Bitcoin Forum
May 03, 2024, 07:51:46 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 [14] 15 16 »
261  Bitcoin / Development & Technical Discussion / Re: Chain analysis on: August 21, 2018, 02:44:21 PM
Quote
Have you used a RDBMS like MySQL or similar?
Yes, I used MariaDB and SQLite3.

Quote
Have you had any issues importing the blockchain in the DB?
Not really , but be prepared it takes a lot of time and diskspace especially when you add some indexes.

Quote
What did you do it for? Did you discover something interesting?
To do some analysis. I started with finding addresses with easy to guess brainwallets. You can see some info in this thread:
https://bitcointalk.org/index.php?topic=4768828

And some more detailled info in this thread:
https://bitcointalk.org/index.php?topic=2488493.0 (last page)
262  Bitcoin / Development & Technical Discussion / Re: Chain analysis on: August 21, 2018, 12:13:12 PM
BTW my request could be somehow related to this post (but it's much more generic) https://bitcointalk.org/index.php?topic=267618.0
If you are looking for this kind of information you could just use/build a parser for all unspent transactions. I also made a parser myself which parses all used addresses (420 Million plus at the moment). But this is all done by using a traditional relational database since I'm not fully aware what a graph database is Wink
263  Bitcoin / Development & Technical Discussion / Re: ”Argument list too long“ for decoderawtransaction on: August 21, 2018, 08:20:02 AM
hi,

I get an ”Argument list too long“ shell error when running

$BITCOIND decoderawtransaction $foo

where $foo is a raw tx that is 158kb long from getrawtransaction, on Ubuntu linux. How to get around it w/o recompiling the kernel?

So what happpens if you do:
Code:
$BITCOIND -stdin decoderawtransaction
$foo
And CTRL-D afterwards?
264  Bitcoin / Development & Technical Discussion / Re: ”Argument list too long“ for decoderawtransaction on: August 21, 2018, 08:13:11 AM
Can I add password in it , so that it don't prompt for password . i know its not safe , but i need to add password

If you are asking to run rpc calls without supplying the needed rpc-user and password each time add them to your bitcoin.conf file:
Code:
rpcuser=hassan_pf
rpcpassword=nobodyknows
This is the preferred way since it won't show up in your bash history (opposed to using them as arguments when calling bitcoin-cli)

However if you are looking for a way to unlock your wallet so you can spent coins you should use the walletpassphrase argument. The insecure way of doing this is:
Code:
bitcoin-cli walletpassphrase <mysecretpassphrase> <unlock time in seconds>

So if you want to unlock your wallet with passphrase "secretenough" for 5 minutes you should do:
Code:
bitcoin-cli walletpassphrase secretenough 300

However this means your passphrase is also stored in your bash history, something you might not want. As gmaxwell was referring to you can use the -stdin argument if you don't want this to happen. The way this works is:

Code:
bitcoin-cli -stdin walletpassphrase
Once entered pass every argument you want to supply on a seperate line like this:
Code:
secretenough
300
 
Use CTRL-D after supplying all the arguments. This will unlock your wallet without the passphrase getting written to your bash history.
265  Bitcoin / Development & Technical Discussion / Re: Chain analysis on: August 20, 2018, 01:43:43 PM
AFAIK it all starts from importing a blockchain into a graph database..
What exactly is a graph database? Making things visual is just so we as a human can easier understand things. At a lower level it just tables and columns Smiley

Quote
What will be the impact of this analysis with the rise of LN, sidechains and other anonymity solutions?
Anything no longer recorded on-chain (like with lightning) isn't available on the blockchain so it can't be used for analyzing.
266  Economy / Investor-based games / Re: Strontkever.com investments on: August 20, 2018, 12:42:23 PM
Get 200% on your investment as soon as its funded by the next investors.

You ever heard of a scheme called Ponzi?? Wink
267  Economy / Investor-based games / Re: BTC2double.com - Double your BTC in 6 hours - Trusted Bitcoin Doubler ||OFFICIAL on: August 20, 2018, 12:39:31 PM
Couldn't be bothered to read 23 pages of newbie members trying to defend such a bad scam. But what I still don't understand is why people believe this kind of nonsense? What would be the reason some random internet "company" would double anything thrown at them?
268  Bitcoin / Bitcoin Technical Support / Re: Must I always generate a new public address/key every time for both sending and on: August 20, 2018, 07:15:59 AM
This is general information about not only bitcoin but all other cryptocurrencies as well, I think you should generate your private keys per every address you generate as well.

Uhm, ofcourse you need private keys for every address. The address is just another representation of the public key and there always is a 1:1 relationship from private key to public key.
269  Bitcoin / Development & Technical Discussion / Re: Trying to convert 256 bit random number to WIF on: August 17, 2018, 10:31:56 PM
You could do so in a few lines of python:

Code:
import os, binascii, hashlib, base58
fullkey = "80"+"7542FB6685F9FD8F37D56FAF62F0BB4563684A51539E4B26F0840DB361E0027C"
sha256a = hashlib.sha256(binascii.unhexlify(fullkey)).hexdigest()
sha256b = hashlib.sha256(binascii.unhexlify(sha256a)).hexdigest()
WIF = base58.b58encode(binascii.unhexlify(fullkey+sha256b[:8]))
print(WIF)

Which outputs the WIF as:
Code:
5JhvsapkHeHjy2FiUQYwXh1d74evuMd3rGcKGnifCdFR5G8e6nH
270  Bitcoin / Development & Technical Discussion / Re: Get list of all addresses with a balance over x? on: August 17, 2018, 10:55:44 AM
Source code I wrote for all this, with instruction to be able to reproduce, is opensource and links are on this page or within this thread. I'm not selling the information, I'm selling the hosting, the bandwidth & cpu processing.

Regards.

