COBRAS
							
								Member 
								  
								  Offline
								Activity: 1132 
								Merit: 25
								
								
								
								
								  
							 
						 | 
								
							
								  | 
								
												
												 August 03, 2024, 12:47:23 AM  | 
										  
								 | 
							  
									  
							
						 | 
					 
					
						
							
							 
							[ 
						 | 
					 
				 
			 |  
		 
	 | 
		
		
			
				
					
								
							JDScreesh
							
								Member 
								  
								  Offline
								Activity: 67 
								Merit: 27
								
								
								
								
								  
							 
						 | 
								
							
								  | 
								
												
												 September 23, 2024, 07:59:24 AM  | 
										  
								 | 
							  
									  
							Hi there. Puzzle 130 was solved, but I don't know which script or technique was used    Anyway, gratz to the solver      
						 | 
					 
					
						
							
							 
							BTC bc1q9v9s9jtunr58pykwx77dpwzdupmfdn0x8jyt06 145u2ppTJhkXq11xnbBM5JgkQdgV9o1V42
  LTC LaAHGMjisi2NFMfHJpMywKm8ALzmivdRaq 
						 | 
					 
				 
			 |  
		 
	 | 
		
		
			
				
					
								
							Kpot87
							
								Jr. Member 
								 
								  Offline
								Activity: 43 
								Merit: 1
								
								
								
								
								  
							 
						 | 
								
							
								  | 
								
												
												 September 25, 2024, 12:52:40 PM  | 
										  
								 | 
							  
									  
							s2 = 0x352b52b52b52b52b52b52b52b52b52b4e7c1db2bf914fdd54560dc7fb517156e             ^repeated pattern^        |<----       130 bits       --->| It is just an inversion of 0x82, nothing special. If you multiply 0x352b52b52b52b52b52b52b52b52b52b4e7c1db2bf914fdd54560dc7fb517156e by 0x82, you will get 0x1affffffffffffffffffffffffffffffddb0714c547ca8e64d3b2ff8d9f5b8e1dc as a result, which is equal to one, if you apply modulo n=0xfffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd0364141 on that. can you share more numbers like 0x1affffffffffffffffffffffffffffffddb0714c547ca8e64d3b2ff8d9f5b8e1dc  thank you!  
						 | 
					 
					
						| 
							
						 | 
					 
				 
			 |  
		 
	 | 
		
		
			
				
					
								
							garlonicon
							
								Copper Member 
								Legendary
								  
								  Offline
								Activity: 944 
								Merit: 2303
								
								
								
								
								  
							 
						 | 
								
							
								  | 
								
												
												 September 25, 2024, 01:57:24 PM  | 
										  
								 | 
							  
									  
							can you share more numbers Just use inversion, and get some ECC calculator: 1/2=0x7fffffffffffffffffffffffffffffff5d576e7357a4501ddfe92f46681b20a1 1/3=0xaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa9d1c9e899ca306ad27fe1945de0242b81 1/4=0xbfffffffffffffffffffffffffffffff0c0325ad0376782ccfddc6e99c28b0f1 1/5=0x66666666666666666666666666666665e445f1f5dfb6a67e4cba8c385348e6e7 1/6=0xd5555555555555555555555555555554463c62c03cbc85871fd9f975582d3661 1/7=0x49249249249249249249249249249248c79facd43214c011123c1b03a93412a5 1/8=0xdffffffffffffffffffffffffffffffee3590149d95f8c3447d812bb362f7919 1/9=0x8e38e38e38e38e38e38e38e38e38e38d842841d57dd303af6a9150f8e5737996 1/10=0xb33333333333333333333333333333324f7a676e477fa35d0646756291bf9414 1/11=0xa2e8ba2e8ba2e8ba2e8ba2e8ba2e8ba219b51835b55cc30ebfe2f6599bc56f58 1/12=0xeaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa980759fd3760292e16fd62c011431bbd1 1/13=0x13b13b13b13b13b13b13b13b13b13b139834d5ea5c40a9dd3623dfe3727a53ca 1/14=0xa4924924924924924924924924924923c12744dd70aeb02669073cc83cb529f3 1/15=0x22222222222222222222222222222221f6c1fb51f53ce22a19938412c66da24d 1/16=0xeffffffffffffffffffffffffffffffecf03ef184454163803d538a40332dd2d ... 1/128=0x7dffffffffffffffffffffffffffffff5fe210b98a45bedd68698a894e7ab41e 1/129=0xa4b692da4b692da4b692da4b692da4b5c18a4ea054ff19b357b30348bd881e14 1/130=0x352b52b52b52b52b52b52b52b52b52b4e7c1db2bf914fdd54560dc7fb517156e 1/131=0x7b1d501f44659e4a427157f05dcd30da4254182896bd4f03546ef0e3f6b28500 1/132=0xb83e0f83e0f83e0f83e0f83e0f83e0f753ee5548eea2d0690fdf28e557c9f4c8 1/133=0xe8e6fa39be8e6fa39be8e6fa39be8e6e7ba4dc37e2d648a225da5604eb9f12f2 1/134=0x05bb39503d226357e16ece540f4898d5f11332cbd9e4f81fe7a346e495db0176 1/135=0xe759203cae759203cae759203cae7590ddcd6e80d38035c802aef0f1080384ed ... 1/0xfffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd036413d=0x3fffffffffffffffffffffffffffffffaeabb739abd2280eeff497a3340d9050 1/0xfffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd036413e=0x55555555555555555555555555555554e8e4f44ce51835693ff0ca2ef01215c0 1/0xfffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd036413f=0x7fffffffffffffffffffffffffffffff5d576e7357a4501ddfe92f46681b20a0 1/0xfffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd0364140=0xfffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd0364140 For example:  https://www.boxentriq.com/code-breaking/big-number-calculator 
						 | 
					 
