Bitcoin Forum
May 04, 2024, 09:49:51 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 [152] 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 ... 250 »
  Print  
Author Topic: Bitcoin puzzle transaction ~32 BTC prize to who solves it  (Read 185915 times)
mcdouglasx
Member
**
Offline Offline

Activity: 237
Merit: 53

New ideas will be criticized and then admired.


View Profile WWW
July 30, 2023, 09:26:21 PM
 #3021

I'm sorry, but if pk = 3; then pk -  10 =/= 7, pk - 10 = -7, very different.

I used 0-10 as an example but they are really:0-115792089237316195423570985008687907852837564279074904382605163141518161494337


Code:
[code]x= 115792089237316195423570985008687907852837564279074904382605163141518161494337
pk= 1
r= pk-x
pub 0279be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798
[/code]


Code:
Pk decimal: -1
pub  0379be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798

Pk decimal: 1

pub 0279be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798

Pk decimal: 115792089237316195423570985008687907852837564279074904382605163141518161494336

pub 0379be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798

Pk decimal: 115792089237316195423570985008687907852837564279074904382605163141518161494338

pub 0279be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798

I'm not dead, long story... BTC bc1qxs47ttydl8tmdv8vtygp7dy76lvayz3r6rdahu
1714859391
Hero Member
*
Offline Offline

Posts: 1714859391

View Profile Personal Message (Offline)

Ignore
1714859391
Reply with quote  #2

1714859391
Report to moderator
1714859391
Hero Member
*
Offline Offline

Posts: 1714859391

View Profile Personal Message (Offline)

Ignore
1714859391
Reply with quote  #2

1714859391
Report to moderator
1714859391
Hero Member
*
Offline Offline

Posts: 1714859391

View Profile Personal Message (Offline)

Ignore
1714859391
Reply with quote  #2

1714859391
Report to moderator
Make sure you back up your wallet regularly! Unlike a bank account, nobody can help you if you lose access to your BTC.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714859391
Hero Member
*
Offline Offline

Posts: 1714859391

View Profile Personal Message (Offline)

Ignore
1714859391
Reply with quote  #2

1714859391
Report to moderator
digaran
Copper Member
Hero Member
*****
Offline Offline

Activity: 1330
Merit: 899

🖤😏


View Profile
July 31, 2023, 10:17:41 AM
 #3022

I'm sorry, but if pk = 3; then pk -  10 =/= 7, pk - 10 = -7, very different.

I used 0-10 as an example but they are really:0-115792089237316195423570985008687907852837564279074904382605163141518161494337


Code:
[code]x= 115792089237316195423570985008687907852837564279074904382605163141518161494337
pk= 1
r= pk-x
pub 0279be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798
[/code]


Code:
Pk decimal: -1
pub  0379be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798

Pk decimal: 1

pub 0279be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798

Pk decimal: 115792089237316195423570985008687907852837564279074904382605163141518161494336

pub 0379be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798

Pk decimal: 115792089237316195423570985008687907852837564279074904382605163141518161494338

pub 0279be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798
When I say misinformation, now I know you are misinformed, this key :
Code:
115792089237316195423570985008687907852837564279074904382605163141518161494338
is an invalid key, but mod n it is the same as G or 0x1. You see, whatever you add to n, it's like adding to zero, if you add 5 to n, what you get is just 5. So no, they are not all the same, if you convert the key above to WIF no wallet will accept it because it has a wrong format. All pk are mod n.

🖤😏
crewchill
Newbie
*
Offline Offline

Activity: 5
Merit: 0


View Profile
July 31, 2023, 12:39:53 PM
 #3023

Code:
import time
import random
import multiprocessing
from bit import *

add = "13zb1hQbWVsc2S7ZTZnP2G4undNNpdh5so"

s = 0
cores = 8
def lucky(s):
F = []
while True:
x = "0123456789abcdef"
a = "3f" #prefix range, can be modified.
b = ''.join(random.choice(x) for _ in range (15))
private_key = (f'{a}{b}')
key = Key.from_hex(private_key)
address = key.address

if address.startswith('13zb1hQ'): #can be used as vanity search
print ("Pattern Found :",private_key, address)

if address == add:
print("Lucky mf! :" ,address, private_key)

if __name__ =='__main__':
t = time.ctime()
job =[]
for s in range (cores):
p = multiprocessing.Process(target=lucky, args=(s,))
jobs.append(p)
p.start()

if you want to find puzzle #66 in slow mode. I leave the code here.
mcdouglasx
Member
**
Offline Offline

Activity: 237
Merit: 53

New ideas will be criticized and then admired.