Ok, you are free to do so. You just made it look like by providing that link it was available to download. But those in need can choose, do it themselves or have you do it for them.
271  Bitcoin / Development & Technical Discussion / Re: Get list of all addresses with a balance over x? on: August 17, 2018, 10:46:25 AM
Quote
There is: I compute a bunch of them everyday, and make them available on https://balances.syndevio.com/
Regards
You left out you are selling this info.
272  Bitcoin / Development & Technical Discussion / Re: Get list of all addresses with a balance over x? on: August 17, 2018, 10:44:47 AM
how to do it?
Maybe you shoud read the thread?
273  Bitcoin / Development & Technical Discussion / Re: Get list of all addresses with a balance over x? on: August 17, 2018, 09:56:21 AM
can someone post a link to the new list?
There isn't any. You could build it yourself though.
274  Bitcoin / Development & Technical Discussion / Re: How Can/Do You Store Files on a Blockchain? on: August 17, 2018, 09:48:45 AM
Quote
As mentioned here - I have heard of Sia and Storj, but what are the best usecases/approach services for storing files ?
SIA and Storj do NOT store any files in a blockchain themselves. That wouldn't make any sense since it would mean all nodes should have a copy of every single file. Which in turn would mean the blockchain itself could become Petabytes big. Instead, they store smart contracts on a blockchain which describes an agreement between a hoster and a party who needs to store files. Just to be sure files will be stored redundantly on a couple of hosters.

I'm not enough confident about Storj to say there are good use cases but I know for sure SIA is an absolute no go at the moment for a couple of reasons:
  • Storage is limited to 5TB and below 2TB it's way too expensive
  • Smallest size for a file is 40MB, which means you pay for 40MB even if you store a file of a couple of bytes. Backing up a lot of small files is a no-go area
  • You can only restore your files from a computer where you uploaded them from. So if the HDD fails you can't even restore your own "backup"
  • Development team is a bunch of kids who have no idea what they are doing.
275  Bitcoin / Bitcoin Technical Support / Re: Recovering weird old wallet on: August 17, 2018, 08:27:49 AM
Step 0: Install and fully sync Bitcoin Core

Step 1: Download the Armory wallet here:
https://www.bitcoinarmory.com/ <--- DO NOT USE
https://www.btcarmory.com <--- This is the current Armory website... use this one one!

Step 2: Once installed choose "Import or Restore Wallet" from the Wallet Software (it's in the right hand corner). You should then  choose the option for "Single-Sheet Backup (printed)" on the Armory Wallet and the option "Version 1.35c - 2 Lines" since I assume you have 2 lines of 9 random looking words consisting of 4 letters.

This video might also help:
https://www.bitcoinarmory.com/tutorials/armory-basics/restore-wallet/

Hope you find something nice Smiley
There... fixed that for you Wink

btcarmory.com is the new "official" Armory website... the other website has a horribly outdated version of Armory that will not play nicely with any version of Bitcoin Core from v0.15+

Thanks, learned something again Smiley

Hope OP will report if he succeeded or not.
276  Bitcoin / Development & Technical Discussion / Re: Thoughts on this private key stealing mystery on: August 17, 2018, 08:03:53 AM
Quote
Experiment 4
------------

My last experiment is the one that led me to believe someone was siphoning bitcoin from some service on a regular basis and has been since 2014.

Take a look at this private key:

    KyTxSACvHPPDWnuE9cVi86kDgs59UFyVwx2Y3LPpAs88TqEdCKvb

The public address is:

    13JNB8GtymAPaqAoxRZrN2EgmzZLCkbPsh

The raw bytes for the private key look like this:

    4300d94bef2ee84bd9d0781398fd96daf98e419e403adc41957fb679dfa1facd

Looks random enough. However, these bytes are actually sha256 of this public address!

    1LGUyTbp7nbqp8NQy2tkc3QEjy7CWwdAJj

I discovered this by performing Sha256 on all the public addresses I had collected from the setup of my experiments and then seeing if those addresses (from the generated private keys) were ever used.  Bingo!  Lots were coming up.  I searched a fraction of the chain and found dozens.  I also found these addresses had bitcoin sent to them very recently (within weeks/days of when I discovered them.)

I asked myself, "Why would someone do this?"

At first, I thought this was someone who thought they could get away with having to remember only one piece of information rather than two.  Maybe they have one favorite address/private key combo and derived another from that one?  I thought it was possible.  You could keep doing this in a chain and derive as many as you wanted and only ever have to remember the first one.  But I ruled this out for one simple reason; bitcoins transferred into those addresses were being transferred out within minutes or SECONDS. If someone generated these private keys for themselves, then why would the coins be almost immediately transferred out in every case I looked at?

Here are some more (complete list at end of this doc):

16FKGvEtu5KPMZqiTK4yjmsSZsJLyxz9fr from Sha256(1CRWfJdgVrfKLRS4G3vTMRhEQrCZZyHNMo)
1HwxL1vutUc42ikh3RBnM4v2dVRHPTrTve from Sha256(1FfmbHfnpaZjKFvyi1okTjJJusN455paPH)
1FNF3xfTE53LVLQMvH6qteVqrNzwn2g2H8 from Sha256(1H21ndKEuMqZbeMMCqrYArCdV8WeicGehB)
Note: I skipped experiment no. 3 since it was just a few random inputs not related to information stored in the BTC blockchain.

I could reproduce the findings of OP without a problem for experiment 4. The given examples all match with addresses provided. So it was time for me to run the same experiment on every known address on the blockchain (up until block 536830)

And I found a total of a whooping 148 addresses where an existing BTC-address was used as the passphrase for another one. My findings:

Code:
Used as Passphrase:                   Resulting used address:  
1KrutzZZ7rth6D9wasfGz2oy9R6k1RCL9n -> 1HJx3CqdaHAX6ZYRBHDvM5skg2Vh7GeZBD
1JwSSubhmg6iPtRjtyqhUYYH7bZg3Lfy1T -> 19QBydCuMiY7aRTbkP2tb3KQJUWkTrr5Xi
1JoshVWQDa7DzXqN3wQ9dbig5WEfaAzHcM -> 1Hg9pi75XWAT9pB3faXQFKKZbh98cbM5m
15SP99eiBZ43SMuzzCc9AaccuTxF5AQaat -> 18XAotZvJNoaDKY7dkfNHuTrAzguazetHE
1Q81rAHbNebKiNH7HD9Mh2xtH6jgzbAxoF -> 1LgwKwv9kt8BwVvn6bVWj8KcqpP9JSP1Mh
145Sph2eiNGp5WVAkdJKg9Z2PMhTGSS9iT -> 1HhNZhMm4YFPSFvUXE6wLYPx63BF7MRJCJ
1FEwM9bq3BnmPLWw5vn162aBKjoYYBfyyi -> 18VZKyyjNR8pZCsdshgto2F1XWCznxs86P
1CVPe9A5xFoQBEYhFP46nRrzf9wCS4KLFm -> 1LVRWmpfKKcRZcKvi5ZGWGx5wU1HCNEdZZ
1BBBvd9G5YThYVVMSGSxJzQvQiQm3WxJC2 -> 1EFBsAdysTf81k72v9Zqsj3NMuo6KoWD2r
18AsiEQoLLKaF4Co1z4rxHyzJu9oqTVbFE -> 1Jsz6mahqVMJn2ayWzN6TfeWTti9tqfbSM
1HqQBiqgFK6ChJ2Vq7kbWRCbc73cjyNXv5 -> 1M2uEGihcwUPiRGETE7vF8kUiS2Z4rtV2Q
1MVqDAJo8kbqKfTJWnbuzvfmiUXXBAmX3y -> 1LWU4SbnqnfctAMbtivp2L98i8hSSCm7u7
18EF7uwoJnKx7YAg72DUv4Xqbyd4a32P9f -> 1G6qfGz7eVDBGDJEy6Jw6Gkg8zaoWku8W5
1Pjg628vjMLBvADrPHsthtzKiryM2y46DG -> 12B1bUocw8rQefDcYNdckfSLJ6BsUwhRjT
1KxUVU9DKfdaTLMnXBLS5BZRf56cFnRosk -> 1L2a5n9ar7e2v3Wz6NDFnxisigvR6urGaY
1PoHkMExsXDDBxpAwWhzkrM8fabmcPt6f4 -> 1G2rM4DVncEPJZwz1ubkX6hMzg5dQYxw7b
1PeCGFsJgqz8CcjGugGq5bPBiRDXUZHLUH -> 1FjEL7TBazaJN7WyND4uwq9wiaWDzfizkP
12XuaKzEheWbFJBno9QiV6kPCWrnWpUYTK -> 1KwUfu3gGk7n8Wz969tAztvvM4Mp4ZY57s
1F1tAaz5x1HUXrCNLbtMDqcw6o5GNn4xqX -> 16VrwSmUyvCKTXoeyrUcZ5zC7s3wkteAeF
1FfmbHfnpaZjKFvyi1okTjJJusN455paPH -> 1HwxL1vutUc42ikh3RBnM4v2dVRHPTrTve
14PnZgX8ZDABJZ8RnatkK7DQzdpkwRRPX2 -> 11EuerTwe9rxtT3T56ykX5K7J3AksPzU3
1BxzenHnSuKwqANALE5THeTCSRZkv3ReRP -> 1MJKz1M7dEQCHPdV5zrLSQPa4BGFAuNJyP
1CJBqJ3MwUVVNsqXpJx8Aecc3PWxSWPmUc -> 17S5HsEY4CLxSCU94C1Nx6pTKXWBUh7e37
1DMwZeQJXfWToRRHr5uRiKeucwDWkWLvkm -> 1ERKXYeaCy97KPdJTRbWjJDVzMbStJYqCm
1PLpQDyqDUcpK6fWpRhkkFVBw4tSK4sHkS -> 14mRxKmeEw9DCBbpR596FYmfZVdBD8MJxh
1BynBc2YUAoNcvZLWi24URzMvsk7CUe2rc -> 1MkaTR3642ofrstePom5bbwGHbuQJmrnGD
144BV4Y7tgnetk5tDKAYTGS4mjprA75zJz -> 114LdauSAu2FTaR2ChPsPTRRhjYD9PZzn2
1Ca15MELG5DzYpUgeXkkJ2Lt7iMa17SwAo -> 15ZwrzrRj9x4XpnocEGbLuPakzsY2S4Mit
1PAVELxB51neRmWMFqgaV3Nd78udSyEMFg -> 12G63HnPAhmBLwDfDuexaDo9ExTqbfuC59
1UvM3rBJ8Sa1anQ8Du1mj5QZapFmWF7vH -> 1MG1dTqtWVNqq3Qht88Jrie7SXp2ZVkQit
16era4SgYEcbZD1pu6oCBXGXjK2wSrePe8 -> 1MWBsFxWJrNtK2cN2Vt7j3a9r5ubfn41nx
1A7grBEjor6Sapj8KRbEGj2UrbnNt1Usxo -> 1J9SzdYMZFsLqunQfPAswzogLNBitbREMD
1JcsBzKio1curbu9AtxTySxddvT4MKT3Da -> 1kN83e7WRtsXD7nHn51fwdEAi51qk5dEe
17S3XjtEFXQoGdXnUjJJtGB1D7PTa9SsLZ -> 1KyUNmmJu3JjauVEZQUYLUEBg48GXXS1ii
1PhqA75qNM23aH9zV3uWvUhDbdwcab6q5L -> 192qwAD31JB9jHiAwaTDkd6teb2hLAkY3b
1F3sAm6ZtwLAUnj7d38pGFxtP3RVEvtsbV -> 13mbvCyxCYvATNzranCkQdpCT19VGpMFZa
