Geshma
Newbie
Offline
Activity: 19
Merit: 0
|
 |
January 27, 2025, 06:09:26 PM |
|
This script is a simple way to try to check for statistical patterns in the results of a hash160. Even if exact patterns are not found, relatively close matches with approximate intervals are visualized, and I suppose this is what is being explored here. Still, cryptographic hashes are designed to minimize the probability of discernible patterns. However, questioning mathematics has never been wrong; it has always been the driving force of development. As I always say, statistics are counterintuitive, so we can only observe and see where the investigation leads. import hashlib import random
def random_256(): return ''.join([random.choice('0123456789ABCDEF') for _ in range(64)])
def hripemd160(hex_str): ripemd160 = hashlib.new('ripemd160') ripemd160.update(bytes.fromhex(hex_str)) return ripemd160.hexdigest()
thashes = 0 count = 0
while True: thashes += 1 hex_256 = random_256() hash160 = hripemd160(hex_256) if hash160.startswith('1111'): count += 1 print(f"Simulated Hash256: {hex_256} -> Hash160: {hash160}") print(f"Pattern found after {thashes} hashes.") thashes = 0
if count >= 100: break
can we add hash table to the code and use DP to store pk for lookup?
|
|
|
|
|
hoanghuy2912
Newbie
Offline
Activity: 53
Merit: 0
|
 |
January 27, 2025, 06:46:10 PM |
|
Seriously, does anyone have the public key for this puzzle please let me know, I think I know the specific range close to hex of the private key
|
|
|
|
|
WanderingPhilospher
Sr. Member
  
Offline
Activity: 1428
Merit: 274
Shooters Shoot...
|
 |
January 27, 2025, 07:29:19 PM Last edit: January 29, 2025, 08:52:36 PM by Mr. Big |
|
Agreed, that's why the: min = base58.b58decode('1BY8GQbnueY11111111111111111111111').hex() max = base58.b58decode('1BY8GQbnueYzzzzzzzzzzzzzzzzzzzzzzz').hex()
Throws me off, because it doesn't take into consideration, everything. I know years ago this was a topic of discussion, not to find patterns but to base payment for vanity addresses. This was a good start (JLPs): double VanitySearch::getDiffuclty() {
double min = pow(2,160);
if (onlyFull) return min;
for (int i = 0; i < (int)usedPrefix.size(); i++) { int p = usedPrefix[i]; if (prefixes[p].items) { for (int j = 0; j < (int)prefixes[p].items->size(); j++) { if (!*((*prefixes[p].items)[j].found)) { if ((*prefixes[p].items)[j].difficulty < min) min = (*prefixes[p].items)[j].difficulty; } } } }
return min;
}
But I think the individual even broke it down even further (don't remember how or what was used). Thanks to you and ktimesg for the input!
No, it is not right. It is way under 19 decimals lol.
Look bib, I have more prefixes than you do, so don't try to educate me on "...in fact there are many wallets with similar prefixes", this has been known for years lol.
You posted a hex and wallet, and I told you which one I think may be the closest, based on what I have. I could hash away to try and find maybe the one you think is the closest to it, but I won't.
You could tell me the hex of the one you think is closest, and I can tell you if that is closer than the one I posted.
Okay, you didn't even write how many digits of decimal difference there is? Wallet: 1BY8GQbnuewAjHWYH7QSc8e3uBK6d7reZT Hex: 6F83E14DED2761731 Let's see if you can write it. Hex code. Or will you say mine is farther, closer? I hate to double post, buuuuuut I didn't want this one to get lost in the shuffle of my other post, there is one closer to 6F82ECCA251ACF143 than 6F83E14DED2761731, and I have it lol. 1BY8GQbnuec3Vp8YimiL8Bf17UfP1k23wr So did you overlook or miss this one or skip it or what?