					
						| 
							
						 | 
					 
				 
			 |  
		 
	 | 
		
		
			
				
					
								
							Sergey Magalyas
							
								Newbie 
								 
								  Offline
								Activity: 30 
								Merit: 0
								
								
								
								
								  
							 
						 | 
								
							
								  | 
								
												
												 October 09, 2024, 06:52:04 AM  | 
										  
								 | 
							  
									  
							I have been learning about ECDSA ( r s z, public key ,private key ) for about 2 months
  # 130 Although only one rsz  is  know , but 1000 rsz can be produced using the public key,  the nonce K value will be 240~256 bits
 
  would you mind sharing your code on how you leak the RSZ and how you create more sample for the given public key. thank you Friend, give me a code that allows you to create 1000 rsz using a public key.  
						 | 
					 
					
						| 
							
						 | 
					 
				 
			 |  
		 
	 | 
		
		
			
				
					
								
							JohnnyTX
							
								Newbie 
								 
								  Offline
								Activity: 7 
								Merit: 0
								
								
								
								
								  
							 
						 | 
								
							
								  | 
								
												
												 December 15, 2024, 08:32:00 PM  | 
										  
								 | 
							  
									  
							r2 = 0xdfb77cd83e2251dc96caad4c45cf98fcf76b8c24aa349c2dbba548029571331f s2 = 0x352b52b52b52b52b52b52b52b52b52b4e7c1db2bf914fdd54560dc7fb517156e z2 = Private key for Puzzle #130
  Update: z2 = 0x33e7665705359f04f28b88cf897c603c9
  r = 0xdb30127de06f6c9d04e4ebc9cdefb93433a37be972db697b21c22724f6cf69d2 s = 0xe759203cae759203cae759203cae7590ddcd6e80d38035c802aef0f1080384ed z = Private key for Puzzle #135
   
						 | 
					 
					
						| 
							
						 | 
					 
				 
			 |  
		 
	 | 
		
		
			
				
					
								
							COBRAS
							
								Member 
								  
								  Offline
								Activity: 1132 
								Merit: 25
								
								
								
								
								  
							 
						 | 
								
							
								  | 
								
												
												 December 15, 2024, 09:21:13 PM  | 
										  
								 | 
							  
									  
							r2 = 0xdfb77cd83e2251dc96caad4c45cf98fcf76b8c24aa349c2dbba548029571331f s2 = 0x352b52b52b52b52b52b52b52b52b52b4e7c1db2bf914fdd54560dc7fb517156e z2 = Private key for Puzzle #130
  Update: z2 = 0x33e7665705359f04f28b88cf897c603c9
  r = 0xdb30127de06f6c9d04e4ebc9cdefb93433a37be972db697b21c22724f6cf69d2 s = 0xe759203cae759203cae759203cae7590ddcd6e80d38035c802aef0f1080384ed z = Private key for Puzzle #135
  Hi, can you multiply or add r to number and edit s,z after , so what signatures will be valid ?  
						 | 
					 
					
						
							
							 
							[ 
						 | 
					 
				 
			 |  
		 
	 | 
		
		
			
				
					
								
							abdullahsoliman
							
								Newbie 
								 
								  Offline
								Activity: 17 
								Merit: 0
								
								
								