1Je3tz5caVsqyjmGgGQV1D59qsCcQYFxAW -> 1A17F9NjArUGhkkiATyq4p8hVVEh2GrVah
1EjWVhiTyCdpTa29JJxAVLq27wP4qbtTVY -> 1GUgTVeSFd2L5zQvpYdQNhPBJPi8cN3i4u
16fawJbgd3hgn1vbCb66o8Hx4rn8fWzFfG -> 1J9Gtk5i6xHM5XZxQsBn9qdpogznNDhqQD
197HxXUSehthdqXM6aEnA1ScDSCR7tQmP3 -> 12eGusvkCcJb2GWqFvvE1BLDJ8pVX49fQv
1KzSULbG3fRVjWrpVNLpoB6J62xYL42AdN -> 1mbcQaPzsaBoaYP4V6uwCA74BRPhroK3r
1LFCEek8FobJRXb5YrzWJ6M2y8Tx2Xg3NB -> 1gHad7cKWDcVKFeKcLRW4FhFAyw2R7FQZ
1C1KjGATUXP6L6nnGTAh4LQcnSyLt13XyB -> 17SaWquajZZBRF5qz6HuXMRt6gvnrDyoqE
1JZwnSQz64N3F9D3E24oS4oGhSxMWDsXYM -> 1GSkK6KBVSycEU57iK6fRvSXYJ4dgkkuNt
17XQfW1R66aRBNYyJMwzn7zLf3D6sZgda3 -> 14XAGCAeUxieSzvGK3TX915PJLvX54n2Pd
13PctMqzyBKi5CpZnbastHQURrSRrow4yj -> 1pmZwNDZjpuAqW3LjYYQCEjbQYBtSxzWc
18SV4DVmytRDYB5JBAFkewUbVAp6FRpi5c -> 1KiGdZ9TUeWyJ3DyHj7LQLZgjvMHd6j2DZ
1E3D7NabEX971uV2gXT47rWQwPm3zbmvd8 -> 1Kka5bgXvpHTNDsPmhLPHae2qcK9mLS2qS
17FaMY613bKfwhrdTv5PHnucSGTJBcw3k5 -> 19cMyj9KqVq78yZe32CNhgpyuGLMwM9X8S
19cMyj9KqVq78yZe32CNhgpyuGLMwM9X8S -> 1LzGrd5QX1rG5fk7143ps9isUTEwGyzRJE
1LzGrd5QX1rG5fk7143ps9isUTEwGyzRJE -> 1Q2a1ytfujskCEoXBsjVi1FqKWHegfFKwD
1LeuaozTUT5UJX6DD4Q1VJsHh6aHpZ3YRU -> 1Mpw88XWQzLTZnq1eNs5SegZYGJu5Epky8
1XAeTJCaYJgoBDwqC1rhPhu3oXiKuMs9C -> 1EqSvLnMhbRoqZkYBPapYmUjMS9954wZNR
1FLeb3zCVG63NYAMBiUoqKYgW1tUwgMMfF -> 131XQfvE7E1NzdRQnE8XFmtkxWVRXTsb9q
1HAQB99WfrV2ttRjttUPMzRi4R1uC2ftMy -> 1Kc324Y6UUMffeYdtuXgzVC28Kx3U8cqQk
1Lu49ZKmGoYmW1ji3SEqCGVyYfEw7occ86 -> 12GZz1D1kdX3Fj7M87RFvqubam8iGrK77R
1AYKSUqCtDX1E34q4YoFnjwWSj41huWgGG -> 1cQH5XCsezkKt9zpwjHizz8YJZudDSwri
1DCfq8siEF698EngecE69GxaCqDmQ2dqvq -> 1GGFXUL1GoHcEfVmmQ97getLvnv6eF98Uu
39oArFLKkWBEqRBM7cxJnrrJihMnRmz2PT -> 1AXECcFUaSJXPk86zUrB19WJyeagVd4Qp2
1J9Gtk5i6xHM5XZxQsBn9qdpogznNDhqQD -> 1PF2gQPPAwQDfTrSuNX6t8J381D7s3bGFu
1PF2gQPPAwQDfTrSuNX6t8J381D7s3bGFu -> 153jMRXn251WyxT9nmJW2XDsFUJ648jyY5
1PfcpvjYUGu4yvpkEHmAKgDXtsLfSNyzvV -> 1BEYFim8uoJ7FAZG6m1E1hqLwKjfVwnWU1
1CVunYyUpeCFcGAYdHrDNrXcQFBVU8gyo9 -> 1HBsFJ9VngvMjaKZjbFhNRaegkjF9NBEe
1BEYFim8uoJ7FAZG6m1E1hqLwKjfVwnWU1 -> 1CVunYyUpeCFcGAYdHrDNrXcQFBVU8gyo9
1HBsFJ9VngvMjaKZjbFhNRaegkjF9NBEe -> 1qA59Na3WysruJbCPoomryDRCtJ4f4aLu
153jMRXn251WyxT9nmJW2XDsFUJ648jyY5 -> 1PfcpvjYUGu4yvpkEHmAKgDXtsLfSNyzvV
1qA59Na3WysruJbCPoomryDRCtJ4f4aLu -> 18VZG5Dr8bYJWadHUgh7kC4RPS1VsvH4Ks
1PDgY5PkpBNCZVWKKAq3cbGyqvwwN91z4g -> 1Gwz14Cty45h3hZ4nCEno6jSdxtQn5bc7h
16bjY7SynPYKrTQULjHy8on3WENxCmK4ix -> 15M7QfReFDY2SZssyBALDQTFVV1VDdVBLA
3LD39qD1D2tuRDs1N7kojtqVdEf9MKASXJ -> 15ymvzZR7xs5FkhRXk1JR4ufeUxukoQyuX
1LTZ9kaxRHBZH43eSmZ2KoGLHHUBV3P2S5 -> 1PcExYX3mUJ1rwa4aTLNJUpxqRLU8MxPXm
19o4Yjrd74qnZ3z87C67BShbbF4fSNHy8W -> 1CoyRECWJ4LHNiZAgAz9719chFkrDJuNMC
16bEpxSc1FDyQDXR7ZYKbyyDDxzyaaCnNS -> 1LkwU9xbVroLkH9EvxDfmMnsCikQzaUv9S
1CRWfJdgVrfKLRS4G3vTMRhEQrCZZyHNMo -> 16FKGvEtu5KPMZqiTK4yjmsSZsJLyxz9fr