View Profile WWW
July 31, 2023, 01:02:29 PM
Last edit: July 31, 2023, 02:32:40 PM by mcdouglasx
 #3024

I'm sorry, but if pk = 3; then pk -  10 =/= 7, pk - 10 = -7, very different.

I used 0-10 as an example but they are really:0-115792089237316195423570985008687907852837564279074904382605163141518161494337


Code:
[code]x= 115792089237316195423570985008687907852837564279074904382605163141518161494337
pk= 1
r= pk-x
pub 0279be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798
[/code]


Code:
Pk decimal: -1
pub  0379be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798

Pk decimal: 1

pub 0279be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798

Pk decimal: 115792089237316195423570985008687907852837564279074904382605163141518161494336

pub 0379be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798

Pk decimal: 115792089237316195423570985008687907852837564279074904382605163141518161494338

pub 0279be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798
When I say misinformation, now I know you are misinformed, this key :
Code:
115792089237316195423570985008687907852837564279074904382605163141518161494338
is an invalid key, but mod n it is the same as G or 0x1. You see, whatever you add to n, it's like adding to zero, if you add 5 to n, what you get is just 5. So no, they are not all the same, if you convert the key above to WIF no wallet will accept it because it has a wrong format. All pk are mod n.

bro honestly you are not good for maths, sorry about that, you do not think with mathematics you talk about invalid key as if the discrete logarithm and its request depended on the parameters that were imposed on the curve as a standard, the goal is to get any of pk, you can not only find a key by subtracting and dividing.

X=115792089237316195423570985008687907852837564279074904382605163141518161494337
Y=115792089237316195423570985008687907852837564279074904382605163141518161494336
If X represents a zero in the calculations of your library, a good mathematician would logically use Y and add 1 to the result.

Like

(Y-pk)+1

The goal is to find some key, it doesn't matter if it is invalid for the bitcoin standard, because knowing the pk of any of them will know the original pk you are looking for. If you limit your mind thinking about the parameters that satoshi imposed, you will not achieve

example: suppose you want to find an unknown key that we call Z Z= 1200 if we know that its range is between 1000:2000 if we subtract 2000 we will get -800 wow yes, an invalid key?? should i care The answer is no, because if we find the value -800, even if it represents an invalid key, we will know that the original pk is 1200.

I'm not dead, long story... BTC bc1qxs47ttydl8tmdv8vtygp7dy76lvayz3r6rdahu
mcdouglasx
Member
**
Offline Offline

Activity: 237
Merit: 53

New ideas will be criticized and then admired.


View Profile WWW
July 31, 2023, 02:44:46 PM
 #3025

I'm sorry, but if pk = 3; then pk -  10 =/= 7, pk - 10 = -7, very different.

I used 0-10 as an example but they are really:0-115792089237316195423570985008687907852837564279074904382605163141518161494337


Code:
[code]x= 115792089237316195423570985008687907852837564279074904382605163141518161494337
pk= 1
r= pk-x
pub 0279be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798
[/code]


Code:
Pk decimal: -1
pub  0379be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798

Pk decimal: 1

pub 0279be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798

Pk decimal: 115792089237316195423570985008687907852837564279074904382605163141518161494336

pub 0379be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798

Pk decimal: 115792089237316195423570985008687907852837564279074904382605163141518161494338

pub 0279be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798
When I say misinformation, now I know you are misinformed, this key :
Code:
115792089237316195423570985008687907852837564279074904382605163141518161494338
is an invalid key, but mod n it is the same as G or 0x1. You see, whatever you add to n, it's like adding to zero, if you add 5 to n, what you get is just 5. So no, they are not all the same, if you convert the key above to WIF no wallet will accept it because it has a wrong format. All pk are mod n.

bro honestly you are not good for maths, sorry about that, you do not think with mathematics you talk about invalid key as if the discrete logarithm and its request depended on the parameters that were imposed on the curve as a standard, the goal is to get any of pk, you can not only find a key by subtracting and dividing.

