Show Posts
|
Pages: [1] 2 3 4 5 6 »
|
Day 14 Complete{ "chain": "main", "blocks": 883679, "headers": 883679, "bestblockhash": "000000000000000000023fce8e25d338d1aae5c586ef9bb8467c0e6bc734da07", "difficulty": 114167270716407.6, "time": 1739509230, "mediantime": 1739507157, "verificationprogress": 0.9999962634529578, "initialblockdownload": false, "chainwork": "0000000000000000000000000000000000000000ae151f2139d63ce2ae127380", "size_on_disk": 759247860, "pruned": true, "pruneheight": 883301, "automatic_pruning": true, "prune_target_size": 838860800, "warnings": [ ] }
|
|
|
Day 13 { "chain": "main", "blocks": 883547, "headers": 883547, "bestblockhash": "000000000000000000020d5888050fe10eb464a37436010d71317c141ca95b38", "difficulty": 114167270716407.6, "time": 1739434478, "mediantime": 1739431548, "verificationprogress": 0.9999978692527615, "initialblockdownload": false, "chainwork": "0000000000000000000000000000000000000000addf94c3522789894582a358", "size_on_disk": 797852003, "pruned": true, "pruneheight": 883140, "automatic_pruning": true, "prune_target_size": 838860800, "warnings": [ ] }
|
|
|
Day 12 { "chain": "main", "blocks": 883395, "headers": 883395, "bestblockhash": "000000000000000000015490b57f7ca24bc6b08c608e5a757db1c20864e523d9", "difficulty": 114167270716407.6, "time": 1739342444, "mediantime": 1739339200, "verificationprogress": 0.9999995282651017, "initialblockdownload": false, "chainwork": "0000000000000000000000000000000000000000ada1edac856de1ccfba6bb68", "size_on_disk": 809597609, "pruned": true, "pruneheight": 882994, "automatic_pruning": true, "prune_target_size": 838860800, "warnings": [ ] }
|
|
|
I've just sent OP a mail containing a veracrypt container of the recovered zip files (198) I would have sent the files through gmail packed with winzip, but gmail found virus in the zip files, so that wasn't a possibility. So for anyone looking into this, just be careful with any recovered files, as they may contain virus. I have not extracted any of the zip files, only touched them to see the content, none of the zip files has content related to bitcoin.
weird ISO dump actually contains other drive contents guess dos RAW DWD dump software wrong mapped drive letters have to do redo RAW dump one more time link to software than can read DWD sectors directly could be handful
|
|
|
Day 11 { "chain": "main", "blocks": 883258, "headers": 883258, "bestblockhash": "0000000000000000000131e9b99401cc426a2c4458cc8d41747ae225a6cd eac6", "difficulty": 114167270716407.6, "time": 1739250078, "mediantime": 1739244776, "verificationprogress": 0.9999989571851879, "initialblockdownload": false, "chainwork": "0000000000000000000000000000000000000000ad6a5c20647c715adac3e54e ", "size_on_disk": 690934693, "pruned": true, "pruneheight": 882922, "automatic_pruning": true, "prune_target_size": 838860800, "warnings": [ ] }
|
|
|
used DOS assembler written tool (downloaded from optical media recovery toll site) that accessed DWD directly without detection sequence required usually hardware DWD reader first have to detect, it was like infinite loop moving dwd heads sound tryin to detect it for about few minutes than silence assembler written tool skipped detection stage somehow and copied data sector by sector to dump file on PC drive it is not ISO, it RAW copy of DWD sectors stored in one file, to confirm it is not garbage archiver was able to extract "Microsoft Basic Data" partition from it password protected archive usually produce data looking like garbage actually it is not zip signatures is exactly Im looking for, possible select zip signature with further data in hex editor and save as separate file would be great not sure in what order files stored in DWD, wallet archive should be first one small file (megabytes size) at the beginning of data send me steps in private how partiton was mounted the only explanation why it is not standard ISO format, DWD was used as bootable system drive for both unix, windows before data storage
|
|
|
Maybe this is the wrong DVD ?
Many of the files recovered has timestamps from 2016 and 2018, which they should'nt have according to your memory I can provide the recovered files for you, reach out to me in a direct message with a mail address i can send the files to.
EDIT: i've not seen anything related to bitcoin, and also not any password protected archives
thanks for update anyways progress done, have to check and confirm wrong DWD possibility, reupload
|
|
|
I assume the archive type used is .zip ? you did not mention. I've managed to carve through the content, and i've not found anything related to bitcoin, yet.
