Bitcoin Forum
November 12, 2019, 12:37:55 AM *
News: Help collect the most notable posts made over the last 10 years.
 
   Home   Help Search Login Register More  
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 [51] 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 »
  Print  
Author Topic: Bitcoin puzzle transaction ~32 BTC prize to who solves it  (Read 80481 times)
virus-cyber
Newbie
*
Offline Offline

Activity: 18
Merit: 0


View Profile
June 22, 2019, 04:26:23 PM
 #1001

Adriano2010


https://gist.github.com/jhoenicke/2e39b3c6c49b1d7b216b8626197e4b89
The Bitcoin Forum is turning 10 years old! Join the community in sharing and exploring the notable posts made over the years.
1573519075
Hero Member
*
Offline Offline

Posts: 1573519075

View Profile Personal Message (Offline)

Ignore
1573519075
Reply with quote  #2

1573519075
Report to moderator
1573519075
Hero Member
*
Offline Offline

Posts: 1573519075

View Profile Personal Message (Offline)

Ignore
1573519075
Reply with quote  #2

1573519075
Report to moderator
1573519075
Hero Member
*
Offline Offline

Posts: 1573519075

View Profile Personal Message (Offline)

Ignore
1573519075
Reply with quote  #2

1573519075
Report to moderator
AndreuSmetanin
Jr. Member
*
Offline Offline

Activity: 129
Merit: 2


View Profile
June 22, 2019, 05:25:49 PM
Merited by Adriano2010 (2)
 #1002

Who can help me install the software need for windows OS? I will pay on bitcoin for help and a reward if i can solve the puzzle, but i have only 16 GB RAM.
Grin Grin Grin Grin Grin Grin Grin Grin Grin Grin Grin

I will pay on bitcoin after program is running, even if i not solve puzzle, i forget to put a, and extra word
Depending on what method you want to solve it???
There is 1 way to this  simple brute force and you need to study here is this https://github.com/pikachunakapika/BitCrack
Is method 2 is a baby-step-giant-step http://andrea.corbellini.name/2015/06/08/elliptic-curve-cryptography-breaking-security-and-a-comparison-with-rsa/
 https://gist.github.com/jhoenicke/2e39b3c6c49b1d7b216b8626197e4b89
Reply but it is not suitable for people who do not have Linux and who are not familiar with the basics of programming ,C, C+
Yes, and my wallet 12gyE8EKXsePJVDFECRda8vxRQvVoWpsEB  Roll Eyes
zielar
Member
**
Offline Offline

Activity: 120
Merit: 35


View Profile
June 22, 2019, 05:53:23 PM
 #1003

On first machine (600GB RAM):
Code:
Check bit = 90 only, pubkey is:
035c38bd9ae4b10e8a250857006f3cfd98ab15a6196d9f4dfd25bc7ecc77d788d5
Build Hash, MEM size = 384GB

On second machine (80GB RAM):
Code:
Check bit = 90 only, pubkey is:
035c38bd9ae4b10e8a250857006f3cfd98ab15a6196d9f4dfd25bc7ecc77d788d5
Build Hash, MEM size = 64GB
Search bits = 90
Search Keys....  from 20000000000000000000000 to 3ffffffffffffffffffffff

... and nothing changes from two days on both machines.
Something is wrong?
Am I to understand that no more changes are expected in these processes?

Can someone modify the code in such a way that the process is visible (along with the percentage)?
AndreuSmetanin
Jr. Member
*
Offline Offline

Activity: 129
Merit: 2


View Profile
June 22, 2019, 06:04:38 PM
 #1004

On first machine (600GB RAM):
Code:
Check bit = 90 only, pubkey is:
035c38bd9ae4b10e8a250857006f3cfd98ab15a6196d9f4dfd25bc7ecc77d788d5
Build Hash, MEM size = 384GB

On second machine (80GB RAM):
Code:
Check bit = 90 only, pubkey is:
035c38bd9ae4b10e8a250857006f3cfd98ab15a6196d9f4dfd25bc7ecc77d788d5
Build Hash, MEM size = 64GB
Search bits = 90
Search Keys....  from 20000000000000000000000 to 3ffffffffffffffffffffff

... and nothing changes from two days on both machines.
Something is wrong?
Am I to understand that no more changes are expected in these processes?

