashes ?
Also one 580 is a 4Gb, so I am mining ETC, but the Mhs is around 15 Mhs, I remember it suppose to be around 29. There are the settings I am using: -proto 2 -coin etc -cdm 0 -stales 0 -worker AMD5804G -gpus 1 -amd -acm -astats 1 -astats 1 -leaveoc -mi 14 -gt 40 -gser 2 -wdog 1 -tt 80 -tmax 80 -fanmin 70 -fanmax 85 -powlim -15 -cclock 1200 -mclock 2050 -cvddc 930 -mvddc 960 -log 0
Also -tmax 80 not working, it sets it to 84 default.
Am I missing something from when I was mining with version 3.0 ?
thx
|
|
|
There are 2 config files in the github https://github.com/ganzocrypt/xmrig-macos/releases/tag/v6.13.0-dev-macosI used KawPow on unminable and I played a bit with Intensity: "kawpow": [ { "index": 0, "intensity": 36864, "worksize": 256, "threads": [-1] } ], So you can check that in the OpenCL section of the config. Start with a low number and increase it. The above was for a 580 8gb
|
|
|
Hi,
is there a way to disable API server? Cannot find if exists in the -help
Answer: --api-bind-telnet 0 --api-bind-http 0 will disable it.
|
|
|
@miner29
Thanks a lot will update the release note!
|
|
|
@miner29 did you had a chance to test it?
can you share coin / card / cpu / macOS version so I can add to the list
any issues?
thx
|
|
|
I saw that video, my cards are older  1080 TI, 1070 TI and 1060 6Gb. BTW I am on Ubuntu thx
|
|
|
I recompiled xmrig with latest libs. No feature changes so just get the one on the github. Please report any issues, or success with algo and card so that I can update the list. Download binary from here: https://github.com/ganzocrypt/xmrig-macos/releases
|
|
|
@miner29
Oh cool, great to know that is working, let me know if there are any issue. So you are mining on rx/0 on GPU, which coin? Also will update the list of Cards and Algo that is supporting as people using the miner can give some feedback ( it's like trial and error).
Will probably update it soon since I recompiled bunch of libraries that needed to be update it in brew.
Ok RVN needs more memory, great to know!
You can play with intensity and worksize to increase hashrate, just keep in mind that at certain point you might have issues with the miner. At that point just lower the values.
I tested on RX580 8Gb, getting around 7Mhs and I have the following: "kawpow": [ { "index": 0, "intensity": 36864, "worksize": 256, "threads": [-1] } ],
|
|
|
@BenhurMarcel You should mine those 2 coins with the CPU. Only KawPow is supported for GPU mining at this stage You should have only one thread per card. I posted 2 config files samples.Can you post the OpenCL section of your config file? There are still issues in supporting some algos for AMD cards as you might know OpenCL is not supported anymore by Apple. NOTE: Updated the tested Algo, if you test a different algo and it IS/NOT working please let me know. https://github.com/ganzocrypt/xmrig-macos/releases/tag/v6.13.0-dev-macosA suggestions, you can mine with your CPU Keva or Monero and with your 2 GPUs (if GPU memory is enough, since 2Gb is low) you can mine RVN coin. If you want to try this, you need to have 2 instances of xmrig with 2 different configs. So you launch on 2 different terminal: ./xmrig -c configCPU.json ./xmrig -c configGPU.json
|
|
|
Let me know if there are any issues and if you need help with the config file.
|
|
|
Yeah I know.
The issue is that macos OpenCL is basically not supported and OLD, like version 1.2. So some dev made the miner but it does not work on all combination since libraries mismatch.
I helped to test and recompile the xmr code. It was a real pain ! I had to use homebrew, recompiled bunch of libraries. Modify some make scripts and finally worked. I tested on KawPow, so you can use unminable or other auto-switching pools service to mine bunch of other algos too.
I know there are a lot of people with hackintosh and AMD cards who can use this miner if they want to. Looking to see if there are any issues (which probably there are) with other AMD cards, I tested on RX 580 and someone tested on Radeon Pro 5300
|
|
|
First release of XMRIG for mac os working for CPU and AMD GPUs. Some algos are still not working using AMD GPUs due to OpenCL not supported by by Apple anymore. For example UPX, which is a CPU mineable coin, gives errors if mined with GPU. All other Algos should work, if not, please provide information in the issue section. All work for making XMRIG working with AMD GPUs is from @Spudz76, I just went through the trouble of compiling the code for macOS which was a pain with all dependencies and Homebrew installs. - You can run one instance of XMRIG for the same algo/pool with CPU and GPU
- If you want to run on different pools, you can run 2 instances of XMRIG with 2 different config.json, one for CPU and the other for GPU and define 2 different algos and pools.
Download binary from here: https://github.com/ganzocrypt/xmrig-macos/releasesIf there are any questions of issue please post here or on the github issue page https://github.com/ganzocrypt/xmrig-macos/issues
|
|
|
|