X=115792089237316195423570985008687907852837564279074904382605163141518161494337
Y=115792089237316195423570985008687907852837564279074904382605163141518161494336
If X represents a zero in the calculations of your library, a good mathematician would logically use Y and add 1 to the result.

Like

(Y-pk)+1

The goal is to find some key, it doesn't matter if it is invalid for the bitcoin standard, because knowing the pk of any of them will know the original pk you are looking for. If you limit your mind thinking about the parameters that satoshi imposed, you will not achieve

example: suppose you want to find an unknown key that we call Z Z= 1200 if we know that its range is between 1000:2000 if we subtract 2000 we will get -800 wow yes, an invalid key?? should i care The answer is no, because if we find the value -800, even if it represents an invalid key, we will know that the original pk is 1200.


I recommend the python module ICE secp256k1 has no N limits, it will give you the exact results even when these results are negative or over the imposed limit. An example, the Bitcoin module, gives erroneous results when it comes to negative values ​​or above the imposed limit. Let's remember that numbers are infinite and that a program only recognizes from 1-10, for example, does not mean that you cannot add 4+7 or that 11 does not exist.

I'm not dead, long story... BTC bc1qxs47ttydl8tmdv8vtygp7dy76lvayz3r6rdahu
GR Sasa
Member
**
Offline Offline

Activity: 177
Merit: 14


View Profile
July 31, 2023, 02:58:39 PM
 #3026


I recommend the python module ICE secp256k1 has no N limits, it will give you the exact results even when these results are negative or over the imposed limit. An example, the Bitcoin module, gives erroneous results when it comes to negative values ​​or above the imposed limit. Let's remember that numbers are infinite and that a program only recognizes from 1-10, for example, does not mean that you cannot add 4+7 or that 11 does not exist.

You are making yourself a professional user, even though no one of us are.

Even if you divide, multiply, add, subtract a key million of times to get back to the targeted key, you'll not find an single answer for the new values. Because they will still be represented as 255 bits, so the complexity did not changed at all. You just moved the targeted key from A to B, with absolutely the same complexity.
mcdouglasx
Member
**
Offline Offline

Activity: 237
Merit: 53

New ideas will be criticized and then admired.


View Profile WWW
July 31, 2023, 04:52:47 PM
 #3027


I recommend the python module ICE secp256k1 has no N limits, it will give you the exact results even when these results are negative or over the imposed limit. An example, the Bitcoin module, gives erroneous results when it comes to negative values ​​or above the imposed limit. Let's remember that numbers are infinite and that a program only recognizes from 1-10, for example, does not mean that you cannot add 4+7 or that 11 does not exist.

You are making yourself a professional user, even though no one of us are.

Even if you divide, multiply, add, subtract a key million of times to get back to the targeted key, you'll not find an single answer for the new values. Because they will still be represented as 255 bits, so the complexity did not changed at all. You just moved the targeted key from A to B, with absolutely the same complexity.
no bro, I don't move the key without differences, as if I were using simple additions and subtractions, I reduce many bits (the beautiful thing about maths, things happen as if it were magic), my problem is that my algorithm is not perfect (yet, or so I want to believe) I have not found a way to reduce more without the need to create thousands of keys, and also that I was born in a poor country and my resources to scan that bit limit me. therefore it is not like you say that there is no difference, there are differences, only you do not know it.

I'm not dead, long story... BTC bc1qxs47ttydl8tmdv8vtygp7dy76lvayz3r6rdahu
digaran
Copper Member
Hero Member
*****
Offline Offline

Activity: 1330
Merit: 899

🖤😏


View Profile
July 31, 2023, 06:41:12 PM
 #3028

The goal is to find some key, it doesn't matter if it is invalid for the bitcoin standard, because knowing the pk of any of them will know the original pk you are looking for. If you limit your mind thinking about the parameters that satoshi imposed, you will not achieve

example: suppose you want to find an unknown key that we call Z Z= 1200 if we know that its range is between 1000:2000 if we subtract 2000 we will get -800 wow yes, an invalid key?? should i care The answer is no, because if we find the value -800, even if it represents an invalid key, we will know that the original pk is 1200.