Can someone modify the code in such a way that the process is visible (along with the percentage)?
Probably nothing will happen because for the puzzle number 90 you need at least 10 terabytes of RAM ,and this amount is not in the world in one place!
PietCoin97
Jr. Member
*
Offline Offline

Activity: 60
Merit: 1


View Profile
June 22, 2019, 06:12:02 PM
 #1005

so this code is useless but it should work anyway

i have the same problem with my 600 GB machine
BurtW
Legendary
*
Offline Offline

Activity: 2590
Merit: 1064

All paid signature campaigns should be banned.


View Profile WWW
June 22, 2019, 06:39:25 PM
 #1006


Probably nothing will happen because for the puzzle number 90 you need at least 10 terabytes of RAM ,and this amount is not in the world in one place!
From 2017:  160 terabytes in a single system, so 10 terabytes should be easy (expensive but it can be done).

https://www.forbes.com/sites/aarontilley/2017/05/16/hpe-160-terabytes-memory/#4cca67c6383f

Our family was terrorized by Homeland Security.  Read all about it here:  http://www.jmwagner.com/ and http://www.burtw.com/  Any donations to help us recover from the $300,000 in legal fees and forced donations to the Federal Asset Forfeiture slush fund are greatly appreciated!
AndreuSmetanin
Jr. Member
*
Offline Offline

Activity: 129
Merit: 2


View Profile
June 22, 2019, 06:47:42 PM
 #1007


Probably nothing will happen because for the puzzle number 90 you need at least 10 terabytes of RAM ,and this amount is not in the world in one place!
From 2017:  160 terabytes in a single system, so 10 terabytes should be easy (expensive but it can be done).

https://www.forbes.com/sites/aarontilley/2017/05/16/hpe-160-terabytes-memory/#4cca67c6383f
I'm sorry, friend, but this is a pool of many identical matrices ,not one, so it's not gonna work.
mrxtraf
Member
**
Offline Offline

Activity: 145
Merit: 13


View Profile WWW
June 22, 2019, 08:07:59 PM
 #1008

On first machine (600GB RAM):
Code:
Check bit = 90 only, pubkey is:
035c38bd9ae4b10e8a250857006f3cfd98ab15a6196d9f4dfd25bc7ecc77d788d5
Build Hash, MEM size = 384GB

On second machine (80GB RAM):
Code:
Check bit = 90 only, pubkey is:
035c38bd9ae4b10e8a250857006f3cfd98ab15a6196d9f4dfd25bc7ecc77d788d5
Build Hash, MEM size = 64GB
Search bits = 90
Search Keys....  from 20000000000000000000000 to 3ffffffffffffffffffffff

... and nothing changes from two days on both machines.
Something is wrong?
Am I to understand that no more changes are expected in these processes?

Can someone modify the code in such a way that the process is visible (along with the percentage)?
After string
Code:
for (uint64_t i = 1; i < GSTEP; i++) {
insert
Code:
if(i%1000000==0){
     time_t tt = time(NULL);
     tim = localtime(&tt);
     printf("%d:%d:%d Loop generate %zu from %zu, %g%% \n", tim->tm_hour, tim->tm_min, tim->tm_sec, i, GSTEP, (double)(i/(GSTEP/100)));
}
showed percentage at generated array. Where 1000000 each showed. May changed.

After string
Code:
for (uint64_t i = skip; i < g_max; i++) {
Insert
Code:
if(i%10000000==0){
           
            time_t tt = time(NULL);
            tim = localtime(&tt);
            uint64_t real_i = i - skip;
            uint64_t real_diff = g_max - skip;
            printf("%d:%d:%d Search in %zu from start %zu end %zu, real_i:%zu \t \t real_diff:%zu \tPercent %g%% \n", tim->tm_hour, tim->tm_min, tim->tm_sec, i, skip, g_max, real_i, real_diff, (double)(real_i/(real_diff/100)));
        }
showed percentage each 10000000 try searched.
Bajula
Member
**
Offline Offline

Activity: 165
Merit: 16


View Profile
June 22, 2019, 10:13:26 PM
 #1009

Just for a fun little "thing" : for those frustrated by how long this takes.. someone could sort out how long it would take with a gpu and bitcrack and now it suddenly looks like a month is no big deal. Smiley
zielar
Member
**
Offline Offline

