Bitcoin Forum
April 19, 2024, 10:42:22 PM *
News: Latest Bitcoin Core release: 26.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 [2] 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 ... 247 »
  Print  
Author Topic: Bitcoin puzzle transaction ~32 BTC prize to who solves it  (Read 183381 times)
Bulista (OP)
Member
**
Offline Offline

Activity: 168
Merit: 23


View Profile
December 28, 2015, 07:46:51 PM
 #21

-snip-
Suggestions are always welcome.

The brute force way: Start @ ~607809 (multiplied the last known value by 1.7) convert to hex, create addresses, check if one address matches the next in turn.



What would be the best tool to attack this in a brute force way while we all think on something better or discover a easier way?

Some GPU bot would be the best to brute force it, like shorena was saying.

Need to code one, but I'm not in the mood now Smiley

Anyone out there doing it? Or maybe there is something existing?

I think the best existing tool currently is yours or otherwise private. I would think the best way would be to modify (ocl)vanitygen according to BurtW's suggestion. You would need to limit the random number generator to a certain amount of bits and keep the rest.

I don't think brute force is going to solve this puzzle.

A GPU bot would increase the performance much higher but still we would be here forever trying it.

The only way to solve this efficiently is to try to find a mathematical formula to break the sequence.

If a formula is not found, I think this puzzle will be as unbreakable as bitcoin itself.
1713566542
Hero Member
*
Offline Offline

Posts: 1713566542

View Profile Personal Message (Offline)

Ignore
1713566542
Reply with quote  #2

1713566542
Report to moderator
1713566542
Hero Member
*
Offline Offline

Posts: 1713566542

View Profile Personal Message (Offline)

Ignore
1713566542
Reply with quote  #2

1713566542
Report to moderator
The forum was founded in 2009 by Satoshi and Sirius. It replaced a SourceForge forum.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1713566542
Hero Member
*
Offline Offline

Posts: 1713566542

View Profile Personal Message (Offline)

Ignore
1713566542
Reply with quote  #2

1713566542
Report to moderator
1713566542
Hero Member
*
Offline Offline

Posts: 1713566542

View Profile Personal Message (Offline)

Ignore
1713566542
Reply with quote  #2

1713566542
Report to moderator
BurtW
Legendary
*
Offline Offline

Activity: 2646
Merit: 1130

All paid signature campaigns should be banned.


View Profile WWW
December 28, 2015, 07:57:55 PM
 #22

Assuming my pattern assumption is correct then the underlying sequence was masked off to create the private keys.

Now if the underlying sequence before masking came from a cryptographically secure random number generator there is no hope of predicting the 51st private key and brute force or random chance in 51 bits is the only chance.

However if the underlying sequence was mathematically generated then maybe the keys are predictable.

Our family was terrorized by Homeland Security.  Read all about it here:  http://www.jmwagner.com/ and http://www.burtw.com/  Any donations to help us recover from the $300,000 in legal fees and forced donations to the Federal Asset Forfeiture slush fund are greatly appreciated!
unamis76
Legendary
*
Offline Offline

Activity: 1512
Merit: 1005


View Profile
December 28, 2015, 08:00:13 PM
 #23

I would think the best way would be to modify (ocl)vanitygen according to BurtW's suggestion. You would need to limit the random number generator to a certain amount of bits and keep the rest.

That would be a start. Unfortunately I do not have the set of skills needed to do that, otherwise I'd start working right away Cheesy

I don't think brute force is going to solve this puzzle.

A GPU bot would increase the performance much higher but still we would be here forever trying it.

The only way to solve this efficiently is to try to find a mathematical formula to break the sequence.

If a formula is not found, I think this puzzle will be as unbreakable as bitcoin itself.

So that means that calculating this is just as difficult as calculating a private key for a given public address? I thought this followed a fixed pattern, since some of the solutions have already been posted by you. All that's left is applying whatever you used to reach those address values.

Assuming my pattern assumption is correct then the underlying sequence was masked off to create the private keys.

Now if the underlying sequence before masking came from a cryptographically secure random number generator there is no hope of predicting the 51st private key and brute force or random chance in 51 bits is the only chance.

However if the underlying sequence was mathematically generated then maybe the keys are predictable.

So how were the results on the OP reached? Simply luck?
DannyHamilton
Legendary
*
Offline Offline

Activity: 3360
Merit: 4570



View Profile
December 28, 2015, 08:00:24 PM
 #24

I see a pattern but I do not think it will help much.

My conjecture is that the sequence number (the BTC amount) simply states the number of random bits in the private key.

