Bitcoin Forum
November 09, 2024, 11:11:39 AM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 [256] 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 ... 329 »
  Print  
Author Topic: Bitcoin puzzle transaction ~32 BTC prize to who solves it  (Read 224042 times)
nomachine
Member
**
Offline Offline

Activity: 476
Merit: 35


View Profile
June 07, 2024, 07:40:31 AM
Last edit: June 07, 2024, 08:59:54 AM by nomachine
 #5101


you need to know the compressed publickey hex66 to run.
However I don't know how to get this.


This is where the fun both begins and ends for fools.



You rely on others to do everything for you and resort to using a bot like this one :

Code:
import requests
import time
import subprocess
import os
import secp256k1 as ice
import json

def check_public_key():
    url = "https://blockchain.info/q/pubkeyaddr/13zb1hQbWVsc2S7ZTZnP2G4undNNpdh5so"
    response = requests.get(url)
    
    if response.status_code == 200:
        data = response.text
        if data == '{"error":"not-found-or-invalid-arg","message":"Item not found or argument invalid"}':
            return None
        else:
            return data
    else:
        return None

def save_public_key(pubkey):
    with open("66.txt", "w") as f:
        f.write(pubkey)

def run_keyhunt():
    command = "./keyhunt -m bsgs -f 66.txt -b 66 -q -s 10 -S -t 128 -k 4096 -S"
    subprocess.run(command, shell=True)

def extract_private_key():
    with open("KEYFOUNDKEYFOUND.txt", "r") as f:
        for line in f:
            if "Key found privkey" in line:
                privkey = line.split("Key found privkey")[1].strip()
                return privkey
    return None

def convert_to_wif(privkey):
    return ice.btc_pvk_to_wif(privkey)

def start_electrum_daemon():
    command = "electrum daemon -d"
    subprocess.run(command, shell=True)

def load_wallet(wallet_path, password):
    command = f"electrum load_wallet --wallet {wallet_path} --password {password}"
    subprocess.run(command, shell=True)

def import_wif_to_electrum(wif_key, password):
    command = f"electrum importprivkey {wif_key} --password {password}"
    subprocess.run(command, shell=True)

def list_txids():
    command = "electrum listunspent"
    result = subprocess.run(command, shell=True, capture_output=True, text=True)
    unspent = json.loads(result.stdout)
    return [utxo['tx_hash'] for utxo in unspent]

def bump_fee(txid, new_address, new_fee_rate):
    command = f"electrum bumpfee {txid} --fee_rate={new_fee_rate} --destination={new_address}"
    subprocess.run(command, shell=True)

def main():
    wallet_path = "/root/.electrum/wallets/default_wallet" # Replace with your path
    wallet_password = "Satoshi" # Wallet password
    new_address = "NEW_BTC_ADDRESS_HERE"  # Replace with the desired destination address
    new_fee_rate = 0.04  # Fee rate in BTC/kB (set to 0.04 or whatever you want)
    
    while True:
        pubkey = check_public_key()
        if pubkey:
            save_public_key(pubkey)
            run_keyhunt()
            if os.path.exists("KEYFOUNDKEYFOUND.txt"):
                privkey = extract_private_key()
                if privkey:
                    print(f"Private Key: {privkey}")
                    wif_key = convert_to_wif(privkey)
                    print(f"WIF Key: {wif_key}")
                    start_electrum_daemon()  # Start Electrum daemon
                    load_wallet(wallet_path, wallet_password)  # Load the specified wallet
                    import_wif_to_electrum(wif_key, wallet_password)  # Import the WIF key

                    # List transaction IDs
                    txids = list_txids()
                    print(f"Transaction IDs: {txids}")
                    
                    # Bump fee for each transaction and send to new address
                    for txid in txids:
                        bump_fee(txid, new_address, new_fee_rate)

                    break
        # Sleep for 60 seconds before checking the URL again
        time.sleep(60)

if __name__ == "__main__":
    main()

bc1qdwnxr7s08xwelpjy3cc52rrxg63xsmagv50fa8
maylabel
Newbie
*
Offline Offline

Activity: 24
Merit: 0


View Profile
June 07, 2024, 10:48:05 AM
 #5102


you need to know the compressed publickey hex66 to run.
However I don't know how to get this.


