Show Posts
|
Pages: [1] 2 3 4 5 6 »
|
Sorry, what exactly is happening in this?
Another form of random with "FLOAT" That's actually quite simple.. the 64-bit area is divided into decimal places. From 0.000001 to 1.000000 captures the entire range.. The size of the steps is set using the decimal places. This can be varied, the more decimal places, the smaller/finer the steps... Will it work with Python? If "NO" - perhaps there is an option for working with Python?
|
|
|
So nobody got to 64 - 16jY7qLJnxb7CHZyqBP8qca9d51gAjyXQN ?
|
|
|
I do not believe, this is a scam nothing is easy, a huge amount of money can hit our greed to carry out their scam, you need to think transparently because I it's definitely one of the scams or this is one of a number of unusual transactions possibly money laundering or some kind of insider trading. I recommend staying away from scammers and chances are when you join they will make you pay part of the fee and then evaporate with the money you joined. This user was obviously in the sauce, drinking when posting this...reading is hard, real hard. Please read all about puzzle/challenge before posting crazy talk. I completely agree with you.
|
|
|
To cchadwicka
You write some doubtful facts. You wrote that you opened your account and bought bitcoins on June 3, 2011 for $ 116. But this account was opened on March 01, 2011. February 9 - Bitcoin has reached a psychologically important mark - parity to the US dollar (1 BTC = 1 USD). Therefore, for $ 116 you could buy 116 BTC but not 79,956 BTC !!! Even if we assume that you could have redeemed bitcoins from someone at half price (i.e., 0.5 USD each), then for a maximum of $ 116 you could buy 232 BTC but not 79956 BTC !!!
|
|
|
Why did you write about this problem here on the forum? If you know everything and are currently negotiating with Bitstamp support - how can we help you? We can only wish you success in negotiations with the Bitstamp administration ....
|
|
|
I still can not lay out a single-threaded code, because it is not optimized by memory. Soon [/quote] We wait!
|
|
|
Why put it here if "... The first part of the script is useless/generic ..."
|
|
|
Can you send this python file to me in PM for testing?
|
|
|
Thanks is there a tool i can use to recover ? as i must have missed a few characters off or could someone help me via private message as i do not want to disclose it on here !!
You could use The FinderOuter. Compile it from source code or download the released version, run it offline. The program only has 2 options for now and you need the second option ("Missing Base58"). I believe the rest is self explanatory. It should take a second to find the right key(s) with 3 missing characters. Disclaimer: I am the developer of The FinderOuter. The project is brand new and in beta, I'll try to add new features (eg. not knowing the missing character locations) to it soon. Where can I download your software ( The FinderOuter ) for testing?
|
|
|
Could someone kindly help as i could use the BTC's right now!!!!! PS: If i use the the script on here and use this in github https://pastebin.com/S8WARrRn? will it work or do i have to use it on pastebin to run the script ? Many Thanks J Interestingly, something similar tools for private key recovery is available under PYTHON_27, maybe on Github ?
|
|
|
Hi gunchefi ! I was able to change a little. You can send PM me - I will say to you what I did.
|
|
|
Thanks - I shall try.
Yes I understand, that my questions have deviated this theme.
I APOLOGIZE...
If are available on this forum of a branch on themes of use in PYTHON of such tools as
RawTX_RSZ Recoveri_wallet R-Scaner r-s-z-to-wif
And others, on similar subjects - prompt section, or link
I tried to search, but has not found
|
|
|
Now RawTX_RSZ.py works
It turns out, that for decoding everyone new transaction needs to open and to edit a file RawTX_RSZ.py - to write down in him(it) new transaction .
Whether and it is possible to make, so that at start of a file RawTX_RSZ.py the field opened SCAN TX type tx: - here again it will be necessary to write transaction, which needs to be checked up
OR
So, that the file RawTX_RSZ.py read from a text file, for example RawTX_RSZ.txt in which previously is written down next transaction, and result it is possible to deduce(remove) in a window PYTHON or to save in a file (for example) RSZ_RES.txt
|
|
|
install ubuntu 18.04 LTS or windows 10 app
install python 2.7 + package
sudo apt install python sudo apt install python-pip pip install bitcoin pip install ecdsa pip install utils pip install base58
git clone https://github.com/160Bit/Bitcoin-Key-Compression-Tool.git cd Bitcoin-Key-Compression-Tool python RawTX_RSZ.py good luck! + you will make a video about it soon-)If WIN-7- 64 - allowed ? Let me know when the video is ready, please ...
|
|
|
When I start a file R-Scaner.pyC:\Python27 > python.exe R-Scaner.py SCAN ADDR type address: - here I write the address, which I want I checkAlso I receive result of check. When I start a file C:\Python27 python.exe RawTX_RSZ.pyI receive such result: Traceback (most recent call last): File "RawTX_RSZ.py", line 1, in <module> import bitcoin ImportError: No module named bitcoin
I thought, that will be written: SCAN TX type tx: - here again it will be necessary to write transaction, which needs to be checked upWhat I do not correctly? What for in a file RawTX_RSZ.py this is written down transaction? tx = "01000000013c10dccdd96187ec065a2404a829be91ccb2a80ee7986d4cbbb31cd493f69e5d00000 0006c493046022100c9f051042467433b2199526db1ba327154d2bcd7c90c40070ba06869c55121 94022100b1146f90fac7ed0db71d2f0c91f30c51d11310c508a64719dc424cdf710cb38b0121025 45d2c25b98ec8827f2d9bee22b7a9fb98091b2008bc45b3b806d44624dc038cffffffff0200c501 5a020000001976a914f507b67f6af2dcc993f6958c05855f4861cefe8888acc427e9254f0600001 976a914b3dd79fb3460c7b0d0bbb8d2ed93436b88b6d89c88ac00000000"I can not find the instruction, as correctly to work with a file RawTX_RSZ.py
|
|
|
Is it possible to recover a private key if I have 2 files of one encrypted wallet, but with 2 different passwords used and a list of all addresses used by that wallet, many used over a dozen times each? Passwords are 80% known, but I don't take that into account.
BlackPrapor Send PM to me
|
|
|
Yes, this is offtopic here. The main topic is about 100BTC transaction challenge, but not about finding for reused R values (as I understood you want to scan transactions for R, S, Z values in order to find the reused random number). In order to close this discussion here I just want to give you the link to related topic where R reuse discussions were made: https://bitcointalk.org/index.php?topic=581411.0You could immediately write this link. Thanks.
|
|
|
I don't have python. Even if I download python, I don’t know how to use it correctly. Studying late - I'm already old.
You have a very interesting position. Imagine you are sitting on the chair with 1USD note sticked from the bottom. If you want this 1USD note you should get off your backside, stand up and take it. Better write here your bitcoin address and promise to pray for the luck, and some lucky private key hunter will send you bounty once find the key I guess you will have better chances. At first : I do not intend to beg alms ! Secondly : I think that you are very much simplifying and reasoning from the perspective of a programmer. Try to teach some grandfather programming in any language. I'm talking about programming, not about working on a computer with ready-made programs (Word; Excel; clBitCrack, etc.) This is a useless discussion and off topic.
|
|
|
|