|
|
|
|
|
abeez2000
Newbie
Offline
Activity: 1
Merit: 0
|
 |
January 27, 2025, 10:00:49 PM |
|
Hello friends, Based on what I have followed and read, I have not found any safe and guaranteed solution for withdrawing funds from any wallet whose private key has been solved. I kindly ask you, my friends, to share with us what you believe to be the best and safest way to withdraw funds and manage them later in case any puzzle is solved. It is extremely disheartening for someone to exhaust their energy, resources, and intelligence to solve a puzzle, only for their efforts to be stolen in the blink of an eye. I believe such an experience would leave someone in lifelong shock. 
|
|
|
|
|
benjaniah
Jr. Member
Offline
Activity: 52
Merit: 3
|
 |
January 27, 2025, 10:07:34 PM |
|
Anyway, this only shows further how useless it is to use the prefix as any sort of reliable attack, instead of the RIPEMD hash directly.
Could you elaborate on this? I noticed a while ago that some people were trying to solve the puzzles by collecting RIPEMD160's hashes of addresses with a certain number of prefix matches, and somehow using that information to generate areas in the puzzle keyspace to scan which (they thought) would have a higher probability of having another address with the same number of prefix matches too. Isn't that the exact same thing as using vanitysearch to find addresses with matching prefixes (i.e. 1BY8GQbnue), and taking the difference between the prefix addresses found to try and find the next/nearest address with the same prefix? Am I missing something? Is there a more efficient/faster method to search more keys in less time, besides vanitysearch with GPUs? Or is vanitysearch + GPU's already the best available option out there? Thanks.
|
|
|
|
|
|
kTimesG
|
 |
January 27, 2025, 10:38:13 PM |
|
Anyway, this only shows further how useless it is to use the prefix as any sort of reliable attack, instead of the RIPEMD hash directly.
Could you elaborate on this? What's to elaborate? You can unfortunately find addresses for which the found prefix (let's say, of length 10) do not all have the same amount of identical leading bits as the target hash. In short, this breaks any kind of statistical computations, because some prefixes match less leading bits, and some prefixes match more leading bits. On the outside (base58 view) they will all have the same 10 char prefix. Combined with the 50% chance of having any bit of any hash either a 0 or a 1, this is the explanation for bibilgin's latest mystery quiz: why some prefixes are found more often then others. And it's also just another pitfall in his theories, once the issue is actually understood. Thankfully I didn't need to burn tons of kilowatts to find this out the hard way. Every man eats his own yogurt, or whatever...
|
Off the grid, training pigeons to broadcast signed messages.
|
|
|
benjaniah
Jr. Member
Offline
Activity: 52
Merit: 3
|
 |
January 28, 2025, 12:04:28 AM |
|
Hello friends, Based on what I have followed and read, I have not found any safe and guaranteed solution for withdrawing funds from any wallet whose private key has been solved. I kindly ask you, my friends, to share with us what you believe to be the best and safest way to withdraw funds and manage them later in case any puzzle is solved. It is extremely disheartening for someone to exhaust their energy, resources, and intelligence to solve a puzzle, only for their efforts to be stolen in the blink of an eye. I believe such an experience would leave someone in lifelong shock.  This has been exhaustively discussed in the previous pages of this this forum thread, but to sum it all up: There is no guaranteed way to withdraw the funds, given that the private key is low entropy. Your best interest would be to not participate, quit while you still can, abandon ship. Would you work a job where you had to show up every day, putting in all of your energy and resources and intelligence into the job for every shift, day after day, week after week, month after month, perhaps even years, with no guarantee that when the job is actually done, that you might or might not finally get paid? Hope that answers your question. On the day that puzzle 66 was solved, bitcoin's price was $58,000. Today it's $102,000. If you want to get rich quick, just buy some bitcoin. If you want to become poor quick, keep searching for the keys to the puzzle wallets 
|
|
|
|
|
mjojo
Newbie
Offline
Activity: 79
Merit: 0
|
 |
January 28, 2025, 02:05:49 AM Last edit: January 28, 2025, 02:29:47 AM by mjojo |
|
Your idea sounds exceptional! What are you waiting for, someone to code it, too? Because we all know we can just mix up "Kangaroo software" with whatever else, and jump-scan the range like there is no tomorrow!
