Show Posts
|
Pages: [1]
|
3
|
Bitcoin / Bitcoin Discussion / Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
|
on: November 11, 2023, 08:17:43 AM
|
I finally have 2^30.75+ (1,806,000,000) wild kangaroo points stored (offsets of #130s public key). Now it's time to release the tame kangaroos. Hopefully within 2-3 months, I'll have a tame land on a wild trap. I imagine I am behind the group that found #120 & #125, but maybe luck will be on my side. Long journey ahead, let's go.
May the force BTC with you
|
|
|
4
|
Bitcoin / Bitcoin Discussion / Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
|
on: October 28, 2023, 07:26:11 AM
|
I think your comments/scripts confuse people more than helps them, IMO.
I thought everyone is a cryptography expert around here, or worked for more than 25 years on EC, if my methods confuses you is because you don't try working only with scalars to penetrate N the group order. If I explain everything step by step, where would be the fun in that? Have you shared anything you could discover by operating over scalars? Whatever method, equation you can use to get definitive results over scalars, applies to points as well. I have explained how to get meaningful results based on that before. To Alek on a few previous pages, regarding how to get target /1024 for sure. Digaran, you're like a toddler when it comes to ECC. Without the proper knowledge about ECC, group fields, etc , you will always be mesmerized by every result you're getting when you perform some arithmetical operations on the curve. ..if my methods confuses you is because you don't try working only with scalars to penetrate N the group order
That is so stupid in so many ways. The order is a prime number and you are trying to find a divisor that is different from 1 and the number itself....I'm speechless! Whatever method, equation you can use to get definitive results over scalars, applies to points as well.
Another stupidity. For example you can multiply 2 scalars over the group field but you cannot do that with 2 points. It seems that posting whatever crosses your mind, it's your full time job! This wouldn't be a problem if you will present concrete examples from A to Z or if you will have a solid understanding about ECC. The problem is that you're lacking both. There are tons of materials about ECC and how it works - you just have to google it. The more you'll learn, the more you'll realize what a masterpiece the secp256k1 is. "Penetrate N the group order" by using a combination of subtractions and divisions is at least pointless!
|
|
|
5
|
Bitcoin / Bitcoin Discussion / Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
|
on: October 23, 2023, 06:45:13 AM
|
Something interesting is the fact about dividing a key, has anyone managed to divide 1 through 15 by different divisor to see the left most characters of resulting scalar? Yeah do that and you will realize the starting hex chars of your result depends on the ending chars of your target.
These are natural behaviors when you're working on a curve over a finite field. You need to study them more (properties of curves over prime fields, pairings, embedding degree, etc) in order to avoid attributing a magical aura to every result that pops out.
|
|
|
6
|
Bitcoin / Bitcoin Discussion / Re: == Bitcoin challenge transaction: ~1000 BTC total bounty to solvers! ==UPDATED==
|
on: August 29, 2023, 09:56:28 AM
|
Trojans and viruses in PuzzleBTC, . Did I say something funny? Let the rest of us know, we need some laughter. I'm still amazed about your tactic, "free application"? What, is there any application for brute forcing bitcoin keys which is not free and some idiots would pay to use it, that we didn't know of? No? then STFU, parasite! Take a deep breath man and relax ! There is no need to call somebody parasite even if it's clearly a scammer! Don't forget, this is a community, I don't see the point of being toxic in your comments!
|
|
|
7
|
Bitcoin / Bitcoin Discussion / Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
|
on: August 04, 2023, 05:32:06 AM
|
I'm developing brute force software following a slightly more coherent logic, I'll post the code soon. support the project: 1JamesJ2H2myei94NswaBATqEsBhATENSU Sorry but when you put "brute force" and "coherent logic" in the same sentence , the result will be "incoherent". Brute force is the lack of a algorithm that has a logic; if there is one, then the logic part comes in. For #66 there is no other way of cracking it apart from brute force ! Any reduction technique that you think it will work, it won't, because all we have is the output of RIPEMD160(SHA256(Public Key)). Unless you broke SHA256 and RIPEMD160 all together and somehow managed to recreate the 256 bits input from a 160 bits output, then this is pointless. As you could see from other posts, people have tried already all sorts of techniques : statistical analysis regarding keys distribution in a certain range, "magic" relationships between wallet keys (with or without the knowledge of Pub Key), etc. Try to read more about address generation process. One you've done, move on to the signature generation part where you can read about other interesting potential vulnerabilities like nonce reuse , nonce share , lattices and so on ! You will see how interesting the secp256k1 curve really is ! Start with this : https://www.oreilly.com/library/view/mastering-bitcoin/9781491902639/ch04.htmlCheers!
|
|
|
8
|
Bitcoin / Bitcoin Discussion / Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
|
on: July 15, 2023, 12:57:34 PM
|
Puzzle 129, 134, 139, 144, 149, 154, 160 are already solved, this means that this puzzle is rigged, but anyway, is it harder to solve puzzle 66 than mining a block?
Why on earth you said that above puzzles are already solved, however they aren't? We've been trying to solve a single puzzle 124 for past 8 months are so and now you suddenly claimed that all puzzles with pubkeys are solved. Are you checking their balances on Ethereum or some other cheap drug Blockchain? Just look the hashs on blockchain, all mentioned hashs already have outs, how could a hash with unknown privatekey has outs? Did you at least bother to use the search function in this thread to read why there are outs in those transactions?
|
|
|
9
|
Bitcoin / Bitcoin Discussion / Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
|
on: July 12, 2023, 05:57:55 PM
|
guys, we don't talk about knowing the first bit, but finding it using an algorithm. It's pointless to spit out a public key when you know the private key that generates it. Take the pub key of puzzle #120 and post the first bit (discard the 0s MSB , of course). If you manage to find that bit you can extend the algo to find out all the other remaining bits.
|
|
|
10
|
Bitcoin / Bitcoin Discussion / Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
|
on: July 12, 2023, 05:38:15 PM
|
There is even a way to find out the range in which the key is located, ...
Really? So tell us what the range is where #66 is lying Not to be a smart pants, but the question is silly and the answer will follow the question : #66 lies somewhere between 0x20000000000000000 and 0x3ffffffffffffffff . If you can determine the range of the private key from it's public key, ECC is broken. So, I don't believe that, yet.
Exactly, to determine the range, it mean determine one single bit position and that with the correct math operations can solve any key, so it is hard to believe Totally agree with GoldTiger69 and albert0bsd here! One single bit position will break ECC! Here is a pubkey 03995B8A5AD00A205BFB9837014E2978273B816CFB29CA9644AB6D44977C006C64 The first bit of the private key is 1 I will even give you range 2^144-2^145 Come on break the ECC with that bit..... Sure : follow the same logic / algorithm that you applied when you discovered that the first bit is 1. Nobody poses such an algorithm as we speak, modular math on prime fields forbids it.
|
|
|
11
|
Bitcoin / Bitcoin Discussion / Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
|
on: July 12, 2023, 04:21:18 PM
|
There is even a way to find out the range in which the key is located, ...
Really? So tell us what the range is where #66 is lying Not to be a smart pants, but the question is silly and the answer will follow the question : #66 lies somewhere between 0x20000000000000000 and 0x3ffffffffffffffff . If you can determine the range of the private key from it's public key, ECC is broken. So, I don't believe that, yet.
Exactly, to determine the range, it mean determine one single bit position and that with the correct math operations can solve any key, so it is hard to believe Totally agree with GoldTiger69 and albert0bsd here! One single bit position will break ECC!
|
|
|
|