								
								  
							 
						 | 
								
							
								  | 
								
												
												 December 15, 2024, 10:49:37 PM  | 
										  
								 | 
							  
									  
							r2 = 0xdfb77cd83e2251dc96caad4c45cf98fcf76b8c24aa349c2dbba548029571331f s2 = 0x352b52b52b52b52b52b52b52b52b52b4e7c1db2bf914fdd54560dc7fb517156e z2 = Private key for Puzzle #130
  Update: z2 = 0x33e7665705359f04f28b88cf897c603c9
  r = 0xdb30127de06f6c9d04e4ebc9cdefb93433a37be972db697b21c22724f6cf69d2 s = 0xe759203cae759203cae759203cae7590ddcd6e80d38035c802aef0f1080384ed z = Private key for Puzzle #135
  Hi, can you multiply or add r to number and edit s,z after , so what signatures will be valid ? the question is how RetiredCoder makes this valuable and connected "r1_1 = 02de97092bfb7c02148a827b4f8b62db1e189a739c77815799df5e6fb35ae88a1f r2_1 = 02838db77b981db321faf527a830461cfda01aed50d85c345a7b0a8f4e5e4fd3fc delta  = 031e283a9ebc4c50b0a93f27d411e69d0a97aad2a6d4ae26f5725f8b55fb5176f5 delta _k = 0xfffffffffffffffffffffffffffffffebaaedce6af487e246f4eac90b714b3bd N- delta _k = 0x22175083b1fc19218d84 r1_2= 03de97092bfb7c02148a827b4f8b62db1e189a739c77815799df5e6fb35ae88a1f r2_2= 03838db77b981db321faf527a830461cfda01aed50d85c345a7b0a8f4e5e4fd3fc delta  = 021e283a9ebc4c50b0a93f27d411e69d0a97aad2a6d4ae26f5725f8b55fb5176f5 delta _k = 0x22175083b1fc19218d84 PK = 33e7665705359f04f28b88cf897c603c9" I wasted maybe 48 hours coding    , Then, one out of the community claimed the puzzle and didn`t show up.     where are you?     
						 | 
					 
					
						| 
							
						 | 
					 
				 
			 |  
		 
	 | 
		
		
			
				
					
								
							Lolo54
							
								Member 
								  
								  Offline
								Activity: 133 
								Merit: 32
								
								
								
								
								  
							 
						 | 
								
							
								  | 
								
												
												 December 16, 2024, 01:15:01 AM  | 
										  
								 | 
							  
									  
							Intriguing all the same, this RetiredCoder his way of writing, of composing his posts and some facts intrigue me (1 example  post de JohnnyTX 29/07/24) I'm probably wrong but satoshi_rider= RetiredCoder=satoshi why not 🤔?! I don't understand the meaning of some of his messages including the one in the signature of #130 involving a famous quote from Jules Verne?? nor why this one….nor even how it was a clue if not a message or rather an implied clue free to everyone to appreciate its significance. Why is it he who gives the explanation then the privkey on how to achieve it and not the solver….  strange brief  
						 | 
					 
					
						| 
							
						 | 
					 
				 
			 |  
		 
	 | 
		
		
			
				
					
								
							lavina888
							
								Member 
								  
								  Offline
								Activity: 82 
								Merit: 10 
								Tartarians
								
								
								
								
								
								  
							 
						 | 
								
							
								  | 
								
												
												 February 04, 2025, 02:37:31 PM  | 
										  
								 | 
							  
									  
							Hi there! It looks like you all are crazy for nonces and signatures, so I have some special values for you    r=0x678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb6 s=0x24c8a42e8fe11d670633fa66ebedb1672c71a517a30cbbaa9e14f2d5a15a3783 z=SHA256('This is test 1.') PubKey=0x3e42b3151f310f5f417f11b4c32d8360b22109dcc6432339243332b56cd596de, 0x7903116327cab6891b810588e4c909273c7eb013aea2162fa63afa1f11562b3a
  r=0x678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb6 s=0x768a0e3b0cfb3c8d9b7899f59f480555176ef25eefa1e96d3ac575ba4ffe85fd z=SHA256('This is test 2.') PubKey=0xc79fa242694e3148c8d50e667010e0c221f6004d108692c5040ff139595ed081, 0x525bd76c21c8e2d45725a378c973a646d5971acd8f240322e5f1fdf0ed4f8589
  r=0x678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb6 s=0xd17c5ed9fb37692cd152f381c4a3f16a896f96d26100310fe818d6963c402b25 z=SHA256('This is test 3.') PubKey=0xc03657988e2baf31a1a1061a87fa3da20f166dc8a22c02658f6d325dec722d84, 0x97ffbac6bec2de2b8d9f9bcaeced8e56abdd0b3996b48153cf0a1a92dc2d5529
 