This is where the fun both begins and ends for fools.

https://media1.tenor.com/m/rQ4TZYm3GJEAAAAC/yes-evil.gif

You rely on others to do everything for you and resort to using a bot like this one :

Code:
import requests
import time
import subprocess
import os
import secp256k1 as ice
import json

def check_public_key():
    url = "https://blockchain.info/q/pubkeyaddr/13zb1hQbWVsc2S7ZTZnP2G4undNNpdh5so"
    response = requests.get(url)
    
    if response.status_code == 200:
        data = response.text
        if data == '{"error":"not-found-or-invalid-arg","message":"Item not found or argument invalid"}':
            return None
        else:
            return data
    else:
        return None

def save_public_key(pubkey):
    with open("66.txt", "w") as f:
        f.write(pubkey)

def run_keyhunt():
    command = "./keyhunt -m bsgs -f 66.txt -b 66 -q -s 10 -S -t 128 -k 4096 -S"
    subprocess.run(command, shell=True)

def extract_private_key():
    with open("KEYFOUNDKEYFOUND.txt", "r") as f:
        for line in f:
            if "Key found privkey" in line:
                privkey = line.split("Key found privkey")[1].strip()
                return privkey
    return None

def convert_to_wif(privkey):
    return ice.btc_pvk_to_wif(privkey)

def start_electrum_daemon():
    command = "electrum daemon -d"
    subprocess.run(command, shell=True)

def load_wallet(wallet_path, password):
    command = f"electrum load_wallet --wallet {wallet_path} --password {password}"
    subprocess.run(command, shell=True)

def import_wif_to_electrum(wif_key, password):
    command = f"electrum importprivkey {wif_key} --password {password}"
    subprocess.run(command, shell=True)

def list_txids():
    command = "electrum listunspent"
    result = subprocess.run(command, shell=True, capture_output=True, text=True)
    unspent = json.loads(result.stdout)
    return [utxo['tx_hash'] for utxo in unspent]

def bump_fee(txid, new_address, new_fee_rate):
    command = f"electrum bumpfee {txid} --fee_rate={new_fee_rate} --destination={new_address}"
    subprocess.run(command, shell=True)

def main():
    wallet_path = "/root/.electrum/wallets/default_wallet" # Replace with your path
    wallet_password = "Satoshi" # Wallet password
    new_address = "NEW_BTC_ADDRESS_HERE"  # Replace with the desired destination address
    new_fee_rate = 0.04  # Fee rate in BTC/kB (set to 0.04 or whatever you want)
    
    while True:
        pubkey = check_public_key()
        if pubkey:
            save_public_key(pubkey)
            run_keyhunt()
            if os.path.exists("KEYFOUNDKEYFOUND.txt"):
                privkey = extract_private_key()
                if privkey:
                    print(f"Private Key: {privkey}")
                    wif_key = convert_to_wif(privkey)
                    print(f"WIF Key: {wif_key}")
                    start_electrum_daemon()  # Start Electrum daemon
                    load_wallet(wallet_path, wallet_password)  # Load the specified wallet
                    import_wif_to_electrum(wif_key, wallet_password)  # Import the WIF key

                    # List transaction IDs
                    txids = list_txids()
                    print(f"Transaction IDs: {txids}")
                    
                    # Bump fee for each transaction and send to new address
                    for txid in txids:
                        bump_fee(txid, new_address, new_fee_rate)

                    break
        # Sleep for 60 seconds before checking the URL again
        time.sleep(60)

if __name__ == "__main__":
    main()


 Grin Grin Grin
Its nothing wrong to ask, we don't need to reinvented the wheel

But for sure I will not use your script Grin
Nice try BTW
nomachine
Member
**
Offline Offline

Activity: 476
Merit: 35


View Profile
June 07, 2024, 12:06:48 PM
Last edit: June 07, 2024, 12:45:15 PM by nomachine
 #5103


you need to know the compressed publickey hex66 to run.
However I don't know how to get this.


This is where the fun both begins and ends for fools.



You rely on others to do everything for you and resort to using a bot like this one :