Check it out:

The 0.001 BTC output used a 1 bit key (already claimed obviously)

The 0.002 BTC output used a 2 bit key

The 0.003 BTC output used a 3 bit key

etc...

The 0.019 BTC output used a 19 bit key

So I would claim the next unclaimed output uses a 51 bit key.

Interesting.

Here's a thought.  What if that is the ONLY pattern.

Consider the possibility that the person that created this "puzzle" has done so as a form of "canary in the coal mine".

The idea would be to generate a bitcoin address completely randomly, but which only uses X bits of entropy.  Then progressively store large values of bitcoins for each increase in entropy to provide an incentive for someone to try and access it.

So:
  • The only possible address with 1 bit of entropy is the address associated with the private key having binary value 1
  • There are 3 possible addresses with 2 bits of entropy.  The addresses associated with the private keys having each of the following binary values (01, 10, 11), and one of them was chosen at random (11)
  • There are 7 possible addresses with 3 bits of entropy, The addresses associated with the private keys having each of the following values (001, 010, 011, 100, 101, 110,  and 111), and one of them was chosen at random (111)
  • There are 15 possible addresses with 4 bits of entropy, and one of them was chosen at random (1000)
  • There are 31 possible addresses with 5 bits of entropy, and one of them was chosen at random (10101)
  • There are 63 possible addresses with 6 bits of entropy, and one of them was chosen at random (110001)
  • There are 127 possible addresses with 7 bits of entropy, and one of them was chosen at random (1001100)
  • and so on

By looking at which addresses have been "claimed", the creator of the "puzzle" can get a feel for the current security of version 1 bitcoin addresses.

So, if there are 50 addresses that have been "claimed", perhaps they'll avoid using any bitcoin address that has a private key with less than 51 binary digits for storing large amounts (actually, I'd probably go a bit higher than that just to be safe), and would have a feel for how secure addresses with 160 or more bits of entropy would be.

If that is what's going on here, then there may not be a "formula" or "pattern" that can be used.  To get the 51st address, you'd just have to brute force try all addresses associated with private keys between 1125899906842624 and 2251799813685248 (which is only about 1.126 X 1015 addresses).
DannyHamilton
Legendary
*
Offline Offline

Activity: 3360
Merit: 4570



View Profile
December 28, 2015, 08:03:06 PM
 #25

So how were the results on the OP reached? Simply luck?

I'm pretty sure that the results that have been found by the OP so far were found with brute force attempting every value between 1 and 220.

The problem is that finding each subsequent result requires exponentially more attempts than the current result, so as the number of bits increases it becomes much, Much, MUCH more difficult to check the entire search space.
knowhow
Hero Member
*****
Offline Offline

Activity: 560
Merit: 500


View Profile
December 28, 2015, 08:05:34 PM
 #26

Ouch what a challenge and what a great reward but the question is will be anyone able to get the answer at this point,looks that is almost impossible to know ,but well a way to estimulate genius or bring the knowhow into bitcoin world,with a good challenge.
unamis76
Legendary
*
Offline Offline

Activity: 1512
Merit: 1005


View Profile
December 28, 2015, 08:06:39 PM
 #27

Now I understand, thank you for your informative posts DannyHamilton, I think most of my doubts are no more. I guess this "puzzle" was meant to be unbroken after a certain point Smiley

At least we can now see that there are better ways to work for those 32 BTC instead of attempting to break this Cheesy
Soros Shorts
Donator
Legendary
*
Offline Offline

Activity: 1616
Merit: 1003



View Profile
December 28, 2015, 08:09:36 PM
 #28

The interesting thing is that addresses #1 - #46 were cleaned out in January 2015. Then nothing for many months. Then on Sep 1 2015 #47, #48, #49 and #50 were almost simultaneously cleaned out.
l8nit3
Legendary
*
Offline Offline

Activity: 1007
Merit: 1000


View Profile
December 28, 2015, 08:23:04 PM
 #29

The interesting thing is that addresses #1 - #46 were cleaned out in January 2015. Then nothing for many months. Then on Sep 1 2015 #47, #48, #49 and #50 were almost simultaneously cleaned out.
so does that mean someone has cracked the puzzle? and claimed all (or most) of the 32 BTC?
BurtW
Legendary
*
Offline Offline

Activity: 2646
Merit: 1130

All paid signature campaigns should be banned.