Activity: 120
Merit: 35


View Profile
June 23, 2019, 12:05:20 AM
 #1010

On first machine (600GB RAM):
Code:
Check bit = 90 only, pubkey is:
035c38bd9ae4b10e8a250857006f3cfd98ab15a6196d9f4dfd25bc7ecc77d788d5
Build Hash, MEM size = 384GB

On second machine (80GB RAM):
Code:
Check bit = 90 only, pubkey is:
035c38bd9ae4b10e8a250857006f3cfd98ab15a6196d9f4dfd25bc7ecc77d788d5
Build Hash, MEM size = 64GB
Search bits = 90
Search Keys....  from 20000000000000000000000 to 3ffffffffffffffffffffff

... and nothing changes from two days on both machines.
Something is wrong?
Am I to understand that no more changes are expected in these processes?

Can someone modify the code in such a way that the process is visible (along with the percentage)?
After string
Code:
for (uint64_t i = 1; i < GSTEP; i++) {
insert
Code:
if(i%1000000==0){
     time_t tt = time(NULL);
     tim = localtime(&tt);
     printf("%d:%d:%d Loop generate %zu from %zu, %g%% \n", tim->tm_hour, tim->tm_min, tim->tm_sec, i, GSTEP, (double)(i/(GSTEP/100)));
}
showed percentage at generated array. Where 1000000 each showed. May changed.

After string
Code:
for (uint64_t i = skip; i < g_max; i++) {
Insert
Code:
if(i%10000000==0){
            
            time_t tt = time(NULL);
            tim = localtime(&tt);
            uint64_t real_i = i - skip;
            uint64_t real_diff = g_max - skip;
            printf("%d:%d:%d Search in %zu from start %zu end %zu, real_i:%zu \t \t real_diff:%zu \tPercent %g%% \n", tim->tm_hour, tim->tm_min, tim->tm_sec, i, skip, g_max, real_i, real_diff, (double)(real_i/(real_diff/100)));
        }
showed percentage each 10000000 try searched.


9.c: In function ‘main’:
9.c:107:2: error: ‘tim’ undeclared (first use in this function); did you mean ‘time’?
  tim = localtime(&tt);
  ^~~
  time
9.c:107:2: note: each undeclared identifier is reported only once for each function it appears in
mrxtraf
Member
**
Offline Offline

Activity: 145
Merit: 13


View Profile WWW
June 23, 2019, 12:11:26 AM
 #1011

On first machine (600GB RAM):
Code:
Check bit = 90 only, pubkey is:
035c38bd9ae4b10e8a250857006f3cfd98ab15a6196d9f4dfd25bc7ecc77d788d5
Build Hash, MEM size = 384GB

On second machine (80GB RAM):
Code:
Check bit = 90 only, pubkey is:
035c38bd9ae4b10e8a250857006f3cfd98ab15a6196d9f4dfd25bc7ecc77d788d5
Build Hash, MEM size = 64GB
Search bits = 90
Search Keys....  from 20000000000000000000000 to 3ffffffffffffffffffffff

... and nothing changes from two days on both machines.
Something is wrong?
Am I to understand that no more changes are expected in these processes?

Can someone modify the code in such a way that the process is visible (along with the percentage)?
After string
Code:
for (uint64_t i = 1; i < GSTEP; i++) {
insert
Code:
if(i%1000000==0){
     time_t tt = time(NULL);
     tim = localtime(&tt);
     printf("%d:%d:%d Loop generate %zu from %zu, %g%% \n", tim->tm_hour, tim->tm_min, tim->tm_sec, i, GSTEP, (double)(i/(GSTEP/100)));
}
showed percentage at generated array. Where 1000000 each showed. May changed.

After string
Code:
for (uint64_t i = skip; i < g_max; i++) {
Insert
Code:
if(i%10000000==0){
            
            time_t tt = time(NULL);
            tim = localtime(&tt);
            uint64_t real_i = i - skip;
            uint64_t real_diff = g_max - skip;
            printf("%d:%d:%d Search in %zu from start %zu end %zu, real_i:%zu \t \t real_diff:%zu \tPercent %g%% \n", tim->tm_hour, tim->tm_min, tim->tm_sec, i, skip, g_max, real_i, real_diff, (double)(real_i/(real_diff/100)));
        }
showed percentage each 10000000 try searched.