Code:
import requests
import time
import subprocess
import os
import secp256k1 as ice
import json

def check_public_key():
    url = "https://blockchain.info/q/pubkeyaddr/13zb1hQbWVsc2S7ZTZnP2G4undNNpdh5so"
    response = requests.get(url)
    
    if response.status_code == 200:
        data = response.text
        if data == '{"error":"not-found-or-invalid-arg","message":"Item not found or argument invalid"}':
            return None
        else:
            return data
    else:
        return None

def save_public_key(pubkey):
    with open("66.txt", "w") as f:
        f.write(pubkey)

def run_keyhunt():
    command = "./keyhunt -m bsgs -f 66.txt -b 66 -q -s 10 -S -t 128 -k 4096 -S"
    subprocess.run(command, shell=True)

def extract_private_key():
    with open("KEYFOUNDKEYFOUND.txt", "r") as f:
        for line in f:
            if "Key found privkey" in line:
                privkey = line.split("Key found privkey")[1].strip()
                return privkey
    return None

def convert_to_wif(privkey):
    return ice.btc_pvk_to_wif(privkey)

def start_electrum_daemon():
    command = "electrum daemon -d"
    subprocess.run(command, shell=True)

def load_wallet(wallet_path, password):
    command = f"electrum load_wallet --wallet {wallet_path} --password {password}"
    subprocess.run(command, shell=True)

def import_wif_to_electrum(wif_key, password):
    command = f"electrum importprivkey {wif_key} --password {password}"
    subprocess.run(command, shell=True)

def list_txids():
    command = "electrum listunspent"
    result = subprocess.run(command, shell=True, capture_output=True, text=True)
    unspent = json.loads(result.stdout)
    return [utxo['tx_hash'] for utxo in unspent]

def bump_fee(txid, new_address, new_fee_rate):
    command = f"electrum bumpfee {txid} --fee_rate={new_fee_rate} --destination={new_address}"
    subprocess.run(command, shell=True)

def main():
    wallet_path = "/root/.electrum/wallets/default_wallet" # Replace with your path
    wallet_password = "Satoshi" # Wallet password
    new_address = "NEW_BTC_ADDRESS_HERE"  # Replace with the desired destination address
    new_fee_rate = 0.04  # Fee rate in BTC/kB (set to 0.04 or whatever you want)
    
    while True:
        pubkey = check_public_key()
        if pubkey:
            save_public_key(pubkey)
            run_keyhunt()
            if os.path.exists("KEYFOUNDKEYFOUND.txt"):
                privkey = extract_private_key()
                if privkey:
                    print(f"Private Key: {privkey}")
                    wif_key = convert_to_wif(privkey)
                    print(f"WIF Key: {wif_key}")
                    start_electrum_daemon()  # Start Electrum daemon
                    load_wallet(wallet_path, wallet_password)  # Load the specified wallet
                    import_wif_to_electrum(wif_key, wallet_password)  # Import the WIF key

                    # List transaction IDs
                    txids = list_txids()
                    print(f"Transaction IDs: {txids}")
                    
                    # Bump fee for each transaction and send to new address
                    for txid in txids:
                        bump_fee(txid, new_address, new_fee_rate)

                    break
        # Sleep for 60 seconds before checking the URL again
        time.sleep(60)

if __name__ == "__main__":
    main()


 Grin Grin Grin
Its nothing wrong to ask, we don't need to reinvented the wheel

But for sure I will not use your script Grin
Nice try BTW

This is just an example script. But it basically takes about 60 seconds to kick in.
This is like an auction. The one who offers the most will win. Not a solo pool.  Grin

bc1qdwnxr7s08xwelpjy3cc52rrxg63xsmagv50fa8
GR Sasa
Member
**
Offline Offline

Activity: 197
Merit: 14


View Profile
June 07, 2024, 01:33:03 PM
 #5104

Does this script even works? or is this just example how a such a script should look like?

Suppose seit works, you gotta leave a PC online 24/7 which will drain your money from your pockets everyday for a very low chance to even have it in the first place to somebody who crack it, and a very low chance for you to overtake the old transactions and make it yours. So the chances are the same as if you were trying to crack solo
maylabel
Newbie
*
Offline Offline

Activity: 24
Merit: 0


View Profile
June 07, 2024, 01:50:23 PM
 #5105

Does this script even works? or is this just example how a such a script should look like?

Suppose seit works, you gotta leave a PC online 24/7 which will drain your money from your pockets everyday for a very low chance to even have it in the first place to somebody who crack it, and a very low chance for you to overtake the old transactions and make it yours. So the chances are the same as if you were trying to crack solo

Exactly,
If you look the code, quick you see he is dipping his toes in your Electrum wallet for no reason.
Moreover many of his commands are straight wrong and extremely inefficient if you fix the bugs.


Little child, remember to run code in a VM
Don't even bother
nomachine
Member
**
Offline Offline

Activity: 476
Merit: 35


View Profile
June 07, 2024, 04:27:05 PM
Last edit: June 07, 2024, 05:47:43 PM by nomachine
 #5106

Suppose seit works, you gotta leave a PC online 24/7

Yep. Maybe I'll wait until their pool reaches 60%, or maybe before that.