  Btw. I think that those who do serious research of this topic do not need your script, but all contributions are welcome, of course. nonce found, but in theory knowing this value - it is possible to restore the private key from each address: x = (s*k-m)/r, but this is not true at all. for all three signatures it is impossible to restore the correct keys to the addresses.  
						 | 
					 
					
						| 
							
						 | 
					 
				 
			 |  
		 
	 | 
		
		
			
				
					
								
							COBRAS
							
								Member 
								  
								  Offline
								Activity: 1132 
								Merit: 25
								
								
								
								
								  
							 
						 | 
								
							
								  | 
								
												
												 February 05, 2025, 01:59:23 AM  | 
										  
								 | 
							  
									  
							Hi there! It looks like you all are crazy for nonces and signatures, so I have some special values for you    r=0x678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb6 s=0x24c8a42e8fe11d670633fa66ebedb1672c71a517a30cbbaa9e14f2d5a15a3783 z=SHA256('This is test 1.') PubKey=0x3e42b3151f310f5f417f11b4c32d8360b22109dcc6432339243332b56cd596de, 0x7903116327cab6891b810588e4c909273c7eb013aea2162fa63afa1f11562b3a
  r=0x678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb6 s=0x768a0e3b0cfb3c8d9b7899f59f480555176ef25eefa1e96d3ac575ba4ffe85fd z=SHA256('This is test 2.') PubKey=0xc79fa242694e3148c8d50e667010e0c221f6004d108692c5040ff139595ed081, 0x525bd76c21c8e2d45725a378c973a646d5971acd8f240322e5f1fdf0ed4f8589
  r=0x678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb6 s=0xd17c5ed9fb37692cd152f381c4a3f16a896f96d26100310fe818d6963c402b25 z=SHA256('This is test 3.') PubKey=0xc03657988e2baf31a1a1061a87fa3da20f166dc8a22c02658f6d325dec722d84, 0x97ffbac6bec2de2b8d9f9bcaeced8e56abdd0b3996b48153cf0a1a92dc2d5529
 
  Btw. I think that those who do serious research of this topic do not need your script, but all contributions are welcome, of course. nonce found, but in theory knowing this value - it is possible to restore the private key from each address: x = (s*k-m)/r, but this is not true at all. for all three signatures it is impossible to restore the correct keys to the addresses. publick keys different, because it not posible find privkey for adress.  
						 | 
					 
					
						
							
							 
							[ 
						 | 
					 
				 
			 |  
		 
	 | 
		
		
			
				
					
								
							coolmib
							
								Member 
								  
								  Offline
								Activity: 66 
								Merit: 14
								
								
								
								
								  
							 
						 | 
								
							
								  | 
								
												
												 June 28, 2025, 09:29:00 AM Last edit: June 29, 2025, 08:43:12 AM by coolmib  | 
										  
								 | 
							  
									  
							sorry......I can't recovery private key for this 2 rsz  my result: k1 = 0 k2 = 1
  Recovered Bitcoin public key: 028629507d9eef1748ec67ca2c4ab641fa0951d7f0bb0cf226f1c0f465a4e29404 Bitcoin Address: 1Ln1NYjtCamBG2UZDTKcHqcaNLP8TUrKFe
  Recovered Bitcoin public key: 0395c632a7af384a67104afd5b6a4a5d882e782d232519c59084f0744d08093876 Bitcoin Address: 1P5TaCC8ZQohntb3NwRXQE5zFzB2De2Dvz
  show your private key .. ??
 
  both msg sign from the same pubkey :  ( 0x8629507d9eef1748ec67ca2c4ab641fa0951d7f0bb0cf226f1c0f465a4e29404 , 0x2237204a53021490adfec9f0b3f0732f5024181d50fde2dcfc7a428c992b8d70 ) r2 = r1 + G Signatures are valid ✅ Nonces follow k2 = k1 + 1 ✅ Public key is valid and known ✅ Algebraic recovery fails due to zero denominator ❌ Lattice attack returns zero polynomial or errors ❌ Interesting..    nonce found, but in theory knowing this value - it is possible to restore the private key from each address: x = (s*k-m)/r, but this is not true at all. for all three signatures it is impossible to restore the correct keys to the addresses.
  If the nonce is found, it means you already have access to the genesis wallet, why bother with recovering another private key     
						 | 
					 
					
						| 
							
						 | 
					 
				 
			 |  
		 
	 | 
		
		
			