9.c: In function ‘main’:
9.c:107:2: error: ‘tim’ undeclared (first use in this function); did you mean ‘time’?
  tim = localtime(&tt);
  ^~~
  time
9.c:107:2: note: each undeclared identifier is reported only once for each function it appears in

Sorry
Before string
Code:
printf("Build Hash, MEM size = %dGB\n", (uint32_t)(HASH_SIZE*one_table_bytes>>30));

insert
Code:
struct tm *tim;

example
Code:
    uint64_t one_table_bytes;
    one_table_bytes = (uint64_t)&table[1] - (uint64_t)&table[0];
   
    struct tm *tim;//Inser this line

    printf("Build Hash, MEM size = %dGB\n", (uint32_t)(HASH_SIZE*one_table_bytes>>30));
    secp256k1_gej pt;
zielar
Member
**
Offline Offline

Activity: 120
Merit: 35


View Profile
June 23, 2019, 12:19:28 AM
 #1012

Thank you so much.... Now that's working.
mrxtraf
Member
**
Offline Offline

Activity: 145
Merit: 13


View Profile WWW
June 23, 2019, 12:29:15 AM
 #1013

Thank you so much.... Now that's working.

5-10 percetn from found prize  Cheesy Jock  Roll Eyes Cheesy Grin
Good luck.
zielar
Member
**
Offline Offline

Activity: 120
Merit: 35


View Profile
June 23, 2019, 01:09:58 AM
 #1014

Thank you so much.... Now that's working.

5-10 percetn from found prize  Cheesy Jock  Roll Eyes Cheesy Grin
Good luck.

I am not selfish and I remember someone if somebody helped me. If I manage to take the next wallet - you can be sure that I will not miss you when sharing the prize :-)
Babi Ngetot
Newbie
*
Offline Offline

Activity: 15
Merit: 0


View Profile
June 23, 2019, 02:42:03 AM
 #1015

can some one help me  bulding BitCrack on linux ? Huh
iparktur
Newbie
*
Offline Offline

Activity: 90
Merit: 0


View Profile WWW
June 23, 2019, 12:31:24 PM
 #1016

I do not know English - I use GOOGLE TRANSLATER.
I shall try to write. As on a condition of health I can not work on the computer more than three hours per day.
At me the very weak computer (the processor AMD A6-3420M APU with HD Graphics AMD Radeon HD 6520G) - gives speed only 0.63 MKey/s
I use the CPU (-d 1), not the video card (for software clBitCrack.exe)
Really I can search in a range with accuracy
FROM - XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX0000000001:
TO - XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXFFFFFFFFFF

Here all meanings X for each of 54 positions should be known, i.e. I can search only in the first 10 positions
Therefore I am compelled to search for other method to narrow keyspace of search in hexadecimal
For this purpose I have seen(overlooked) all found variants and has counted factor of increase (step) from the previous address to the next.
The positions from addresses #50 up to addresses #70 were interesting to me
For this purpose I each position of "grown-up" of the address I divided into a position of the "younger" address.
In a result I have received such factors (K*):