People confuse devs with magicians, as if anything is actually possible and we're supposed to make it happen. And when they hear it's not possible, we're the stupid ones, not their ideas. And also, the cost of breaking puzzle 160 at today's GPU hour-rates is around 1 billion dollars, so if anyone has money to burn, I don't know why it wasn't yet solved. There is no need for a new idea for it to be solved, because it can be solved today if someone really wants it to be solved. But they won't use magic, the math is already good enough, but people still think they can beat the correct math by using the wrong math. DM me if you really want your vanity kangaroo software if you don't have nothing to do with your money.
I guess I was misunderstood because I said it as an analogy for the idea. I am scanning the 67th wallet with the VanitySearch System, and I scanned the 66th wallet before. I hadn't been scanning for a long time due to my work. I came back because I discovered a few things. In fact, I only confirmed 2 things 100% among the discovered ones, I am working on the other discoveries. While scanning with VanitySearch, I saw a common point between the wallets I found. I don't want to explain this right now. When everything is finished, I will share it with some people for further development. In short, the process is as follows, when scanning in vanitysearch, it makes a few jumps when it reaches a certain wallet and continues scanning again, and when it reaches the next certain wallet, it jumps again and scans. The details are with me. Good work and good luck to everyone. lets make me clear, did you mean after your script found prefix 1BY8GQbnueY then automatically jump to the next prefix 1BY8GQbnueY? Sorry if my past question become war about prefixes in this thread.. in puzzle 66 I scanned with sequentialy and found average between prefixs 13zb1hQbWV have distance around 2,750,000,000,000,000 until 3,150,000,000,000,000. So if somebody here have tools or script to jump automatically after found prefix target maybe the chance is bigger to win reward. *edited : I scanned around 16,000,000,000,000,000 keys with sequentially
|
|
|
|
|
bibilgin
Newbie
Offline
Activity: 264
Merit: 0
|
 |
January 28, 2025, 10:09:10 AM |
|
I hate to double post, buuuuuut I didn't want this one to get lost in the shuffle of my other post, there is one closer to 6F82ECCA251ACF143 than 6F83E14DED2761731, and I have it lol.
1BY8GQbnuec3Vp8YimiL8Bf17UfP1k23wr
So did you overlook or miss this one or skip it or what?
Congratulations. It doesn't mean anything to me. Is there any proof of what you said?  Answer=No.
|
|
|
|
|
WanderingPhilospher
Sr. Member
  
Offline
Activity: 1428
Merit: 274
Shooters Shoot...
|
 |
January 28, 2025, 12:55:55 PM |
|
I hate to double post, buuuuuut I didn't want this one to get lost in the shuffle of my other post, there is one closer to 6F82ECCA251ACF143 than 6F83E14DED2761731, and I have it lol.
1BY8GQbnuec3Vp8YimiL8Bf17UfP1k23wr
So did you overlook or miss this one or skip it or what?
Congratulations. It doesn't mean anything to me. Is there any proof of what you said?  Answer=No. Finally, we agree. Prefixes found closer to another one, or at all, don't mean anything, as far as helping one find the actual address. I just hope you didn't miss it or others, using math and probabilities. If so, you might miss the address with the funds in it.
|
|
|
|
|
|
pbies
|
 |
January 28, 2025, 02:13:35 PM |
|
You can make addresses as many as you like by just encoding some bytes with base58check and changing last of them to encode another address, but this is nonsense when you don't have a private key for these addresses.
|
BTC: bc1qmrexlspd24kevspp42uvjg7sjwm8xcf9w86h5k
|
|
|
bibilgin
Newbie
Offline
Activity: 264
Merit: 0
|
 |
January 28, 2025, 02:18:35 PM |
|
Finally, we agree. Prefixes found closer to another one, or at all, don't mean anything, as far as helping one find the actual address.