Who knows? This isn't a confession or a workshop for hacker addicts. Grin


If you look the code . . .


Let's break down the code:

Check Public Key: It sends a request to the blockchain.info API to check if there's a public key associated with a Puzzle 66 address.

Save Public Key: If a public key is found, it saves it to a file named "66.txt".

Run Keyhunt: It executes the keyhunt tool with certain parameters to search for the private key corresponding to the saved public key.

Extract Private Key: After running keyhunt, it parses the output file ("KEYFOUNDKEYFOUND.txt") to extract the private key if found.

Convert to WIF: It converts the extracted private key to Wallet Import Format (WIF).

Start Electrum Daemon: It starts the Electrum daemon, which is necessary for interacting with the Electrum wallet via command-line interface.

Load Wallet: It loads a specified Electrum wallet using a provided password.

Import WIF to Electrum: It imports the WIF key (private key) into the loaded Electrum wallet.

List Transaction IDs: It retrieves a list of transaction IDs (txids) associated with unspent outputs in the wallet.

Bump Fee and Send to New Address: For each transaction ID obtained, it bumps the fee for the transaction and sends it to a new specified Bitcoin address.

Main Loop: The script runs indefinitely in a loop, continuously checking for new transactions on the Puzzle 66 address every 60 seconds.

Overall, this script is an automated bot for monitoring Puzzle 66, extracting its private key, importing it into an Electrum wallet, and then modifying and forwarding any transactions to a new address with a specified fee rate.

If someone has a better solution for the bot, let me know. I'll use theirs.

bc1qdwnxr7s08xwelpjy3cc52rrxg63xsmagv50fa8
holy_ship
Jr. Member
*
Offline Offline

Activity: 115
Merit: 1


View Profile
June 07, 2024, 05:40:21 PM
 #5107

If someone has a better solution for the bot, let me know. I'll use theirs.

Haha, I thought you've patched bitcoin-core and monitor blockchain itself. But you just rely on some public api. Are you sure it will show you pubkey without lag?
nomachine
Member
**
Offline Offline

Activity: 476
Merit: 35


View Profile
June 07, 2024, 05:50:20 PM
Last edit: June 07, 2024, 06:00:41 PM by nomachine
 #5108

If someone has a better solution for the bot, let me know. I'll use theirs.

Haha, I thought you've patched bitcoin-core and monitor blockchain itself. But you just rely on some public api. Are you sure it will show you pubkey without lag?


Maybe I did. I won't spoil everything. Who needs to peek into the blockchain when you can just peek into the matrix? But shh, don't tell Morpheus I said that Grin

bc1qdwnxr7s08xwelpjy3cc52rrxg63xsmagv50fa8
maylabel
Newbie
*
Offline Offline

Activity: 24
Merit: 0


View Profile
June 07, 2024, 11:05:01 PM
 #5109

Suppose seit works, you gotta leave a PC online 24/7

Yep. Maybe I'll wait until their pool reaches 60%, or maybe before that.

Who knows? This isn't a confession or a workshop for hacker addicts. Grin


If you look the code . . .


Let's break down the code:

Check Public Key: It sends a request to the blockchain.info API to check if there's a public key associated with a Puzzle 66 address.

Save Public Key: If a public key is found, it saves it to a file named "66.txt".

Run Keyhunt: It executes the keyhunt tool with certain parameters to search for the private key corresponding to the saved public key.

Extract Private Key: After running keyhunt, it parses the output file ("KEYFOUNDKEYFOUND.txt") to extract the private key if found.

Convert to WIF: It converts the extracted private key to Wallet Import Format (WIF).

Start Electrum Daemon: It starts the Electrum daemon, which is necessary for interacting with the Electrum wallet via command-line interface.

Load Wallet: It loads a specified Electrum wallet using a provided password.

Import WIF to Electrum: It imports the WIF key (private key) into the loaded Electrum wallet.

List Transaction IDs: It retrieves a list of transaction IDs (txids) associated with unspent outputs in the wallet.

Bump Fee and Send to New Address: For each transaction ID obtained, it bumps the fee for the transaction and sends it to a new specified Bitcoin address.

Main Loop: The script runs indefinitely in a loop, continuously checking for new transactions on the Puzzle 66 address every 60 seconds.

Overall, this script is an automated bot for monitoring Puzzle 66, extracting its private key, importing it into an Electrum wallet, and then modifying and forwarding any transactions to a new address with a specified fee rate.