50 00000000000000000000000000000000000000000000000000022bd43c2e9354 1MEzite4ReNuWaL5Ds17ePKt2dCxWEofwk - K*3.3687335859160928
51 00000000000000000000000000000000000000000000000000075070a1a009d4 1NpnQyZ7x24ud82b7WiRNvPm6N8bqGQnaS - K*2.048065899832177
52 000000000000000000000000000000000000000000000000000efae164cb9e3c 15z9c9sVpu6fwNiK7dMAFgMYSK4GqsGZim - K*1.6041007864337676
53 00000000000000000000000000000000000000000000000000180788e47e326c 15K1YKJMiJ4fpesTVUcByoz334rHmknxmT - K*1.4747074651267212
54 00000000000000000000000000000000000000000000000000236fb6d5ad1f43 1KYUv7nSvXx4642TKeuC2SNdTk326uUpFy - K*3.0122337265933986
55 000000000000000000000000000000000000000000000000006abe1f9b67e114 1LzhS3k3e9Ub8i2W1V8xQFdB8n2MYCHPCa - K*1.4717313228011604
56 000000000000000000000000000000000000000000000000009d18b63ac4ffdf 17aPYR1m6pVAacXg1PTDDU7XafvK1dxvhi - K*3.126406400159927
57 00000000000000000000000000000000000000000000000001eb25c90795d61c 15c9mPGLku1HuW9LRtBf4jcHVpBUt8txKz - K* 1.4465302194572583                                            
58 00000000000000000000000000000000000000000000000002c675b852189a21 1Dn8NF8qDyyfHMktmuoQLGyjWmZXgvosXf - K*2.6256582308911342
59 00000000000000000000000000000000000000000000000007496cbb87cab44f 1HAX2n9Uruu9YDt4cqRgYcvtGvZj1rbUyt - K*2.1616937162108232
60 0000000000000000000000000000000000000000000000000fc07a1825367bbe 1Kn5h2qpgw9mWE5jKpk8PP4qvvJ1QVy8su - K*1.2561547139608029
61 00000000000000000000000000000000000000000000000013C96A3742F64906 1AVJKwzs9AskraJLGHAZPiaZcrpDr1U6AB - K*21.4396439850506547
62 Unknown Private Key 1Me6EfpwZK5kQziBwBfvLiHjaPGxCKLoJi      
63 Unknown Private Key 1NpYjtLira16LfGbGwZJ5JbDPh3ai9bjf4            
64 Unknown Private Key 16jY7qLJnxb7CHZyqBP8qca9d51gAjyXQN      
.....
65 000000000000000000000000000000000000000000000001a838b13505b26867 18ZMbwUFLMHoZBbfpCjUJQTCMCbktshgpe - K*31.7464340386176884
66 Unknown Private Key 13zb1hQbWVsc2S7ZTZnP2G4undNNpdh5so      
67 Unknown Private Key 1BY8GQbnueYofwSuFAT3USAhGjPrkxDdW9    
68 Unknown Private Key 1MVDYgVaSN6iKKEsbzRUAYFrYJadLYZvvZ
69 Unknown Private Key 19vkiEajfhuZ8bs8Zu2jgmC6oqZbWqhxhG        
.....
70 0000000000000000000000000000000000000000000000349B84B6431A6C4EF1 19YZECXj3SxEZMoUeJ1yiPsw8xANe7M7QR
71    Unknown Private Key    1PWo3JeB9jrGwfHDNpdGK54CRas7fsVzXU    
72    Unknown Private Key    1JTK7s9YVYywfm5XUH7RNhHJH1LshCaRFR
73    Unknown Private Key    12VVRNPi4SJqUTsp6FmqDqY5sGosDtysn4      
74    Unknown Private Key    1FWGcVDK3JGzCC3WtkYetULPszMaK2Jksv
.....
75 0000000000000000000000000000000000000000000004c5ce114686a1336e07 1J36UjUByGroXcCvmj13U6uwaVv9caEeAt

Accuracy of "hit" rather high and the error makes no more than +128 addresses.
But factors (steps) have the very large difference:
Minimal - K*1.2561547139608029
Maximal - K*3.3687335859160928
I think, that after addresses #61 presumably factor will be even more in a range from K*4 up to K*6
It is possible, that the organizer specially has arranged addresses with balance with such different steps.
My idea has appeared " complete delirium "!
jpyao78
Newbie
*
Offline Offline

Activity: 22
Merit: 0



View Profile
June 23, 2019, 11:35:13 PM
Last edit: June 23, 2019, 11:46:19 PM by jpyao78
 #1017

On first machine (600GB RAM):
Code:
Check bit = 90 only, pubkey is:
035c38bd9ae4b10e8a250857006f3cfd98ab15a6196d9f4dfd25bc7ecc77d788d5
Build Hash, MEM size = 384GB

On second machine (80GB RAM):
Code:
Check bit = 90 only, pubkey is:
035c38bd9ae4b10e8a250857006f3cfd98ab15a6196d9f4dfd25bc7ecc77d788d5
Build Hash, MEM size = 64GB
Search bits = 90
Search Keys....  from 20000000000000000000000 to 3ffffffffffffffffffffff

... and nothing changes from two days on both machines.
Something is wrong?
Am I to understand that no more changes are expected in these processes?