I just hope you didn't miss it or others, using math and probabilities. If so, you might miss the address with the funds in it.
"Prefixes found closer to another one, or at all, don't mean anything, as far as helping one find the actual address." You say this. But Wallet: 1BY8GQbnuec3Vp8YimiL8Bf17UfP1k23wr Hex: 6F8xxxxx (You don't write this.) I hope you don't LIE about something like this after scanning that range for a few days and not finding another close HEX code. 
|
|
|
|
|
WanderingPhilospher
Sr. Member
  
Offline
Activity: 1428
Merit: 274
Shooters Shoot...
|
 |
January 28, 2025, 02:51:02 PM |
|
Finally, we agree. Prefixes found closer to another one, or at all, don't mean anything, as far as helping one find the actual address.
I just hope you didn't miss it or others, using math and probabilities. If so, you might miss the address with the funds in it.
"Prefixes found closer to another one, or at all, don't mean anything, as far as helping one find the actual address." You say this. But Wallet: 1BY8GQbnuec3Vp8YimiL8Bf17UfP1k23wr Hex: 6F8xxxxx (You don't write this.) I hope you don't LIE about something like this after scanning that range for a few days and not finding another close HEX code.  lol, I have no reason to lie. I did not scan anything, well, recently. I found it on a rig that hasn't ran the 67 challenge in a while. I finally consolidated my list and spotted that one. You can do what you will with the info. I was just informing you that there is an address closer.
|
|
|
|
|
bibilgin
Newbie
Offline
Activity: 264
Merit: 0
|
 |
January 28, 2025, 02:54:13 PM |
|
lol, I have no reason to lie.
I did not scan anything, well, recently. I found it on a rig that hasn't ran the 67 challenge in a while. I finally consolidated my list and spotted that one.
You can do what you will with the info. I was just informing you that there is an address closer.
Thank you for not giving me information = (Nothing). If you wanted me to write this, I wrote it. Now it's up to you to prove it's a LIE or TRUE. You won't be the first or the last person to say you're closer than me.  My MESSAGE to everyone ; I really don't understand most of you. You say you are doing it wrong? I say prove it. Everyone says things they have memorized. But you don't think there is a difference of opinion or that we are wrong. Everyone has calculated how many 66-67 bit, 10 or 11 lengths there are. Nobody knows the right answer. Everyone says an average PROBABILITY result. When I say something about PROBABILITY, I am declared the person who is doing it WRONG. SHA1-2, Base58-64, MD, Cyrpt etc. I know all of these, friends. But don't forget that there will be solutions.
|
|
|
|
|
Geshma
Newbie
Offline
Activity: 19
Merit: 0
|
 |
January 28, 2025, 03:04:39 PM |
|
lol, I have no reason to lie.
I did not scan anything, well, recently. I found it on a rig that hasn't ran the 67 challenge in a while. I finally consolidated my list and spotted that one.
You can do what you will with the info. I was just informing you that there is an address closer.