1KEkEmadjTYHCiqhSfourDXavUxaiwoX7f -> 1JQ2shEPzkd3ZL3ZQx7gmmxFLvyhSg14cb
1V8tWZw4J3G5kBgafGsfoVSNQEgkxDmeA -> 1L5pzdXL4hhtMHNxFXHjjdhhSidY9kJVRk
1NPSWKXdnHa17NWTU3J6nVkyogZjmAh7N6 -> 13wY5CtwQhd7LYprEpFpkt1g9R7ErMkAwT
1AixDffKCd1cV1tz1sp8fwJQDEAYCWzQcR -> 1M5jhEDKQCYbMCXHgcRUmaxwqYmcbrEfGD
1FAv42GaDuQixSzEzSbx6aP1Kf4WVWpQUY -> 13qsbkaJM7TkA5F2dsvHeGVQ7kCo74eGxh
1H21ndKEuMqZbeMMCqrYArCdV8WeicGehB -> 1FNF3xfTE53LVLQMvH6qteVqrNzwn2g2H8
1Poi5SE42WVR2GKPrwp9U3wYqEBLN6ZV1c -> 1DBXjdbMWXmgt81E1W7AYRANVPiq12LsGd
1LdkWzq9DxopPkY1hCmQ3DezenP5PQLNC3 -> 1JvaK7jYWFNbDsJZLarXnq1iVicFW4UBv5
1JvaK7jYWFNbDsJZLarXnq1iVicFW4UBv5 -> 137XrofaWZhaZW2uB7eDsPjcwCNMTXVLot
137XrofaWZhaZW2uB7eDsPjcwCNMTXVLot -> 1D97u8Pet8YmNwKaCPUXLyi4zk1HnLF5RQ
1D97u8Pet8YmNwKaCPUXLyi4zk1HnLF5RQ -> 1G7B5eVnAQgeuGrKxcRnrmEqPLsjRkgnVF
191XapdsjZJjReJUbQiWAH3ZVyLcxtcc1Y -> 1CcSiLzGxXopBeXpoNSchagheK9XR61Daz
1Nk6a8ZfN86gaHJifcF8iGahx4scCKkwF5 -> 17hMEK4i8Nsi56huBU4i9N4Gjiw5G6X5iG
13Q8rTtdGUUt8Q8ywcEffj4oiNrY6ui3cu -> 1JhWnRjRm7AhbvSBtEifcFL8DkEKQiWRZw
1GRdTKgSq5sY3B4PiALPjKTXSXPXs6Ak7X -> 125PcPD4QXzgDwNPForSFji8PPZVDr2xkp
1Et9zapAxsBLJ3bvY7LDTuHif5cH7mZiBE -> 1AoocdeZC64PaQ15Gbv1kXyYYnN8FWXAST
1PVn2gxgYB8EcjkpJshJHfDoBoG8BntZWM -> 134Kia3XhZV6oXE4EUvjc1ES8S8CY7NioU
1E7kRki9kJUMYGaNjpvP7FvCmTcQSih7ii -> 13eYNM5EpdJS7EeuDefQZmqaokw21re4Ci
12GvGqEQuQTW4Rr8dZ1o397KAYCMGWPYkq -> 16bEBNuc7JQ4QzyoFAkmxdVvW4wJqicjVN
1E4yLggKcgHcpSKX336stXWgheNU2serVz -> 1HMGSkDB9ZhRoUbSEEG6xR7rs9iPT2Ns5B
1p4gsrzTc3mFAgJKYqMzhm6UsJzhgy1KX -> 1CSMVivJfFynvbZRrLFHVGnehpXLUjdGRc
1FFAdm2BWoCfTkTwFLJ4o3b5xG7cuRxbWb -> 167dyxowdWwBdofck3WuAwvUpVfn2ewx8Q
1J1ZPHbbEwgcwniH3F7AgBeFZxQXJoKCGf -> 1CRq6nj3a7vXdJJN2YSWdW6fVwydr6kqWs
1KPDwnrzJAfD2V4oiPf55WBTAi6UJDvMjN -> 13CnacdjvuuTJkCWrZf33yMrQh5aVX5B14
1FDWY63R3M87KkW2CBWrdDa4h8cZCiov9p -> 1LsFFH9yPMgzSzar23Z1XM2ETHyVDGoqd5
3Jz6sH2ZE4ey4QzingeKaUNTjm715RLfKs -> 1MRpBEdFqWK2qCYm5o8toa8BRUN7c3SQVg
1JuP7JXhHabGLVAqp9TJj5N171qLVHrcVq -> 1BwjscJC3P47uW5GXR7tjeHkdXQk6CuAFb
17Xok12pBFkXxNcE8J4gTSm3YKkatyX4ad -> 1NWCqz8nr8ZRZt1zEKidyWcZDyNtK3THps
1EGeEk4YUrXyDL4zNXpWdqJopoVxs2vExJ -> 1C9HtVz7H8NArfV613wQNHs4PrK2oLZEYh
1268xJ8iYUdRxK2vArkyoa5es6bR99hjhR -> 15XWgB1biKGd1JyuYecobfFtfBcVt6Jnok
1FBxoyGYaC9GEKLokfyrHUbZyoZmmm1ptJ -> 14JpZ9Bogo4p83xt6cKS1Fh1rLSFRat8PN
19aNbfFfZEWwstuy97C1GsHHELNCxZSEYV -> 1DT4Q4ocUFgekXvBqBM6kFmvQYB6Y4PnHo
1HzJPqLEpbeXiYhyoA8M8cuuds3FEAnw3B -> 17kYPYbELyVfMSYihD4YETJSZq5yCs3diM
1PhmMsdwamJA6soKw5mNMXxzGomHEHWY5P -> 15RjQKt6D4HBn87QqgbyvhKFNDDjXncp8Y
17iLALAyra1W5KSUjjkGN5LeUsWdeoQQx3 -> 1BVNt39u32LLkxMvBeBHXXNaTJqWe1Xcu5
1MB3L1eTnHo1nQSN7Lmgepb7iipWqFjhYX -> 17iqGkzW5Y7miJjd5B2gP5Eztx8kcCDwRM
1K79KaFs4D6wqz1wjP1QoYiY18fw8N3bZo -> 16eePivj1nTVvLpBGkmFoeGxNyMU7NLbtW