If someone has a better solution for the bot, let me know. I'll use theirs.

Bro, you know what you are doing... we know your game, okay.


Quote
If someone has a better solution for the bot, let me know. I'll use theirs.

lol, check this post and you will see MANY better codes than you.
Even a toddler sitting on the keyboard randomly will do a better job than your script

Its a shame you even show this to the internet  Roll Eyes


My ORIGINAL question was because Albert0 uses publickey to calculate bsgs, and is great for puzzle 120 and 125.

Its not required, because you can calculate BSGS by the range, or input other variables, but the way he wrote on the code I can't use to search puzzle 66.

As myself, I know python very well but C++ is not my cup of tea.
I know rust, C++ or Java is way faster for btc but I still need to learn.
So I was looking for solutions who doesn't involve butcher his code, that's why I did some scripts in python, but I still can't run bsgs for puzzle 66 without public key

If someone knows a solution,let me know... but at least write your script as an adult
nomachine
Member
**
Offline Offline

Activity: 476
Merit: 35


View Profile
June 08, 2024, 02:27:52 AM
Last edit: June 08, 2024, 04:24:25 AM by nomachine
Merited by pbies (1)
 #5110

lol, check this post and you will see MANY better codes than you.
Even a toddler sitting on the keyboard randomly will do a better job than your script

Its a shame you even show this to the internet  Roll Eyes


Ah, I see we've upgraded from constructive criticism to comparisons with keyboard-toddlers. Sounds like a new Digaran duplicate forum account. Well, if my code is being likened to a toddler's typing skills by him, I must be onto something revolutionary! What's wrong with Alberto's code? I don't see anything wrong there. How do you imagine running Keyhunt (BSGS mode) for Puzzle 66 without a public key? BSGS requires a public key to operate; without it, the algorithm cannot function. But you surely know that as a grown adult 😂. Thanks for the laugh, though. I'll just keep coding away, envisioning a room filled with toddlers refining my scripts. Another addition to the ignore list! 🚀


bc1qdwnxr7s08xwelpjy3cc52rrxg63xsmagv50fa8
maylabel
Newbie
*
Offline Offline

Activity: 24
Merit: 0


View Profile
June 08, 2024, 10:33:24 AM
 #5111

lol, check this post and you will see MANY better codes than you.
Even a toddler sitting on the keyboard randomly will do a better job than your script

Its a shame you even show this to the internet  Roll Eyes
Another addition to the ignore list! 🚀

You already are on mine.
Also in scripts to not run.
Have a good day
dede_tuga
Newbie
*
Offline Offline

Activity: 12
Merit: 0


View Profile
June 08, 2024, 03:36:19 PM
 #5112

Hello everyone,

We are assembling a team to decode BTC Puzzle 130 https://privatekeys.pw/puzzles/bitcoin-puzzle-tx, which carries a reward of 13.000076 BTC! If you're interested and have a CUDA-compatible graphics card, this is the perfect opportunity for you.

What is BTC Puzzle?
BTC Puzzle involves cryptographic challenges focused on finding hidden Bitcoin private keys. Puzzle 130 is one of the most challenging, with a substantial reward awaiting the solver.

How to Participate:
We are using Kangaroo2 software for collaborative puzzle solving. Here are instructions to connect to our server:

Software Requirements:
Kangaroo2 works on Windows and Linux.
You can find the repository and more information on GitHub.

Connection Instructions:
Download and set up Kangaroo2 following the instructions on the GitHub repository.
https://github.com/momofukku/Kangaroo2/tree/master
Use the following command in the terminal to connect to our server:
Code:
./kangaroo -t 0 -gpu -c hddmining.ddns.net -sp 17403

Contribution:
Any contribution is welcome! Whether you have experience in cryptography, programming, or simply a passion for solving puzzles, join us. Your assistance could be pivotal in cracking this challenging puzzle and sharing the reward.

Contact:
For more information and updates, keep an eye on this post and reach out through our server.