Thank you for not giving me information = (Nothing). If you wanted me to write this, I wrote it. Now it's up to you to prove it's a LIE or TRUE. You won't be the first or the last person to say you're closer than me.  My MESSAGE to everyone ; I really don't understand most of you. You say you are doing it wrong? I say prove it. Everyone says things they have memorized. But you don't think there is a difference of opinion or that we are wrong. Everyone has calculated how many 66-67 bit, 10 or 11 lengths there are. Nobody knows the right answer. Everyone says an average PROBABILITY result. When I say something about PROBABILITY, I am declared the person who is doing it WRONG. I know all of these, friends. But don't forget that there will be solutions. ------------------------------------------------------------ Private Key: Public Key: Address: 1BY8GQbnueYofwSuFAT3USAhArAdMsz8Qy Hash160: 739437bb3dd6d1983e66629c5f08c70e51db53af ------------------------------------------------------------ Private Key: Public Key: Address: 1BY8GQbnueYofwSuFAT3USAhFEzGfW5Jd5 Hash160: 739437bb3dd6d1983e66629c5f08c70e524f436c ------------------------------------------------------------ Private Key: Public Key: Address: 1BY8GQbnueYofwSuFAT3USAhBXaa9CSSoz Hash160: 739437bb3dd6d1983e66629c5f08c70e51ed4234 ------------------------------------------------------------ Private Key: Public Key: Address: 1BY8GQbnueYofwSuFAT3USAhBREEgoMzYo Hash160: 739437bb3dd6d1983e66629c5f08c70e51ea5e87 ------------------------------------------------------------ Private Key: Public Key: Address: 1BY8GQbnueYofwSuFAT3USAhGm5ehSbYxs Hash160: 739437bb3dd6d1983e66629c5f08c70e527757d3
|
|
|
|
|
bibilgin
Newbie
Offline
Activity: 264
Merit: 0
|
 |
January 28, 2025, 03:08:53 PM |
|
------------------------------------------------------------ Private Key: Public Key: Address: 1BY8GQbnueYofwSuFAT3USAhArAdMsz8Qy Hash160: 739437bb3dd6d1983e66629c5f08c70e51db53af ------------------------------------------------------------ Private Key: Public Key: Address: 1BY8GQbnueYofwSuFAT3USAhFEzGfW5Jd5 Hash160: 739437bb3dd6d1983e66629c5f08c70e524f436c ------------------------------------------------------------ Private Key: Public Key: Address: 1BY8GQbnueYofwSuFAT3USAhBXaa9CSSoz Hash160: 739437bb3dd6d1983e66629c5f08c70e51ed4234 ------------------------------------------------------------ Private Key: Public Key: Address: 1BY8GQbnueYofwSuFAT3USAhBREEgoMzYo Hash160: 739437bb3dd6d1983e66629c5f08c70e51ea5e87 ------------------------------------------------------------ Private Key: Public Key: Address: 1BY8GQbnueYofwSuFAT3USAhGm5ehSbYxs Hash160: 739437bb3dd6d1983e66629c5f08c70e527757d3
What are you after? Which of these is in the 67 bit range? None of them. What are you aiming for by writing this? If I told you to write the hex code, you wouldn't know.
|
|
|
|
|
|
mcdouglasx
|
 |
January 28, 2025, 03:11:56 PM |
|
I support what Bibilgin is researching because, after all, it is a technique. There are no exact patterns in the prefixes, that is correct and we all understand that, but it is still a technique. Although we all agree that a prefix could be closer to another than we think, this possibility is much smaller, due to the fact that hashes are made to have a uniform distribution. This could be seen as a foundational argument for this technique.
We all know that the longer the prefix to search for, the larger the number of subsequent jumps for find the next prefix, which is another argument that strengthens this technique.
In the end, it is just another statistical and probabilistic technique, like the birthday paradox, Kangaroo, and many others. And since for address search we only have sequential and random brute force, why would it be wrong to add another technique based on probability? Why always impose a dogmatic conduct?
|
|
|
|
|
WanderingPhilospher
Sr. Member
  
Offline
Activity: 1428
Merit: 274
Shooters Shoot...
|
 |
January 28, 2025, 03:15:53 PM |
|
Now it's up to you to prove it's a LIE or TRUE. You won't be the first or the last person to say you're closer than me. Would you like to put a wager on it? 0.1 BTC ? Also, there is no right or wrong way to search for 67...well the right way to scan is to do 100% scan. I think what some people have said to you, is that you can do what you are doing, but you more than likely, probabilisticly, you will skip over some prefixes; and one of those could be the actual address you are looking for. That's all. But you double down and talk about how your way is a sure fire way. But I know for a fact, you have missed at least one key. But I will say this, keep doing what you are doing. You will find the key or you won't. Why always impose a dogmatic conduct? I think you are missing the point, the bigger picture or what he is posting and saying and what others counter with.