1E1rSGgugyNYF3TTr12pedv4UHoWxv5CeD -> 13FzEhD3WpX682G7b446NFZV6TXHH7BaQv
15nXjzf8EXy8Lji3czM1HAVw14mEKoEiTw -> 141V8fK9Kuofit8AXh9SLV9N9bLTfftETA
1LFGKkDZ21FZVsBh1A1S5Xr6aXuV3x9N4k -> 1P9ZZGDG1npYd4d7jiCfPya6LQGkF5sFm7
1LGUyTbp7nbqp8NQy2tkc3QEjy7CWwdAJj -> 13JNB8GtymAPaqAoxRZrN2EgmzZLCkbPsh
1FEYXtchFFJft6myWc6PyxLCzgdd8EHVUK -> 1FXi6kEJjnZUBqpwjVJKPsgVHKag86k6qq
17A16QmavnUfCW11DAApiJxp7ARnxN5pGX -> 1MThTn1XmUYcUtBs7GPdUBB7cmZWr2BPft
1MbzspFCdXjtqAUx3t6A11vzrk5c847mvE -> 1DHWP6UjSKBBUR8WzTviWAGNgLfDc6V6iL
1NbBTJQ5azGEA1yhGnLh39fE8YoEbePpCm -> 1Ads6ZWgRbjSCZ37FUqcmk82gvup1gQurB
1LdgEzW8WhkvBxDBQHdvNtbbvdVYbBB2F1 -> 1NHvPBaxKFuDec27mWcyCf7szUUvNnfimK
1LdgEzW8WhkvBxDBQHdvNtbbvdVYbBB2F1 -> 1Kap8hRf8G71kmnE9WKSBp5cJehvTEMVvD
1Frj1ADstynCYGethjKhDpgjFoKGFsm5w5 -> 19T6HNnmMqEcnSZBVb1BNA6PrAKd5P2qZg
1Frj1ADstynCYGethjKhDpgjFoKGFsm5w5 -> 14XxBoGgaJd1RcV3TP8M4qeKKFL9yUcef1
1LDqitspsYaiLH6AMW5EzJYuZG5vTGzRNg -> 1Lv6T9RegiNHpES1DHu6AasDcUqp2SeqLb
1MywYg5vwBk2G5Wkmfh2Mo26j1jFTADCkP -> 1L2CdFdZUzYLwXqmWffJhkwamtDXwr6NX2
15WLziyvhPu1qVKkQ62ooEnCEu8vpyuTR5 -> 1MNhKuKbpPjELGJA5BRrJ4qw8RajGESLz6
16SH69WgJCXYXWV58sxjTxonhgBh5HCZTt -> 12fcWddtXyxrnxUn6UdmqCbSaVsaYKvHQp
1C91NNyzXE1dBC4dDKjx6y5VnhihifrpCY -> 1HPnYqbMvV4bGRcpSP28mMyekhjKiudcFY
1ESkNMa9Z37of4QdJmncvibrXxZ7suPjYm -> 1Gj2uRnxDztM7dTDQEUQGfJg4z5RtAhECh
14nuZCWe76kWigUKAjFxyJLFHQyLTsKXYk -> 1HamTvNJfggDioTbPgnC2ujQpCj4BEJqu
14nuZCWe76kWigUKAjFxyJLFHQyLTsKXYk -> 1DvtF6X5b9cBrMZa4Yff9tARCLqP5ZyB47
3BHsbqZnUGM5Gbwsxe7ukk8NJc81kfhY8Y -> 1MH2HaDcKYBFhdBEdE4DKoXZWVdtEqMRag
3BHsbqZnUGM5Gbwsxe7ukk8NJc81kfhY8Y -> 14nuZCWe76kWigUKAjFxyJLFHQyLTsKXYk
1ENCBKFsqxJVCqR2TS1WfDV3rDi6zA8J6Y -> 1NzWscae8v3sKmTVJYwq8yhkizK8hUS5qP
16oTV1jZPJ5wm3QLhN96xVF7DchihmpL1k -> 16nXouTPm5gVedr4Betb8KRWLSBtmXGUbD
1Lp93D7qA4E7rzFD24LsAD3STbVypxP8Mu -> 18sgB1rVs5FSNCD2KDoNySA1wfnirAqdot
1ERdvKTCxP1gZvdNndLKtYotW7qpR3xhuQ -> 1FP8j4zUPoJkpKwYpd8zYGHVaKygRHzx3d
1BCvHvXCceu1pfXgqyTegzDVTiG7KBPUrB -> 19e7wSvRggJdBNLbjJwiB7K43J1PWCyGa9
19Yyqo5rsKQQLQP85LcqQkttRAAY87xwPk -> 1AaDf5H3LWgS6axUXRaww8tZmHqZTKK6D6
16nH7UJSSabJLadDGhFiyxPjMp7zT9Frqe -> 1JGA2mTkfPw6wKn5eNZ5kBJ3iN4K62HScA
3BTxuixRkhMQfTSqCLmq9Wn4jJ9H3dszhX -> 1CEvDrbju2qx4DW59C1Q1ZhvzoqjxJ2YX4
15hMTbxp2Z6dwFKDKcHkm2tnu28gR4994r -> 18zHNXq7UZV4VfUZjqdaHNbj8K5G6YFu4n
1ELZAjiXwZsmrqbvakVJzG6RRZtJDhJ2Rf -> 1LNGJ64rL2KA4VEMGRFBA5vSqaxpTAR7fv
14Ca26QMhDoyZEhmAUbadBHSMtynuFDFEr -> 19ChjJDaqhyPzRePyCwJvAUAcWsb3jwYne
167ZUAUMyeKbsXNDP4S5g7ey1MBucipm5e -> 1FiMHBECGC6QnbH93BgfQxA1BbjmoNEdDZ
34zQQeLLjmYNXdrWehtSmZb8fuP8jLZBqc -> 14dXxWwfg8MUiDpVbF8gg7WoCvxCFgfuh9
1MMBdLWiAK71oevANJrLHXXKAK8bZrPtqx -> 18bRpCq7yDccXrhy49ayv18vBQy6TjLtxV
1J2FqR94hjiriJoFxbN2apw3tyXZZvmdrm -> 19RtmcuK6Uk16uLzFSg23FxfWGCS8Eaxao