View Profile WWW
December 28, 2015, 08:30:48 PM
 #30

The interesting thing is that addresses #1 - #46 were cleaned out in January 2015. Then nothing for many months. Then on Sep 1 2015 #47, #48, #49 and #50 were almost simultaneously cleaned out.
so does that mean someone has cracked the puzzle? and claimed all (or most) of the 32 BTC?
Only 50 of the 256 addresses are claimed 31 BTC remain.

Our family was terrorized by Homeland Security.  Read all about it here:  http://www.jmwagner.com/ and http://www.burtw.com/  Any donations to help us recover from the $300,000 in legal fees and forced donations to the Federal Asset Forfeiture slush fund are greatly appreciated!
amaclin
Legendary
*
Offline Offline

Activity: 1260
Merit: 1019


View Profile
December 28, 2015, 08:31:16 PM
 #31

I posted this puzzle transaction in January'15
https://bitcointalk.org/index.php?topic=932434.0

(This tx was not sent by me)

Let me translate from Russian into English the main point in my prevoius post:

First output: take random number from 20 upto 21-1, use it as private key
Second output: take random number from 21 upto 22-1, use it as private key
Third output: take random number from 22 upto 23-1, use it as private key
And so on...
duckjuice
Newbie
*
Offline Offline

Activity: 7
Merit: 0


View Profile
December 28, 2015, 08:35:07 PM
 #32

Any info on who published this puzzle and what's their goal? Also, how would one go on about calculating those pvk decimal values and covert them to the private keys?

I don't know why but I'm smelling a big scam. Because a newbie that offer more than 12 000€ to solve a following of numbers this is strange...

The OP is not offering anything

Oh, in that case I'm sorry. I thought it was him who was offering this. So who's offering it ?

no ones offering it, its just there
Bulista (OP)
Member
**
Offline Offline

Activity: 168
Merit: 23


View Profile
December 28, 2015, 08:38:31 PM
 #33

Assuming my pattern assumption is correct then the underlying sequence was masked off to create the private keys.

Now if the underlying sequence before masking came from a cryptographically secure random number generator there is no hope of predicting the 51st private key and brute force or random chance in 51 bits is the only chance.

However if the underlying sequence was mathematically generated then maybe the keys are predictable.

Exactly.

I think the best is if we find a mathematical formula for the sequence (if it really exists).

For example, if you look at the decimal values, they seem to be always close to the double of the previous value, excluding the first few values.

So how were the results on the OP reached? Simply luck?

I'm pretty sure that the results that have been found by the OP so far were found with brute force attempting every value between 1 and 220.

The problem is that finding each subsequent result requires exponentially more attempts than the current result, so as the number of bits increases it becomes much, Much, MUCH more difficult to check the entire search space.

Exactly.

By the way, address 20:

KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rHfuE2Tg4nJW
1HsMJxNiV7TLxmoF6uJNkydxPFDog4NQum
pvk decimal value: 863317
pvk hex value: D2C55

So these are the decimal values we have:

Address 2: 3
Address 3: 7
Address 4: 8
Address 5: 21
Address 6: 49
Address 7: 76
Address 8: 224
Address 9: 467
Address 10: 514
Address 11: 1155
Address 12: 2683
Address 13: 5216
Address 14: 10544
Address 15: 26867
Address 16: 51510
Address 17: 95823
Address 18: 198669
Address 19: 357535
Address 20: 863317
Address 21: ?

-snip-
If that is what's going on here, then there may not be a "formula" or "pattern" that can be used.  To get the 51st address, you'd just have to brute force try all addresses associated with private keys between 1125899906842624 and 2251799813685248 (which is only about 1.126 X 1015 addresses).

Yes, that's a lot of brute force right there  Grin
Bulista (OP)
Member
**
Offline Offline

Activity: 168
Merit: 23


View Profile
December 28, 2015, 08:44:52 PM
 #34

I posted this puzzle transaction in January'15
https://bitcointalk.org/index.php?topic=932434.0

(This tx was not sent by me)

Let me translate from Russian into English the main point in my prevoius post:

First output: take random number from 20 upto 21-1, use it as private key
Second output: take random number from 21 upto 22-1, use it as private key
Third output: take random number from 22 upto 23-1, use it as private key
And so on...


