Show Posts
|
Pages: [1] 2 3 4 »
|
Oh my. You should use hash160.update(hashlib.sha256(PUBLIC_KEY).digest()), and you can't calculate public key without using Elliptic Curve DSA. import hashlib
passphrase = "" print hashlib.sha256(passphrase).hexdigest() #<-- e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
# tons of ecdsa related stuff, e.g. # k = ECDSA_KEY() # k.generate('e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855'.decode('hex')) # echo k.get_pubkey().encode('hex') # <- 04a34b99f22c790c4e36b2b3c2c35a36db06226e41c692fc82b8b56ac1c540c5bd5b8dec5235a0fa8722476c7709c02559e3aa73aa03918ba2d492eea75abea235
pub='04a34b99f22c790c4e36b2b3c2c35a36db06226e41c692fc82b8b56ac1c540c5bd5b8dec5235a0fa8722476c7709c02559e3aa73aa03918ba2d492eea75abea235'.decode('hex') hash160 = hashlib.new('ripemd160') hash160.update(hashlib.sha256(pub).digest()) print hash160.hexdigest() #<-- b5bd079c4d57cc7fc28ecf8213a6b791625b8183
|
|
|
It decodes transactions as well, just paste raw transaction to the Raw Transaction field.
|
|
|
just remove spaces from the copypaste above (forum engine breaks line every 160 chararacters) 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
|
|
|
Those (DER) keys are ASN-encoded, try http://lapo.it/asn1js/ It contains both private and public keys along with a generator OID description (in this case, 1.2.840.10045.1.1). First OCTET STRING (32-bytes) is usually a secret exponent, which you may convert to Base58Check ver. 128 or import as is.
|
|
|
Nope. Compressed keys (default ones, since 0.7) start either from L or from K.
|
|
|
L5iyipTyQ6kHHcumG2ihbBnqJFGBq9nXY53Mmp3uPBg5FE82vNTC is a valid private key for the "compressed" pubkey of 13E4sDkWHMBJqFe9yFWM1JyBmJz5LZKUEL (secret exponent fdc17449119f6cc1857f07d3cb53868b8df79b20d8c5a282d88ae19cb7d67ceb). Blockchain.info imports it just fine.
Both 5KHV7MizuJ9FXfoK1jongbYeAHiDL49FAQphAyoUgJ8jUrJi56i and c17449119f6cc1857f07d3cb53868b8df79b20d8c5a282d88ae19cb7d67ceba0 are wrong.
|
|
|
Oh god! Isn't it a way too public?  I'd restrict it for logged users only. The bug with no method 'abs' seems gone.
|
|
|
Got "TypeError: Object 31 has no method 'abs'" on sending (not related to transaction notes) 3 different times, might be an error while gathering inputs. Once it pops up it doesn't allow to send given amount anywhere. I'd suggest not using blockchain.info until fixed. Edit: not only me (though I got object 31 not 51 and don't have any rejected transactions). I had returned bitcoin transaction on my blockchain wallet, I guess the fee was insufficient and now when I try to send those funds I see " TypeError: Object 51 has no method 'abs' " Has anybody ever had this error with blockchain?
|
|
|
EDIT: There's some discussion about the legality/need of providing information about all the sub-accounts. In truth, Payb.tc is the only "account" of BCS&T, and therefore is owed the entire amount. I'm not sure how I feel about pirate getting your entire customer list, with bitcoin addresses and email addresses.
There are NO EMAIL ADDRESSES! Nobody never asked my email in PM and there are NO emails in the web interface. Paybtc, please send my account to pirate. I don't mind.
|
|
|
I'll dump on every 16th in a month! heh
I noticed it a short while ago.
|
|
|
Someone please decode for those of us (me) who are too lazy to do it.
It's 'drink your ovaltine' and 'so long and thanks for all the fish'. I used the script here http://pastebin.com/GbWQgP4s
|
|
|
Are you going to refund those 3,000 BTC stolen with bitscalper?
|
|
|
Apparently all the fancy algorithm stuff I did was completely superfluous.  - Thanks to Joric for the pointer. You're welcome! Damn, I should read forum more often, I wrote js siginig/verifying code 08-12 and the bounty was pledged 08-14. My tip jar is in the signature.
|
|
|
I don't understand why everyone writes about billions of keys per second. It's really slower than you think, at least for now. Calculating sha256 is really just a tiny fraction of calculating an ecdsa keypair. While vanitygen only does 1 EC addition, calculating an ecdsa key from seed needs at least two full blown multiplications of big numbers. Long story short, CPUs only can generate about 1,000 keys a second, modern GPUs can calculate 20,000 keys a second, tops. Not billions, thousands. 6 orders of magnitude smaller than billions. 1,000 times slower than vanitygen.
|
|
|
I'm sorry, but https://github.com/joric/pywallet never ever used Twisted and Zope.Interface. So, the real installation should be like: 1. Install Python-2.7.2.msi (bsddb included). That's basically, all.
|
|
|
All those logos are pathetic. Why don't you get a bounty up and find some guy on dribbble?
|
|
|
Could you please add importing arbitrary passphrase as a key (see http://bitaddress.org for example). I.e. if private key format is not recognized, suggest using sha256 of the passphrase.
|
|
|
What energy is free? Like hamsters going in a wheel?  If they wouldn't eat.. Damn, I pay almost less for my own dinner.. Heard someone just tried 51% attack on LTC. Easy with those hamsters!
|
|
|
|