This concludes my checking of the experiments OP described. I will do a few follow-up experiments myself and if I find something interesting I will report my findings here. I also added all the results from these experiment in my published sets of compromised brainwallets at https://eli5.eu/brainwallet/ (which reports almost 19k compromised addresses).
277  Bitcoin / Development & Technical Discussion / Re: Thoughts on this private key stealing mystery on: August 16, 2018, 06:37:04 PM
Quote
Experiment 1
------------

My first experiment was to see if anyone used a block hash as a private key. That would actually be a nifty way to 'compress' 32 bytes in your head.  You would only have to remember the block height (which is only maybe 6 digits) and the corresponding larger 32 byte number would be saved for all time in the chain itself!

Results: Success! I found 46 addresses that had some amount of bitcoin sent to them between 2009 and 2016.  As expected, these all had 0 balances either because the owner had taken them back or they were discovered by someone else.

Here are two examples. You can use blockchain.info to see these hex values are actually block hashes from early in the chain.  This happened on/off up until mid-2016.

1Buc1aRXCqdh6r7PRYWPAy3EtVFw5Ue5dk 000000006a625f06636b8bb6ac7b960a8d03705d1ace08b1a19da3fdcc99ddbd
1KLZnkqU94ZKpgtcWCRs1mhqtF23jTLMgr 000000004ebadb55ee9096c9a2f8880e09da59c0d68b1c228da88e48844a1485
[/quote]

Please note my previous conlcusion on using blockhashes as private keys were not correct as pointed out by Thirdspace. This is a correction post with the results of a proper experiment on block hashes

The first experiment as was stated by the OP was to use a block hash as a private key. He/she was even kind enough to provide two examples. What wasn't clear to me before but is now is the fact those blockhashes themselves were used as private keys instead of using those block hashes as phrases.

Code:
Used as private key    : 000000006a625f06636b8bb6ac7b960a8d03705d1ace08b1a19da3fdcc99ddbd
Remark                 : block hash from block #2

OP address found       : 1Buc1aRXCqdh6r7PRYWPAy3EtVFw5Ue5dk
My address found       : 1Buc1aRXCqdh6r7PRYWPAy3EtVFw5Ue5dk
Remark                 : 80 + '000000006a625f06636b8bb6ac7b960a8d03705d1ace08b1a19da3fdcc99ddbd' as the full private key
The address 1Buc1aRXCqdh6r7PRYWPAy3EtVFw5Ue5dk as reported by OP is indeed generated by using the claimed block hash as a private key.

Code:
Used as private key    : 000000004ebadb55ee9096c9a2f8880e09da59c0d68b1c228da88e48844a1485
Remark                 : block hash from block #4

OP address found       : 1KLZnkqU94ZKpgtcWCRs1mhqtF23jTLMgr
My address found       : 16X3KngmmQ1x5roBz71boZ3b55qCRC1D51
The address 1KLZnkqU94ZKpgtcWCRs1mhqtF23jTLMgr as reported by OP is indeed generated by using the claimed block hash as a private key.

So after my previous attempt of using all blockhashes as a private key I this time ran the correct experiment by checking each blockhash as the actual private key. I found 48 (!) addresses this way (including the 2 OP provided as an example):
Code:
000000000019d6689c085ae165831e934ff763ae46a2a6c172b3f1b60a8ce26f -> 164qRoL9B3oxAZCn2RS6kAFejJQyAEcjaw
000000006a625f06636b8bb6ac7b960a8d03705d1ace08b1a19da3fdcc99ddbd -> 1Buc1aRXCqdh6r7PRYWPAy3EtVFw5Ue5dk
000000004ebadb55ee9096c9a2f8880e09da59c0d68b1c228da88e48844a1485 -> 1KLZnkqU94ZKpgtcWCRs1mhqtF23jTLMgr
00000000841cb802ca97cf20fb9470480cae9e5daa5d06b4a18ae2d5dd7f186f -> 1CLoKbp4a5du6Nzs21UbFFqDZE3Ls7GnAF
0000000067a97a2a37b8f190a17f0221e9c3f4fa824ddffdc2e205eae834c8d7 -> 1Kn9aRbWxxnTsnLcFTS2LjDV9PDLQGzJpZ
000000006f016342d1275be946166cff975c8b27542de70a7113ac6d1ef3294f -> 1MGFq4ot2DqMJQG5tGPEpwA1ZG6XPGmSsV
0000000098b58d427a10c860335a21c1a9a7639e96c3d6f1a03d8c8c885b5e3b -> 1FSK393znD9i4ViQSTfXKbuhw1pPLjjrvC
000000000cd339982e556dfffa9de94744a4135c53eeef15b7bcc9bdeb9c2182 -> 1JAj2zj9Fj68y4EKZkbtGv4z6XvbBQ5iY4
00000000fc051fbbce89a487e811a5d4319d209785ea4f4b27fc83770d1e415f -> 15CL3ezLrNq4YVGxAXyu7rb2hWQmEhPSH8
00000000314e90489514c787d615cea50003af2023796ccdd085b6bcc1fa28f5 -> 1NJvd1gcxiGmxS7NSub1HsazVewrJH7r3K
000000001fa8db1f15a9abd900cce0df7823a8397f2728b1d275e8fe0c0d2df0 -> 1w9FMNMRcwQ6g7uU3cDxo9QjXh4qKgS1s
00000000ee1d6b98d28b71c969d4bc8a20ee43a379ce49547bcad30c606d8845 -> 18AZXGaaexCt7H6URZxCHWnp4bZb3mnXGk
0000000066bd6eb18ac2a759d0287a0ce3c874de071a18fe191ee2181c652c89 -> 19MeQVWWiQRCzxb9Hhh6myThk7xSQ1FZKs
00000000c5fef55bc9cc3d4bd26d4f5495af1dba2c4e284a3e9915f7c4a77980 -> 1MyRduQBLWe1dRdFaeFEQsWUwC8Ng3NRwN
00000000d2650ca85996b3a6766fcfecfa0d18a433d6c482e3a400eb46c4507d -> 12uoPJKtoogGYQRh2a8vQEAc6Rwsi5jhnk
0000000000511a5356c93057e512af0c87f3db86a5c24285f8870d2f9f5d4005 -> 1QCnp7ifrJxZVZYov7MFvENG4arKZzSWnv
00000000000002d214e1af085eda0a780a8446698ab5c0128b6392e189886114 -> 18ot9XCfzfWkaGQLcDR9xdzBDtimhEsPTG
00000000000005129a339a388082bb6dcd185560dab135f048d0021912bf2c96 -> 19iQR6Pmjk6zKN7XaSTZJ3NLpwg2bSxAfN
000000000000056a303dd8a19509c1a74176c1324a923e237b1e7ffbadf38849 -> 15XQrFhNbiQQW71tYxp8ySTVpmb4pmoLRU
0000000000000a2c73285546b59ad9c523bbaa9b2d9b9a9b7e4bfb074a700008 -> 12Mdmf8AD4YurjnjtpwcEbUzoHkvPuffqD
00000000000004c9c29225b11b3ec75294d201613046fad170848d919c61f279 -> 13MTQYzxyqEF9yB4BjztwNQfJ52dWfgUdk
00000000000001aeceb6762e33bb6fbdbdb75b99f229992d99f726286bfef6eb -> 1ECEY4i6PN8rVuain78BrcDEr3VWx8z8c3
0000000000000453918365cc3bd4cc332f1cdaa9d634090585102d299a70dd8b -> 1Czo9PruXzXmChGAXs7LFg9U29ZeitgHSz
000000000000031d5731617e8014e2efd7524bc728976f736c4217d9888e9eb8 -> 16N2LPXmu1V5KSiRiJ5yznuHzUF6sSkHPw
0000000000000040412b763328116fea4b69a1f30e5cf18ababbd3ac59ab2159 -> 1BiSjbXeMfTE5mUxiLxE8VTaaDA3evJWkj
000000000000012e75d835d232050cf42f7a250846cd544fbd97d4d6b1079f9a -> 17nffrVW4YyoEQo7dTbbz58FiaE31RQFEv
000000000000002383789cd830d99c6488d1555a19ed8bc9a6ed6f785f44aa2b -> 1A9R831fPkbh4XpVdttdbdiua1akpRGc22
0000000000000043371e55643e3cb2b48eb4681bc82e7be5c88e5f85272e7bfb -> 1Gu8UmXCEjaFmcycAg3tjih9BvmMuQWUVe
00000000000000e09b60cf59246a697d7e7f449d1f8b6528faad28bb2ad23fd3 -> 1FJ46MfT7ib527NvKUkU8bdTsJGmz1aoB
000000000000029f4bc71ecd64f13068876ee910cafe4bca8d46d1c38a5bb6bb -> 171t2vYmyrsiNNCNp5Zwh7VJ4HYtjUP85z
00000000000003fd22aba8da396d0d3a0edebe0ee52a717c8b86cca25c069be4 -> 15Caj8dTaVV96ePfTZWEg6MZqy1GQoRynT
0000000000000370f35f87be6d291757cb7d711d8dbeda7251484dc4090738f7 -> 1FGQJrCpjcxcNE9abpwejg5DprymaQdEVe
000000000000028387c182975dd5dff74cfec7c5e539b19d2d53e59f2ea1d2ae -> 17g7p5aGKU9v7Y6qqpdeiPVFZ5rEzdLh3p
000000000000038a4eb01e85c45fcbd5ebf2d1b2e0dafeb9d4b9cf0ea983964c -> 17yb2XAcaMn7u9UF7vLSMB3LCuziFV8q3u
0000000000000114420273c901e448a0a51a89fe2e6964541994c7eb1a3e615b -> 1LddbPU8TuMepABqL4enkvTUnHfp43xZmk
0000000000000061edd85e375b354773f096081a20829a3ca376eb2ef3a41ba2 -> 1EvbFBWc9yBCNb1LYSkstVXwu9gA6rkEfX
0000000000000026a26d1ff45a72236f12de3ad5ff703aebec322f52ac8ed9dd -> 1MV3wHfgFr3xF8LRxW16opXt8PbowT3Euu
000000000000001f19cf4788a71e35949b261a62e90f09027d76c57fda7d75ba -> 1M7NPSWTX5MjkbrsrastjTH7bT76RmhLEP
00000000000000000577caf7823c048ee34cec0ab2fc82d4b8e55b022fe35cfd -> 1Ph44tVkbEm4GivAfUR7u2i1925ZzUcs8x
0000000000000000104f6217dcedfda795fa34278ddc67e485f243314de9de77 -> 14VYx8XFeRtyAV33BLvGX3ZTBu4YNT4Bzv
0000000000000000116309fe12f087fed3acdcd7622d93e5cc898b6bc5040160 -> 1Lhndi7kuTZNG3XiTn4Lvb4EM8x8DesvUx