The Russians always get it first Wink

-snip-
Code:
"1 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFU73sVHnoWn 1BgGZ9tcN4rm9KBzDn7KprQz87SZ26SAMH (1)"
"2 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFU74sHUHy8S 1CUNEBjYrCn2y1SdiUMohaKUi4wpP326Lb (3)"
"3 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFU76rnZwVdz 19ZewH8Kk1PDbSNdJ97FP4EiCjTRaZMZQA (7)"
"4 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFU77MfhviY5 1EhqbyUMvvs7BfL8goY6qcPbD6YKfPqb7e (8)"
"5 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFU7Dq8Au4Pv 1E6NuFjCi27W5zoXg8TRdcSRq84zJeBW3k (21)"
"6 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFU7Tmu6qHxS 1PitScNLyp2HCygzadCh7FveTnfmpPbfp8 (49)"
"7 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFU7hDgvu64y 1McVt1vMtCC7yn5b9wgX1833yCcLXzueeC (76)"
"8 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFU8xvGK1zpm 1M92tSqNmQLYw33fuBvjmeadirh1ysMBxK (224)"
"9 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFUB3vfDKcxZ 1CQFwcjw1dwhtkVWBttNLDtqL7ivBonGPV (467)"
"10 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFUBTL67V6dE 1LeBZP5QCwwgXRtmVUvTVrraqPUokyLHqe (514)"
"11 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFUGxXgtm63M 1PgQVLmst3Z314JrQn5TNiys8Hc38TcXJu (1155)"
"12 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFUW5RtS2JN1 1DBaumZxUkM4qMQRt2LVWyFJq5kDtSZQot (2683)"
"13 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFUspniiQZds 1Pie8JkxBT6MGPz9Nvi3fsPkr2D8q3GBc1 (5216)"
"14 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFVfZyiN5iEG 1ErZWg5cFCe4Vw5BzgfzB74VNLaXEiEkhk (10544)"
"15 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFY5iMZbuRxj 1QCbW9HWnwQWiQqVo5exhAnmfqKRrCRsvW (26867)"
"16 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFbjHrFMWzJp 1BDyrQ6WoF8VN3g9SAS1iKZcPzFfnDVieY (51510)"
"17 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFiHkRsp99uC 1HduPEXZRdG26SUT5Yk83mLkPyjnZuJ7Bm (95823)"
"18 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFyWkjT5fywW 1GnNTmTVLZiqQfLbAdp9DVdicEnB5GoERE (198669)"
"19 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rGP2jMrxCfX3 1NWmZRpHH4XSPwsW6dsS3nrNWfL1yrJj4w (357535)"
"20 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rHfuE2Tg4nJW 1HsMJxNiV7TLxmoF6uJNkydxPFDog4NQum (863317)"
"21 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rL6JJvw6XUry 14oFNXucftsHiUMY8uctg6N487riuyXs4h (1811764)"
"22 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rP9Ja2dhtxoh 1CfZWK1QTQE3eS9qn61dQjV89KDjZzfNcv (3007503)"
"23 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rVkthFNsQ6i7 1L2GM8eE7mJWLdo3HZS6su1832NX2txaac (5598802)"
"24 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rtHyNcFoApRd 1rSnXMr63jdCuegJFuidJqWxUPV7AtUf7 (14428676)"


You got all the work done right there until the #24, nicely done
Bit_Happy
Legendary
*
Offline Offline

Activity: 2100
Merit: 1040


A Great Time to Start Something!


View Profile
December 28, 2015, 08:50:52 PM
 #35

This drama cannot be created with fiat money. Huge kudos to the person who provided the challenges.

redsn0w
Legendary
*
Offline Offline

Activity: 1778
Merit: 1042


#Free market


View Profile
December 28, 2015, 08:56:45 PM
 #36

Watching this interesting thread, good luck !
morantis
Hero Member
*****
Offline Offline

Activity: 868
Merit: 503



View Profile
December 28, 2015, 08:58:04 PM
 #37

The answer to life, the universe and everything in it......
DannyHamilton
Legendary
*
Offline Offline

Activity: 3360
Merit: 4570



View Profile
December 28, 2015, 09:05:33 PM
 #38

they seem to be always close to the double of the previous value, excluding the first few values.

There may, or may not be an actual pattern to the values, but that "close to the double of the previous value" would occur if you simply chose a completely random number from a set with 1 additional binary digit at each level.

Effectively each new private key would be a number of binary digits equivalent to the number of milibitcoins stored at the address with the first digit being a 1.
ATguy
Sr. Member
****
Offline Offline

Activity: 423
Merit: 250



View Profile
December 28, 2015, 09:09:19 PM
 #39

I posted this puzzle transaction in January'15
https://bitcointalk.org/index.php?topic=932434.0



Given how long it is going on and first 50 rewards claimed already, it becomes economically unjustificable to keep brute forcing giving the number of tries you need to do going up almost exponencionally. But maybe someone still bruteforcing the 51st reward with modified oclvanityminer...