From testing zip and rar files with both normal archives and encrypted with password, some of the content should still be possible to read in hex, at least that was possible for me when i tested with just a .txt document inside a test zip and rar archive.
I've had no luck finding any password protected files (the 2 types possible to create in modern day zip)
Is the file you're looking for named: recovery.txt ? i've found information about a file named that, that file was created in July 2017
was only two write sessions first in 2010, second two years later it was exactly 10 BTC, possible explorer scan for that period with BTC address that received exact amount and staying dormant making any of the archive unpacker recognize data and ask for password could help windows built in archiver can manage multiple password protected file type confirmed
|
|
|
Day 10 { "chain": "main", "blocks": 883122, "headers": 883122, "bestblockhash": "000000000000000000026fad38fbc3197128ed68f233f46bc97ccea1d9561df1", "difficulty": 114167270716407.6, "time": 1739161024, "mediantime": 1739158369, "verificationprogress": 0.9999902156297859, "initialblockdownload": false, "chainwork": "0000000000000000000000000000000000000000ad33326a4efec05411f1a9fe", "size_on_disk": 732578623, "pruned": true, "pruneheight": 882769, "automatic_pruning": true, "prune_target_size": 838860800, "warnings": [ ] } root@node500k:~#
|
|
|
So your first writing session on the rewritable optical media has the password protected archive with your wallet file in it. confirm Do you remember that your second non-finalized writing session that wrote the Photoshop archive extended the first session, i.e. both archives should've been visible after your wrote the second session? You did verify that your written backups were initially readable, didn't you? was readable Have you checked that your DVD-RW reading device is working properly? checked Have you tried with another optical reading device? I did Which software specifically did write the sessions to the optical media? not sure, guess it was windows 7 built in burner What kind of archives have you used specifically (zip, rar, ...)? rar, zip
|
|
|
Bitcoin was bought in 2010 using paypal, price at time 0.03 USD Wallet placed in password protected archive burned to rewritable DWD drive After this Adobe Photoshop archive was added to same DWD drive, writing session not closed 10 years later DWD reader is not able to detect drive Used DWD recovery tool to dump image 4GB to iso file, uploaded to google drive Willing to share 1 BTC, who can make this ISO file mountable and possible to view archive contents Both passwords for archive and wallet itself known
So all you have to do is mount the ISO image and read it's contents ? You can do that easily by doing a little research. Why offer 1 BTC for it ? I would suggest directly opening the ISO image in winrar and extract it. If it doesn't work then try using PowerISO which is a tool to mount ISO images. It does not want to mount in Windows 10, guess PC from 2010 required with Windows 7 to open it Tried other combinations, other specialist messaged that he was actually able to open it up to step when archive file list is visible, yet waiting for reply from him, steps was used.
|
|
|
Day 9 { "chain": "main", "blocks": 883001, "headers": 883001, "bestblockhash": "000000000000000000029447feec869a6cff5ed3c3b1443a5bf6e0f4108633d2", "difficulty": 108105433845147.2, "time": 1739091244, "mediantime": 1739089497, "verificationprogress": 0.9999997027099119, "initialblockdownload": false, "chainwork": "0000000000000000000000000000000000000000ad023f53502a97a35d1c172c", "size_on_disk": 786504193, "pruned": true, "pruneheight": 882618, "automatic_pruning": true, "prune_target_size": 838860800, "warnings": [ ] }
|
|
|
Day 8 { "chain": "main", "blocks": 882874, "headers": 882874, "bestblockhash": "000000000000000000005aeb207d1049b5182029daf4e58ca56fe98b5818ed1e", "difficulty": 108105433845147.2, "time": 1739014969, "mediantime": 1739013395, "verificationprogress": 0.9999983323459066, "initialblockdownload": false, "chainwork": "0000000000000000000000000000000000000000acd17853cd5fd4def0ab41da", "size_on_disk": 676794627, "pruned": true, "pruneheight": 882540, "automatic_pruning": true, "prune_target_size": 838860800, "warnings": [ ] }
|
|
|
Day 7 { "chain": "main", "blocks": 882801, "headers": 882801, "bestblockhash": "00000000000000000002861bbe2e3fae25fa4c8839ae3f7067ed3d3cdb36e6c6", "difficulty": 108105433845147.2, "time": 1738977657, "mediantime": 1738973475, "verificationprogress": 0.9999992418283029, "initialblockdownload": false, "chainwork": "0000000000000000000000000000000000000000acb56ec2f3139953d49ac73c", "size_on_disk": 671340426, "pruned": true, "pruneheight": 882468, "automatic_pruning": true, "prune_target_size": 838860800, "warnings": [ ] }