Can someone modify the code in such a way that the process is visible (along with the percentage)?
for machine's memory is 600GB
at least this code need update:
uint32_t entry = xst.n[0] & (HASH_SIZE-1);
to
uint64_t entry = xst.n[0] & (HASH_SIZE-1);

and update
typedef struct hashtable_entry {
    uint32_t x;
    uint32_t exponent;
} hashtable_entry;
to
typedef struct hashtable_entry {
    uint32_t x;
    uint64_t exponent; //this will take more memory
} hashtable_entry;
itod
Legendary
*
Offline Offline

Activity: 1582
Merit: 1022


^ Will code for Bitcoins


View Profile
June 24, 2019, 09:05:46 AM
 #1018

There is 1 way to this  simple brute force and you need to study here is this https://github.com/pikachunakapika/BitCrack
Is method 2 is a baby-step-giant-step http://andrea.corbellini.name/2015/06/08/elliptic-curve-cryptography-breaking-security-and-a-comparison-with-rsa/
 https://gist.github.com/jhoenicke/2e39b3c6c49b1d7b216b8626197e4b89
Reply but it is not suitable for people who do not have Linux and who are not familiar with the basics of programming ,C, C+
Yes, and my wallet 12gyE8EKXsePJVDFECRda8vxRQvVoWpsEB  Roll Eyes

BTW, I do not see here any code that deals with private keys with known public keys, #65, #70, #75, etc, which were moved to expose public keys. Is that code public at all?

 
                                . ██████████.
                              .████████████████.
                           .██████████████████████.
                        -█████████████████████████████
                     .██████████████████████████████████.
                  -█████████████████████████████████████████
               -███████████████████████████████████████████████
           .-█████████████████████████████████████████████████████.
        .████████████████████████████████████████████████████████████
       .██████████████████████████████████████████████████████████████.
       .██████████████████████████████████████████████████████████████.
       ..████████████████████████████████████████████████████████████..
       .   .██████████████████████████████████████████████████████.
       .      .████████████████████████████████████████████████.

       .       .██████████████████████████████████████████████
       .    ██████████████████████████████████████████████████████
       .█████████████████████████████████████████████████████████████.
        .███████████████████████████████████████████████████████████
           .█████████████████████████████████████████████████████
              .████████████████████████████████████████████████
                   ████████████████████████████████████████
                      ██████████████████████████████████
                          ██████████████████████████
                             ████████████████████
                               ████████████████
                                   █████████
.CryptoTalk.org.|.MAKE POSTS AND EARN BTC!.🏆
supika
Newbie
*
Offline Offline

Activity: 32
Merit: 0


View Profile
June 24, 2019, 11:52:07 AM
 #1019

There is 1 way to this  simple brute force and you need to study here is this https://github.com/pikachunakapika/BitCrack
Is method 2 is a baby-step-giant-step http://andrea.corbellini.name/2015/06/08/elliptic-curve-cryptography-breaking-security-and-a-comparison-with-rsa/
 https://gist.github.com/jhoenicke/2e39b3c6c49b1d7b216b8626197e4b89
Reply but it is not suitable for people who do not have Linux and who are not familiar with the basics of programming ,C, C+
Yes, and my wallet 12gyE8EKXsePJVDFECRda8vxRQvVoWpsEB  Roll Eyes

BTW, I do not see here any code that deals with private keys with known public keys, #65, #70, #75, etc, which were moved to expose public keys. Is that code public at all?

65 000000000000000000000000000000000000000000000001A838B13505B26867 18ZMbwUFLMHoZBbfpCjUJQTCMCbktshgpe

70 0000000000000000000000000000000000000000000000349B84B6431A6C4EF1 19YZECXj3SxEZMoUeJ1yiPsw8xANe7M7QR

75 0000000000000000000000000000000000000000000004C5CE114686A1336E07 1J36UjUByGroXcCvmj13U6uwaVv9caEeAt
Gibreil
Member
**
Offline Offline

Activity: 532
Merit: 16

🔰FERRUM NETWORK🔰


View Profile
June 24, 2019, 12:43:43 PM
 #1020

Any info on who published this puzzle and what's their goal? Also, how would one go on about calculating those pvk decimal values and covert them to the private keys?

I don't know why but I'm smelling a big scam. Because a newbie that offer more than 12 000€ to solve a following of numbers this is strange...

The OP is not offering anything
He just have an overstatement. OP did not say anything in his thread regarding with payments. However, if you just look at the title Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it. You can emphasize also that he will pay 32 BTC as a reward for those who solves the puzzle. I think all the address will never been located or determined because even those are in blockchain, all users have anonimity. in short, we can hide ourselves but we do not know if there are pros that can locate the IP.

Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 [51] 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 »
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!