.Liqui Exchange.Trade and earn 24% / year on BTC, LTC, ETH
....Brand NEW..........................................Payouts every 24h. Learn more at official thread
Gleb Gamow
In memoriam
VIP
Legendary
*
Offline Offline

Activity: 1428
Merit: 1145



View Profile
December 28, 2015, 09:51:41 PM
 #40

Hi guys,

In continuation to this thread: https://bitcointalk.org/index.php?topic=1305887.0

While playing around with my bot, I found out this mysterious transaction:

https://blockchain.info/tx/08389f34c98c606322740c0be6a7125d9860bb8d5cb182c02f98461e5fa6cd15

those 32.896 BTC were sent to multiple addresses, all the private keys of those addresses seem to be generated by some kind of formula.

For example:

Address 2:

KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFU74sHUHy8S
1CUNEBjYrCn2y1SdiUMohaKUi4wpP326Lb
Biginteger PVK value: 3
Hex PVK value: 3

Address 3:

KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFU76rnZwVdz
19ZewH8Kk1PDbSNdJ97FP4EiCjTRaZMZQA
Biginteger PVK value: 7
Hex PVK value: 7

Address 4:

KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFU77MfhviY5
1EhqbyUMvvs7BfL8goY6qcPbD6YKfPqb7e
Biginteger PVK value: 8
Hex PVK value: 8

Address 5:

KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFU7Dq8Au4Pv
1E6NuFjCi27W5zoXg8TRdcSRq84zJeBW3k
Biginteger PVK value: 21
Hex PVK value: 15

Address 6:

KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFU7Tmu6qHxS
1PitScNLyp2HCygzadCh7FveTnfmpPbfp8
Biginteger PVK value: 49
Hex PVK value: 31

Address 7:

KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFU7hDgvu64y
1McVt1vMtCC7yn5b9wgX1833yCcLXzueeC
Biginteger PVK value: 76
Hex PVK value: 4C

Address 8:

KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFU8xvGK1zpm
1M92tSqNmQLYw33fuBvjmeadirh1ysMBxK
Biginteger PVK value: 224
Hex PVK value: E0

Address 9:

KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFUB3vfDKcxZ
1CQFwcjw1dwhtkVWBttNLDtqL7ivBonGPV
Biginteger PVK value: 467
Hex PVK value: 1d3

Address 10:

KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFUBTL67V6dE
1LeBZP5QCwwgXRtmVUvTVrraqPUokyLHqe
Biginteger PVK value: 514
Hex PVK value: 202

Address 11:

KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFUGxXgtm63M
1PgQVLmst3Z314JrQn5TNiys8Hc38TcXJu
Biginteger PVK value: 1155
Hex PVK value: 483

Address 12:

KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFUW5RtS2JN1
1DBaumZxUkM4qMQRt2LVWyFJq5kDtSZQot
Biginteger PVK value: 2683
Hex PVK value: a7b

Address 13:

KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFUspniiQZds
1Pie8JkxBT6MGPz9Nvi3fsPkr2D8q3GBc1
Biginteger PVK value: 5216
Hex PVK value: 1460

Address 14:

KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFVfZyiN5iEG
1ErZWg5cFCe4Vw5BzgfzB74VNLaXEiEkhk
Biginteger PVK value: 10544
Hex PVK value: 2930

and so on...

until the addresses 50 (1MEzite4ReNuWaL5Ds17ePKt2dCxWEofwk) it was already cracked by someone.

Any ideas what's the formula behind the generation of these addresses?

Address 2, pvk decimal value: 3
Address 3, pvk decimal value: 7
Address 4, pvk decimal value: 8
Address 5, pvk decimal value: 21
Address 6, pvk decimal value: 49
Address 7, pvk decimal value: 76
Address 8, pvk decimal value: 224
Address 9, pvk decimal value: 467
Address 10, pvk decimal value: 514
Address 11, pvk decimal value: 1155
Address 12, pvk decimal value: 2683
Address 13, pvk decimal value: 5216
Address 14, pvk decimal value: 10544
Address 15 and after, pvk decimal value: ?

The prize would be ~32 BTC Smiley

EDIT: If you find the solution feel free to leave a tip Smiley 1DPUhjHvd2K4ZkycVHEJiN6wba79j5V1u3

My guess is that the same person conducting the above is the same person who started this thread and requesting tips. Then again, it's probably just me seeing things that aren't there. HAHAHA
Pages: « 1 [2] 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 ... 247 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!