|
|
|
|
|
Geshma
Newbie
Offline
Activity: 19
Merit: 0
|
 |
January 28, 2025, 03:23:13 PM |
|
------------------------------------------------------------ Private Key: Public Key: Address: 1BY8GQbnueYofwSuFAT3USAhArAdMsz8Qy Hash160: 739437bb3dd6d1983e66629c5f08c70e51db53af ------------------------------------------------------------ Private Key: Public Key: Address: 1BY8GQbnueYofwSuFAT3USAhFEzGfW5Jd5 Hash160: 739437bb3dd6d1983e66629c5f08c70e524f436c ------------------------------------------------------------ Private Key: Public Key: Address: 1BY8GQbnueYofwSuFAT3USAhBXaa9CSSoz Hash160: 739437bb3dd6d1983e66629c5f08c70e51ed4234 ------------------------------------------------------------ Private Key: Public Key: Address: 1BY8GQbnueYofwSuFAT3USAhBREEgoMzYo Hash160: 739437bb3dd6d1983e66629c5f08c70e51ea5e87 ------------------------------------------------------------ Private Key: Public Key: Address: 1BY8GQbnueYofwSuFAT3USAhGm5ehSbYxs Hash160: 739437bb3dd6d1983e66629c5f08c70e527757d3
What are you after? Which of these is in the 67 bit range? None of them. What are you aiming for by writing this? If I told you to write the hex code, you wouldn't know. so many different bit ranges can give address that resemble what you are looking for.
|
|
|
|
|
|
kTimesG
|
 |
January 28, 2025, 03:40:10 PM Last edit: January 28, 2025, 03:51:31 PM by kTimesG |
|
I support what Bibilgin is researching because, after all, it is a technique. There are no exact patterns in the prefixes, that is correct and we all understand that, but it is still a technique. Although we all agree that a prefix could be closer to another than we think, this possibility is much smaller, due to the fact that hashes are made to have a uniform distribution. This could be seen as a foundational argument for this technique.
Human intuition is wrong, and there are countless experiments that prove this. The possibility of two keys sharing the same hash exists. Period. Now, human intuition interferes and says "OK, but they can't be so close, right?". Wrong, who says that they cannot?! What is the difference between keys 42 and 43, and keys 42 and whatever other key? No difference. The keys are LABELS, not information that has any statistical relevance. The probability of whatever pair of two keys you want to pick to have an identical / semi-identical / totally different (pick whatever characteristic and whatever degree you like) is always the same, no matter how many times you repeat the test. The chances do not change just because you are doing the extractions (hashing). Just because you flipped a coin heads 100 times in a row does not mean there are greater chances to have it flip tail on the 101st flip. At most, you can pretend the coin is rigged, but you can never be sure, unless you repeat 100 flips many many times, and aach 100 sequence of flips ends up the same. That is the pattern, and if you can't get a pattern, you definitely can't get statistics to predict the future. On a very long term, and for very very large sets of data, the averages correspond to the ideal values. But in the real world (lotteries for example, or Puzzle XYZ), the averages and the predictions are only as good as how you measure them to be. By measure, I mean counting all the results, one by one. You cannot change reality based on probability, it works the other way around: the model of a phenomenon is created based on the observations. So Puzzle 67, all the lotteries in the world, etc. will piss on our human intuition that "no way number 7 was drawn 13 times in a row". You can find lots and lots of anomalies just by analyzing the data, I don't know of any better way for someone to convince themselves, since they will keep saying we're the ones being wrong.
|
Off the grid, training pigeons to broadcast signed messages.
|
|
|
|