				
					
								
							nlitsme
							
								Newbie 
								 
								  Offline
								Activity: 2 
								Merit: 0
								
								
								
								
								  
							 
						 | 
								
							
								  | 
								
												
												 June 30, 2025, 10:53:38 AM Last edit: June 30, 2025, 01:24:18 PM by nlitsme  | 
										  
								 | 
							  
									  
							the signatures posted by JonnyTX (  https://bitcointalk.org/index.php?topic=5500713.msg64254396#msg64254396 ) have the interesting property that  r/s = (0xdeadbeef << 224) + i you can easily generate more such signatures by calculating:     s = r / (c+i)     z = a random 256 bit number     Pubkey = (R*s-G*z)/r where c = the above  (0xdeadbeef << 224)  constant, and r = genesis-pubkey.x   and R = genesis-pubkey. then the signatures posted by jacky19790729   (  https://bitcointalk.org/index.php?topic=5500713.msg64255481#msg64255481 ) have the property that both r/s and z/r are less than sqrt(n), where n is the curve grouporder. you can generate more such signatures like this:     a = a random 128 bit number     b = another random 128 bit number     R = (G*b+Pubkey)*a     r = R.xcoord     s = r/a     z = r*b in the above: lowercase letters indicate scalars in GF[n],  uppercase letters indicate points on secp256k1  
						 | 
					 
					
						| 
							
						 | 
					 
				 
			 |  
		 
	 | 
		
		
			
				
					
								
							JimsR
							
								Newbie 
								 
								  Offline
								Activity: 8 
								Merit: 0
								
								
								
								
								  
							 
						 | 
								
							
								  | 
								
												
												 July 01, 2025, 05:20:09 PM  | 
										  
								 | 
							  
									  
							r2 = 0xdfb77cd83e2251dc96caad4c45cf98fcf76b8c24aa349c2dbba548029571331f s2 = 0x352b52b52b52b52b52b52b52b52b52b4e7c1db2bf914fdd54560dc7fb517156e z2 = Private key for Puzzle #130
  Update: z2 = 0x33e7665705359f04f28b88cf897c603c9
  r = 0xdb30127de06f6c9d04e4ebc9cdefb93433a37be972db697b21c22724f6cf69d2 s = 0xe759203cae759203cae759203cae7590ddcd6e80d38035c802aef0f1080384ed z = Private key for Puzzle #135
  Hi Many thanks for your insight, can you show please how to find R for every puzzle with known public key?? or there is any clue??  
						 | 
					 
					
						| 
							
						 | 
					 
				 
			 |  
		 
	 | 
		
		
			
				
					
								
							ActiveC
							
								Newbie 
								 
								  Offline
								Activity: 1 
								Merit: 2
								
								
								
								
								  
							 
						 | 
								
							
								  | 
								
												
												 August 16, 2025, 12:26:18 AM  | 
										  
								 | 
							  
									  
							Hi there! It looks like you all are crazy for nonces and signatures, so I have some special values for you    r=0x678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb6 s=0x24c8a42e8fe11d670633fa66ebedb1672c71a517a30cbbaa9e14f2d5a15a3783 z=SHA256('This is test 1.') PubKey=0x3e42b3151f310f5f417f11b4c32d8360b22109dcc6432339243332b56cd596de, 0x7903116327cab6891b810588e4c909273c7eb013aea2162fa63afa1f11562b3a
  r=0x678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb6 s=0x768a0e3b0cfb3c8d9b7899f59f480555176ef25eefa1e96d3ac575ba4ffe85fd z=SHA256('This is test 2.') PubKey=0xc79fa242694e3148c8d50e667010e0c221f6004d108692c5040ff139595ed081, 0x525bd76c21c8e2d45725a378c973a646d5971acd8f240322e5f1fdf0ed4f8589
  r=0x678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb6 s=0xd17c5ed9fb37692cd152f381c4a3f16a896f96d26100310fe818d6963c402b25 z=SHA256('This is test 3.') PubKey=0xc03657988e2baf31a1a1061a87fa3da20f166dc8a22c02658f6d325dec722d84, 0x97ffbac6bec2de2b8d9f9bcaeced8e56abdd0b3996b48153cf0a1a92dc2d5529
 