Ok, how do you know the result is -800? And whatever the result, it's not invalid, but what if the key is 1890? You'd be searching from 700 to 800 in hopes of finding you imaginary -800, while the actual result is 110, far away from your searching range. I guess you haven't figured out a way to  validate whether your target is greater than 1500 or not, once you figure that out, you can base your future calculations on the fact that your target is greater or smaller than 1500.

E.g. if the key is 1650, multiply by 3 to get 4950, divide by 2 to get 2475, subtract your target from 2475 to get 825, which is half of your target.
Or just subtract 1 divide by 2, to name a few methods.



X=115792089237316195423570985008687907852837564279074904382605163141518161494337
Y=115792089237316195423570985008687907852837564279074904382605163141518161494336
If X represents a zero in the calculations of your library, a good mathematician would logically use Y and add 1 to the result.

Like

(Y-pk)+1


So the expert mathematician would use Y and then adds 1? I wonder about the logic in doing that, he might be crazy if he thinks that he can use a different algorithm to find secp256k1 keys faster. Are you sure this "good mathematician" knows about mod n in secp256k1 curve?
Anyways, when searching for unkown keys, doesn't matter if the keys are greater than n or not, because you don't have the pk to check, though if we use  standard implementation then we can be sure all keys are valid since they are all calculated mod n, whatever you do, public keys are always mod p, otherwise you get invalid public keys.

When we are talking about bitcoin's curve, you can NOT use different values expecting the results to work on bitcoin keys.

🖤😏
mcdouglasx
Member
**
Offline Offline

Activity: 237
Merit: 53

New ideas will be criticized and then admired.


View Profile WWW
August 01, 2023, 02:29:15 AM
 #3029

The goal is to find some key, it doesn't matter if it is invalid for the bitcoin standard, because knowing the pk of any of them will know the original pk you are looking for. If you limit your mind thinking about the parameters that satoshi imposed, you will not achieve

example: suppose you want to find an unknown key that we call Z Z= 1200 if we know that its range is between 1000:2000 if we subtract 2000 we will get -800 wow yes, an invalid key?? should i care The answer is no, because if we find the value -800, even if it represents an invalid key, we will know that the original pk is 1200.

Ok, how do you know the result is -800? And whatever the result, it's not invalid, but what if the key is 1890? You'd be searching from 700 to 800 in hopes of finding you imaginary -800, while the actual result is 110, far away from your searching range. I guess you haven't figured out a way to  validate whether your target is greater than 1500 or not, once you figure that out, you can base your future calculations on the fact that your target is greater or smaller than 1500.

E.g. if the key is 1650, multiply by 3 to get 4950, divide by 2 to get 2475, subtract your target from 2475 to get 825, which is half of your target.
Or just subtract 1 divide by 2, to name a few methods.



X=115792089237316195423570985008687907852837564279074904382605163141518161494337
Y=115792089237316195423570985008687907852837564279074904382605163141518161494336
If X represents a zero in the calculations of your library, a good mathematician would logically use Y and add 1 to the result.

Like

(Y-pk)+1


So the expert mathematician would use Y and then adds 1? I wonder about the logic in doing that, he might be crazy if he thinks that he can use a different algorithm to find secp256k1 keys faster. Are you sure this "good mathematician" knows about mod n in secp256k1 curve?
Anyways, when searching for unkown keys, doesn't matter if the keys are greater than n or not, because you don't have the pk to check, though if we use  standard implementation then we can be sure all keys are valid since they are all calculated mod n, whatever you do, public keys are always mod p, otherwise you get invalid public keys.

When we are talking about bitcoin's curve, you can NOT use different values expecting the results to work on bitcoin keys.