|
|
|
Extracted "Microsoft Basic Data" format file from ISO using zip unpacker In powershell "Virtual format adapter not found" message Another virtual drive manager says "Unsupported version" Wallet placed in password protected archive burned to rewritable DWD drive
Used DWD recovery tool to dump image 4GB to iso file, uploaded to google drive Willing to share 1 BTC, who can make this ISO file mountable and possible to view archive contents
1. What software did you use to create the wallet file? Native BTC wallet 2. What software did you use to create password protected archive? WinRar Those questions are important, since you could read the RAW file directly and use magic bytes/file signature to locate segment which represent the password protected archive. Already done RAW file saved as "Microsoft Basic Data", magic bytes found Technically, any iso file should be mountable on a cloud infrastructure. If you got an iso, then it's a matter of just uploading it to a cloud provider and starting it there. If it's corrupted tho, then you're out of luck. Maybe put it on github so we can give it a go
|
|
|
Day 6 { "chain": "main", "blocks": 882691, "headers": 882691, "bestblockhash": "00000000000000000000dfa0777d81f85ee1ba7bdb3124907a59088f7d113192", "difficulty": 108105433845147.2, "time": 1738921859, "mediantime": 1738919694, "verificationprogress": 0.9999988624168473, "initialblockdownload": false, "chainwork": "0000000000000000000000000000000000000000ac8b2f40597a270e7cba0e78", "size_on_disk": 759689426, "pruned": true, "pruneheight": 882327, "automatic_pruning": true, "prune_target_size": 838860800, "warnings": [ ] }
|
|
|
What is the extension file of the dump image after you recover it from DWD recovery tool?
Have you already tried to use some software to convert them into ISO file?
If not and the image file extension is .img then I think Power ISO can be able to convert that or directly open it with PowerISO. You should be able to find all files inside this dump image using that software.
Another alternative is "imgtoiso" It is free software; you can google it.
thanks for update, archive format headers do visible using hex editor inside, normal software was not able to access DWD, used special tool that did raw dump of drive, not sure if ISO format actually, more probably DWD rewritable format, dump tool copied raw bytes from DWD, means it exact DWD copy but in binary bytes format without extension Anyways dealing with DWD boot detection sequence no longer necessary, it could be skipped because now all the data copied to file already Wallet takes small part of data at the beginning of file, copy raw bytes, than check fully match archive specification could be possible route, at the moment archive extractor can not load it, even to show file names inside Another route to unhash file content with known password manually Windows 10 use unicode character table now 2 bytes per symbol, in 2010 it was in ASCII format on byte per symbol, using older 2010 PC could help PS. OP, you may want to get your story right. I am 100% certain you didn't buy only 10 BTC at 3 cents a piece. That would be 30 cents for all what you've stored in the DVD. Changing the price to 0.3$ or 3$ could make sense, changing the amount to 100 or 1000 BTC would also make sense. But I highly doubt you bought only 30 cents worth of BTC.
It was hard to buy BTC back than, nobody was selling, only later mtgox first exchange appeared PS2. I just noticed that the account is from 2019 and you have red tag... I wonder what you aim actually.
Some guy did not liked my other order although it was done accurate and precisely, I wish bitcointalk have dispute system for better seller protection.
|
|
|
Bring real users to your telegram group(channel) 10 daily users during month, 300 per month, quote 50 usdt Proven method similar to instagram, reddit follow for follow applied on telegram. I create new user with your exact telegram group name and join daily (during 30 days) as new user other relevant groups with 100k members It generates steady traffic daily, provide proof possible
|
|
|
Bitcoin was bought in 2010 using paypal, price at time 0.03 USD Wallet placed in password protected archive burned to rewritable DWD drive After this Adobe Photoshop archive was added to same DWD drive, writing session not closed 10 years later DWD reader is not able to detect drive Used DWD recovery tool to dump image 4GB to iso file, uploaded to google drive Willing to share 1 BTC, who can make this ISO file mountable and possible to view archive contents Both passwords for archive and wallet itself known
|
|
|
confirmed testnet aidrops Berachain Metis SatoshiVM Aleo SmartLayer Taiko Quai Fuel
|
|
|
|