  Btw. I think that those who do serious research of this topic do not need your script, but all contributions are welcome, of course. You are right JohnnyTX, almost anybody can do this    r=0x678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb6 s=0x96b538e853519c726a2c91e61ec11600ae1390813a627c66fb8be7947be63c52 z=SHA256('This is test 4.') PubKey=0x99c2b48be2177dfd0dcb1528f79393d1915eeca8697f85e02983e0c4c2de3475, 0x8cb2c8d83e8950523a7dab78a515fa19f2bb50a4b15bcd45a11110db445fe382
  r=0x678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb6 s=0x7211a824f55b505228e4c3d5194c1fcfaa15a456abdf37f9b9d97a4040afc073 z=SHA256('This is test 5.') PubKey=0x2dc8f0256a8c55cf1ff41f92ed11f801e09c024923c89a590137b2642896ecf0, 0xb74fc19c671261dcd13edf02c59cab6aad5c7b99ea9b76f2622b19b89c639135
  r=0x678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb6 s=0x94b9d3e76c5b1629ecf97fff95d7a4bbdac87cc26099ada28066c6ff1eb91912 z=SHA256('This is test 6.') PubKey=0xa73857b1dd23a714a3f78ab0cbc791f58524485bbb498640871eb21469cd55ee, 0x6606c989519b2b72999a0c5bfd5dd8d01ba4bfc78fb208c2264e6a18f89cb68b
 
 
 Opinions are welcome!  
						 | 
					 
					
						| 
							
						 | 
					 
				 
			 |  
		 
	 | 
		
		
			
				
					
								
							AtemAudit
							
								Newbie 
								 
								  Offline
								Activity: 2 
								Merit: 0
								
								
								
								
								  
							 
						 | 
								
							
								  | 
								
												
												 September 07, 2025, 06:00:04 PM  | 
										  
								 | 
							  
									  
							Hi there! It looks like you all are crazy for nonces and signatures, so I have some special values for you    r=0x678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb6 s=0x24c8a42e8fe11d670633fa66ebedb1672c71a517a30cbbaa9e14f2d5a15a3783 z=SHA256('This is test 1.') PubKey=0x3e42b3151f310f5f417f11b4c32d8360b22109dcc6432339243332b56cd596de, 0x7903116327cab6891b810588e4c909273c7eb013aea2162fa63afa1f11562b3a
  r=0x678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb6 s=0x768a0e3b0cfb3c8d9b7899f59f480555176ef25eefa1e96d3ac575ba4ffe85fd z=SHA256('This is test 2.') PubKey=0xc79fa242694e3148c8d50e667010e0c221f6004d108692c5040ff139595ed081, 0x525bd76c21c8e2d45725a378c973a646d5971acd8f240322e5f1fdf0ed4f8589
  r=0x678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb6 s=0xd17c5ed9fb37692cd152f381c4a3f16a896f96d26100310fe818d6963c402b25 z=SHA256('This is test 3.') PubKey=0xc03657988e2baf31a1a1061a87fa3da20f166dc8a22c02658f6d325dec722d84, 0x97ffbac6bec2de2b8d9f9bcaeced8e56abdd0b3996b48153cf0a1a92dc2d5529
 
  Btw. I think that those who do serious research of this topic do not need your script, but all contributions are welcome, of course. You are right JohnnyTX, almost anybody can do this    r=0x678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb6 s=0x96b538e853519c726a2c91e61ec11600ae1390813a627c66fb8be7947be63c52 z=SHA256('This is test 4.') PubKey=0x99c2b48be2177dfd0dcb1528f79393d1915eeca8697f85e02983e0c4c2de3475, 0x8cb2c8d83e8950523a7dab78a515fa19f2bb50a4b15bcd45a11110db445fe382
  r=0x678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb6 s=0x7211a824f55b505228e4c3d5194c1fcfaa15a456abdf37f9b9d97a4040afc073 z=SHA256('This is test 5.') PubKey=0x2dc8f0256a8c55cf1ff41f92ed11f801e09c024923c89a590137b2642896ecf0, 0xb74fc19c671261dcd13edf02c59cab6aad5c7b99ea9b76f2622b19b89c639135
  r=0x678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb6 s=0x94b9d3e76c5b1629ecf97fff95d7a4bbdac87cc26099ada28066c6ff1eb91912 z=SHA256('This is test 6.') PubKey=0xa73857b1dd23a714a3f78ab0cbc791f58524485bbb498640871eb21469cd55ee, 0x6606c989519b2b72999a0c5bfd5dd8d01ba4bfc78fb208c2264e6a18f89cb68b
 