If you cannot understand that, you do not know about Maths, if you think that I am somehow lost in what I speak and you think the solution is in the same ECC, I will shut up, but surely you would read on me later when I publish the PK of the puzzle.
Meanwhile, suppose you are right

I'm not dead, long story... BTC bc1qxs47ttydl8tmdv8vtygp7dy76lvayz3r6rdahu
puzzle-dev
Newbie
*
Offline Offline

Activity: 10
Merit: 0


View Profile WWW
August 01, 2023, 10:54:03 AM
 #3030

An update of my "solve66" tool for puzzle #66 is available!

Code:
- improved search options
- bugfixes

Quote
WARNING:
- NEVER DOWNLOAD THIS TOOL FROM ANY OTHER SOURCE THAN THE LINK IN MY PROFILE!
- READ README.TXT FIRST BEFORE USING THIS TOOL!
sssergy2705
Copper Member
Newbie
*
Offline Offline

Activity: 188
Merit: 0


View Profile
August 01, 2023, 01:00:56 PM
 #3031

An update of my "solve66" tool for puzzle #66 is available!

Code:
- improved search options
- bugfixes

Quote
WARNING:
- NEVER DOWNLOAD THIS TOOL FROM ANY OTHER SOURCE THAN THE LINK IN MY PROFILE!
- READ README.TXT FIRST BEFORE USING THIS TOOL!


Without source code, there is no trust in your application. It is not known what kind of application you are distributing.
james5000
Jr. Member
*
Offline Offline

Activity: 69
Merit: 2


View Profile
August 02, 2023, 01:15:45 PM
 #3032

I'm developing brute force software following a slightly more coherent logic, I'll post the code soon.  Grin

support the project:  Wink
1JamesJ2H2myei94NswaBATqEsBhATENSU
digaran
Copper Member
Hero Member
*****
Offline Offline

Activity: 1330
Merit: 899

🖤😏


View Profile
August 02, 2023, 10:15:28 PM
 #3033

I'm developing brute force software following a slightly more coherent logic, I'll post the code soon.  Grin

support the project:  Wink
1JamesJ2H2myei94NswaBATqEsBhATENSU
Cool project, keeping an eye on this one!
Btw what project? 🤣 first show us what you got, then we'll talk about support, in case you haven't noticed, people are here to find money not give it away.😉

🖤😏
james5000
Jr. Member
*
Offline Offline

Activity: 69
Merit: 2


View Profile
August 02, 2023, 10:47:40 PM
 #3034

I'm developing brute force software following a slightly more coherent logic, I'll post the code soon.  Grin

support the project:  Wink
1JamesJ2H2myei94NswaBATqEsBhATENSU
Cool project, keeping an eye on this one!
Btw what project? 🤣 first show us what you got, then we'll talk about support, in case you haven't noticed, people are here to find money not give it away.😉

unfortunately by posting the code people with more knowledge will gain an advantage, so first I'll break down the 66, 67 and 68 puzzle before explaining how it works.
Ovixx
Newbie
*
Offline Offline

Activity: 22
Merit: 0


View Profile
August 03, 2023, 11:17:00 AM
 #3035

I'm developing brute force software following a slightly more coherent logic, I'll post the code soon.  Grin

support the project:  Wink
1JamesJ2H2myei94NswaBATqEsBhATENSU
Cool project, keeping an eye on this one!
Btw what project? 🤣 first show us what you got, then we'll talk about support, in case you haven't noticed, people are here to find money not give it away.😉

unfortunately by posting the code people with more knowledge will gain an advantage, so first I'll break down the 66, 67 and 68 puzzle before explaining how it works.
If you manage to solve puzzles 66, 67 and 68, what guarantees would we have that someone would see your code? If you already have the code, why do you want sponsorship? Personally, if I invest in a project, I do it on my own. If I have positive results, I will take my profit from there. So, I just wish you luck and that's it. I can't trust you and I think that most of the members on this forum would have no reason to trust you.
james5000
Jr. Member
*
Offline Offline

Activity: 69
Merit: 2


View Profile
August 03, 2023, 02:23:39 PM
 #3036

I'm developing brute force software following a slightly more coherent logic, I'll post the code soon.  Grin

support the project:  Wink
1JamesJ2H2myei94NswaBATqEsBhATENSU
Cool project, keeping an eye on this one!
Btw what project?  first show us what you got, then we'll talk about support, in case you haven't noticed, people are here to find money not give it away.