Thanks to Thirdspace who pointed out my previous mistake I was able to reproduce the experiment OP has done and came up with 48 addresses based on a private key equal to a blockhash from a block in the range of 0-536830.
278  Bitcoin / Bitcoin Technical Support / Re: Recovering weird old wallet on: August 16, 2018, 02:00:47 PM
Hi everyone, I'm posting here because I just found a slip of paper with 18 four-letter non-words (stuff like "ejeg" and "nanw") and a password that I wrote down back in, must've been around 2012-2013. I don't currently have access to the hard-drive with the wallet file on it, but I think it was a Bitcoin Core wallet. Does this seed format sound familiar to anyone? Is there any way I can get my wallet back from this information? The hard drive is still accessible, but it's at my parent's house in another state.

Step 1: Download the Armory wallet here:
https://www.bitcoinarmory.com/

Step 2: Once installed choose "Import or Restore Wallet" from the Wallet Software (it's in the right hand corner). You should then  choose the option for "Single-Sheet Backup (printed)" on the Armory Wallet and the option "Version 1.35c - 2 Lines" since I assume you have 2 lines of 9 random looking words consisting of 4 letters.

This video might also help:
https://www.bitcoinarmory.com/tutorials/armory-basics/restore-wallet/

Hope you find something nice Smiley
279  Bitcoin / Development & Technical Discussion / Re: Thoughts on this private key stealing mystery on: August 16, 2018, 01:11:19 PM
I've tried a few examples that you posted and I got exactly the same addresses as OP said
how did you use those block hashes & transaction ids to generate addresses?
it seems that you used them as phrases for brainwallet instead of as private keys
you should use them as Private Key Hexadecimal Format (64 chars)

Thanks for pointing this out! You are absolutely right.

I got off track when OP later on did use the input (for instance the BTC addresses) as a brainwallet and also when I found the six claimed merkle roots which also were found by using them as a brainwallet -> SHA256(Merkle Root) is private key.

I will rerun the first experiment and will update my first post accordingly. In the meantime I have succeeded in reproducing the experiment where BTC addresses were used as input to generate a private key.
280  Bitcoin / Bitcoin Discussion / Re: New puzzle! 1 Bitcoin to the winner on: August 16, 2018, 12:44:10 PM
Satoshi Nakamoto is the author
You make it sound like this challenge was from Satoshi himself. The wordcloud this "challenge" is based on the whitepaper of Bitcoin instead.

Anyway this was posted before and proven to be a fake. Don't waste your time on this!
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 [14] 15 16 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!