 
 Opinions are welcome! I tried to ask how it was done but to no avail, the only opinion that I but also others have, some have already written it, is that you, JhonnyTX and saatoshi_rising are either the same person or anyway you are all connected to the puzzle, it is also curious that you are ActiveC and in the forum there is a solver of no less than 3 puzzles, called RetiredCoder or even RetiredC for friends   . So my opinion is that it is impossible, at least without further help, you can tell that they are constructed ad hoc, with some special method but to know the private key of the puzzle 130 and 135 you have to already have the private keys and be sure they are right, so either you solved it or anyway you already knew them, so you already have those keys in hand.  If you would like to explain to me in private how to solve for the z of 135 that would be interesting   .  
						 | 
					 
					
						| 
							
						 | 
					 
				 
			 |  
		 
	 | 
		
		
			
				
					
								
							krashfire (OP)
							
								Member 
								  
								  Offline
								Activity: 134 
								Merit: 14
								
								
								
								
								  
							 
						 | 
								
							
								  | 
								
												
												 September 08, 2025, 04:33:17 AM  | 
										  
								 | 
							  
									  
							Hi there! It looks like you all are crazy for nonces and signatures, so I have some special values for you    r=0x678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb6 s=0x24c8a42e8fe11d670633fa66ebedb1672c71a517a30cbbaa9e14f2d5a15a3783 z=SHA256('This is test 1.') PubKey=0x3e42b3151f310f5f417f11b4c32d8360b22109dcc6432339243332b56cd596de, 0x7903116327cab6891b810588e4c909273c7eb013aea2162fa63afa1f11562b3a
  r=0x678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb6 s=0x768a0e3b0cfb3c8d9b7899f59f480555176ef25eefa1e96d3ac575ba4ffe85fd z=SHA256('This is test 2.') PubKey=0xc79fa242694e3148c8d50e667010e0c221f6004d108692c5040ff139595ed081, 0x525bd76c21c8e2d45725a378c973a646d5971acd8f240322e5f1fdf0ed4f8589
  r=0x678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb6 s=0xd17c5ed9fb37692cd152f381c4a3f16a896f96d26100310fe818d6963c402b25 z=SHA256('This is test 3.') PubKey=0xc03657988e2baf31a1a1061a87fa3da20f166dc8a22c02658f6d325dec722d84, 0x97ffbac6bec2de2b8d9f9bcaeced8e56abdd0b3996b48153cf0a1a92dc2d5529
 
  Btw. I think that those who do serious research of this topic do not need your script, but all contributions are welcome, of course. You are right JohnnyTX, almost anybody can do this    r=0x678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb6 s=0x96b538e853519c726a2c91e61ec11600ae1390813a627c66fb8be7947be63c52 z=SHA256('This is test 4.') PubKey=0x99c2b48be2177dfd0dcb1528f79393d1915eeca8697f85e02983e0c4c2de3475, 0x8cb2c8d83e8950523a7dab78a515fa19f2bb50a4b15bcd45a11110db445fe382
  r=0x678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb6 s=0x7211a824f55b505228e4c3d5194c1fcfaa15a456abdf37f9b9d97a4040afc073 z=SHA256('This is test 5.') PubKey=0x2dc8f0256a8c55cf1ff41f92ed11f801e09c024923c89a590137b2642896ecf0, 0xb74fc19c671261dcd13edf02c59cab6aad5c7b99ea9b76f2622b19b89c639135
  r=0x678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb6 s=0x94b9d3e76c5b1629ecf97fff95d7a4bbdac87cc26099ada28066c6ff1eb91912 z=SHA256('This is test 6.') PubKey=0xa73857b1dd23a714a3f78ab0cbc791f58524485bbb498640871eb21469cd55ee, 0x6606c989519b2b72999a0c5bfd5dd8d01ba4bfc78fb208c2264e6a18f89cb68b
 
 
 Opinions are welcome! I tried to ask how it was done but to no avail, the only opinion that I but also others have, some have already written it, is that you, JhonnyTX and saatoshi_rising are either the same person or anyway you are all connected to the puzzle, it is also curious that you are ActiveC and in the forum there is a solver of no less than 3 puzzles, called RetiredCoder or even RetiredC for friends   . So my opinion is that it is impossible, at least without further help, you can tell that they are constructed ad hoc, with some special method but to know the private key of the puzzle 130 and 135 you have to already have the private keys and be sure they are right, so either you solved it or anyway you already knew them, so you already have those keys in hand.  If you would like to explain to me in private how to solve for the z of 135 that would be interesting   . Here, you can see how Z Signature is calculated.  https://github.com/KrashKrash/public-key-signature-generator 
						 | 
					 