unfortunately by posting the code people with more knowledge will gain an advantage, so first I'll break down the 66, 67 and 68 puzzle before explaining how it works.
If you manage to solve puzzles 66, 67 and 68, what guarantees would we have that someone would see your code? If you already have the code, why do you want sponsorship? Personally, if I invest in a project, I do it on my own. If I have positive results, I will take my profit from there. So, I just wish you luck and that's it. I can't trust you and I think that most of the members on this forum would have no reason to trust you.
My code currently runs on the CPU, but we all know that for the next puzzles it needs to be made to run on the GPU, if anyone with CUDA knowledge is interested in splitting 50/50 we can work together.
I guarantee that with a rate of 300 Mk/s we break the 66, 67 and 68 in one week
james5000
Jr. Member
*
Offline Offline

Activity: 69
Merit: 2


View Profile
August 03, 2023, 02:33:20 PM
 #3037

Just for comparison purposes, I tested it with puzzle 30:

we know the range is 20000000:3fffffff
total of 536,870,911 possible keys

I reduced it to approximately 77,000,000 or -85.66%

based on the same calculations I suppose the 66 is reduced to about 27 trillion keys
frozenen
Newbie
*
Offline Offline

Activity: 20
Merit: 0


View Profile
August 03, 2023, 03:17:58 PM
 #3038

#66 I mean I am interested in your "software" but I don't see how these numbers are possible with just 300Mk/s even if you reduced 86% of #66
Are you able to test on #65 as I think #30 is a bit small?
The range I am searching which I have confidence in but have not shared is less than that at 1342426695300956160 out of 36893488147419107000 keys but even this is like 20 years with 3x RTX3080s so I don't understand how #66, #67 and #68 can be found in 1 week without pub key, could you share more info?
james5000
Jr. Member
*
Offline Offline

Activity: 69
Merit: 2


View Profile
August 03, 2023, 03:28:57 PM
 #3039

#66 I mean I am interested in your "software" but I don't see how these numbers are possible with just 300Mk/s even if you reduced 86% of #66
Are you able to test on #65 as I think #30 is a bit small?
The range I am searching which I have confidence in but have not shared is less than that at 1342426695300956160 out of 36893488147419107000 keys but even this is like 20 years with 3x RTX3080s so I don't understand how #66, #67 and #68 can be found in 1 week without pub key, could you share more info?


I haven't tested it on 65 because my code is still for the CPU, 65 would take a long time to confirm it works, but on a GPU up to 68 will be possible.  Undecided

Well, let's go, in the next post I will explain all the logic, if anyone wants to give support please feel free if it makes sense.  Wink
brainless
Member
**
Offline Offline

Activity: 316
Merit: 34


View Profile
August 03, 2023, 07:50:45 PM
 #3040

#66 I mean I am interested in your "software" but I don't see how these numbers are possible with just 300Mk/s even if you reduced 86% of #66
Are you able to test on #65 as I think #30 is a bit small?
The range I am searching which I have confidence in but have not shared is less than that at 1342426695300956160 out of 36893488147419107000 keys but even this is like 20 years with 3x RTX3080s so I don't understand how #66, #67 and #68 can be found in 1 week without pub key, could you share more info?


I haven't tested it on 65 because my code is still for the CPU, 65 would take a long time to confirm it works, but on a GPU up to 68 will be possible.  Undecided

Well, let's go, in the next post I will explain all the logic, if anyone wants to give support please feel free if it makes sense.  Wink
Dear friend,  based on developer community, we experience, what in developer mind, only they create for that for gpu, rest just see 1 or 2 pages back lot of basic coder still working on python at CPU level, just see their ideas, script in python back in 1 or 2 pages, albertobsd max created ecctools in c,  even he is good coder for gpu too, but not him or other gpu coder able to create basic ecc tools for gpu, don't take much aspectation for gpu coder community, let world run at python and CPU , Smiley

13sXkWqtivcMtNGQpskD78iqsgVy9hcHLF
Pages: « 1 ... 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 [152] 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 ... 250 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!