					
						
							
							 
							KRASH 
						 | 
					 
				 
			 |  
		 
	 | 
		
		
			
				
					
								
							AtemAudit
							
								Newbie 
								 
								  Offline
								Activity: 2 
								Merit: 0
								
								
								
								
								  
							 
						 | 
								
							
								  | 
								
												
												 September 08, 2025, 08:40:30 AM  | 
										  
								 | 
							  
									  
							Hi there! It looks like you all are crazy for nonces and signatures, so I have some special values for you    r=0x678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb6 s=0x24c8a42e8fe11d670633fa66ebedb1672c71a517a30cbbaa9e14f2d5a15a3783 z=SHA256('This is test 1.') PubKey=0x3e42b3151f310f5f417f11b4c32d8360b22109dcc6432339243332b56cd596de, 0x7903116327cab6891b810588e4c909273c7eb013aea2162fa63afa1f11562b3a
  r=0x678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb6 s=0x768a0e3b0cfb3c8d9b7899f59f480555176ef25eefa1e96d3ac575ba4ffe85fd z=SHA256('This is test 2.') PubKey=0xc79fa242694e3148c8d50e667010e0c221f6004d108692c5040ff139595ed081, 0x525bd76c21c8e2d45725a378c973a646d5971acd8f240322e5f1fdf0ed4f8589
  r=0x678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb6 s=0xd17c5ed9fb37692cd152f381c4a3f16a896f96d26100310fe818d6963c402b25 z=SHA256('This is test 3.') PubKey=0xc03657988e2baf31a1a1061a87fa3da20f166dc8a22c02658f6d325dec722d84, 0x97ffbac6bec2de2b8d9f9bcaeced8e56abdd0b3996b48153cf0a1a92dc2d5529
 
  Btw. I think that those who do serious research of this topic do not need your script, but all contributions are welcome, of course. You are right JohnnyTX, almost anybody can do this    r=0x678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb6 s=0x96b538e853519c726a2c91e61ec11600ae1390813a627c66fb8be7947be63c52 z=SHA256('This is test 4.') PubKey=0x99c2b48be2177dfd0dcb1528f79393d1915eeca8697f85e02983e0c4c2de3475, 0x8cb2c8d83e8950523a7dab78a515fa19f2bb50a4b15bcd45a11110db445fe382
  r=0x678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb6 s=0x7211a824f55b505228e4c3d5194c1fcfaa15a456abdf37f9b9d97a4040afc073 z=SHA256('This is test 5.') PubKey=0x2dc8f0256a8c55cf1ff41f92ed11f801e09c024923c89a590137b2642896ecf0, 0xb74fc19c671261dcd13edf02c59cab6aad5c7b99ea9b76f2622b19b89c639135
  r=0x678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb6 s=0x94b9d3e76c5b1629ecf97fff95d7a4bbdac87cc26099ada28066c6ff1eb91912 z=SHA256('This is test 6.') PubKey=0xa73857b1dd23a714a3f78ab0cbc791f58524485bbb498640871eb21469cd55ee, 0x6606c989519b2b72999a0c5bfd5dd8d01ba4bfc78fb208c2264e6a18f89cb68b
 
 
 Opinions are welcome! I tried to ask how it was done but to no avail, the only opinion that I but also others have, some have already written it, is that you, JhonnyTX and saatoshi_rising are either the same person or anyway you are all connected to the puzzle, it is also curious that you are ActiveC and in the forum there is a solver of no less than 3 puzzles, called RetiredCoder or even RetiredC for friends   . So my opinion is that it is impossible, at least without further help, you can tell that they are constructed ad hoc, with some special method but to know the private key of the puzzle 130 and 135 you have to already have the private keys and be sure they are right, so either you solved it or anyway you already knew them, so you already have those keys in hand.  If you would like to explain to me in private how to solve for the z of 135 that would be interesting   . Here, you can see how Z Signature is calculated.  https://github.com/KrashKrash/public-key-signature-generatorYes, you're right, but in the case of JhonnyTX, the Z value is not random. He doesn't sign a wallet generically because, in his case, at least for 130 and 135, he uses z and "assigns" it the value of the private key corresponding to puzzles 130 and 135. This means that he already knows the private keys for those puzzles or, most likely, for the entire puzzle.  
						 | 
					 
					
						| 
							
						 | 
					 
				 
			 |  
		 
	 | 
	 |