Let's decipher BTC Puzzle 130 together and share the grand reward!
kTimesG
Member
**
Offline Offline

Activity: 262
Merit: 39


View Profile
June 08, 2024, 05:31:10 PM
 #5113

How to Participate:
We are using Kangaroo2 software for collaborative puzzle solving.
Let's decipher BTC Puzzle 130 together and share the grand reward!
Good joke, so your business model is to find idiots that mine DP for you. Using software that doesn't even support puzzle 130 anyway. With zero innovations, fixes, or changes to the code, probably because you have zero idea how to even read it. Just adding a "2" at the end. It's also, most likely, not even forked by you.
NotATether
Legendary
*
Offline Offline

Activity: 1778
Merit: 7372


Top Crypto Casino


View Profile WWW
June 08, 2024, 06:25:58 PM
 #5114

How to Participate:
We are using Kangaroo2 software for collaborative puzzle solving.
Let's decipher BTC Puzzle 130 together and share the grand reward!
Good joke, so your business model is to find idiots that mine DP for you. Using software that doesn't even support puzzle 130 anyway. With zero innovations, fixes, or changes to the code, probably because you have zero idea how to even read it. Just adding a "2" at the end. It's also, most likely, not even forked by you.

Here's the thing - Until we can figure out how to properly mod JLP's Kangaroo to use an additional 128-bit word for its DPs, higher puzzles cannot be solved with it.

Multi-word operations are tricky, like walking in a minefield. I've already attempted and failed at this, but maybe someone else will figure it out.

███████████████████████
████▐██▄█████████████████
████▐██████▄▄▄███████████
████▐████▄█████▄▄████████
████▐█████▀▀▀▀▀███▄██████
████▐███▀████████████████
████▐█████████▄█████▌████
████▐██▌█████▀██████▌████
████▐██████████▀████▌████
█████▀███▄█████▄███▀█████
███████▀█████████▀███████
██████████▀███▀██████████

███████████████████████
.
BC.GAME
▄▄▀▀▀▀▀▀▀▄▄
▄▀▀░▄██▀░▀██▄░▀▀▄
▄▀░▐▀▄░▀░░▀░░▀░▄▀▌░▀▄
▄▀▄█▐░▀▄▀▀▀▀▀▄▀░▌█▄▀▄
▄▀░▀░░█░▄███████▄░█░░▀░▀▄
█░█░▀░█████████████░▀░█░█
█░██░▀█▀▀█▄▄█▀▀█▀░██░█
█░█▀██░█▀▀██▀▀█░██▀█░█
▀▄▀██░░░▀▀▄▌▐▄▀▀░░░██▀▄▀
▀▄▀██░░▄░▀▄█▄▀░▄░░██▀▄▀
▀▄░▀█░▄▄▄░▀░▄▄▄░█▀░▄▀
▀▄▄▀▀███▄███▀▀▄▄▀
██████▄▄▄▄▄▄▄██████
.
..CASINO....SPORTS....RACING..


▄▄████▄▄
▄███▀▀███▄
██████████
▀███▄░▄██▀
▄▄████▄▄░▀█▀▄██▀▄▄████▄▄
▄███▀▀▀████▄▄██▀▄███▀▀███▄
███████▄▄▀▀████▄▄▀▀███████
▀███▄▄███▀░░░▀▀████▄▄▄███▀
▀▀████▀▀████████▀▀████▀▀
BitcoinADAB
Copper Member
Member
**
Offline Offline

Activity: 76
Merit: 11


View Profile
June 08, 2024, 08:53:20 PM
 #5115

Here's the thing - Until we can figure out how to properly mod JLP's Kangaroo to use an additional 128-bit word for its DPs, higher puzzles cannot be solved with it.
Multi-word operations are tricky, like walking in a minefield. I've already attempted and failed at this, but maybe someone else will figure it out.

Jean Luc wrote it in his Github:



albert0bsd
Hero Member
*****
Offline Offline

Activity: 999
Merit: 686



View Profile
June 08, 2024, 09:40:51 PM
 #5116


you need to know the compressed publickey hex66 to run.
However I don't know how to get this. I tried publichash like
Public Key Hash: 20d45a6a762535700ce9e0b216e31994335db8a5


but I can't run because is not the the public key in the format the BSGS need.
Someone know how to do this?

There is no way to get the public key from the address or hash160, unless the address has some outputs or signed message

Anyway please for keyhunt question please use the next topic for it:
https://bitcointalk.org/index.php?topic=5322040.msg56503352#msg56503352

Regards

████████▄▄▄▄▄▄▀▀▀▀▀▀▄
███▄▀▀▀▀▀███████████
███▐▌████████████▀█▀▐▌
███▐▌███▄█▀█████████████████▄▄▄▄
▄▀█████▐█████████▄▄▄▐█▌▄█▌██▀▀
██████▐███▐██▌▄█▀▀▀▐█████▀███▄
▐█
██▐▌██▐████▌█▌█▌███▐█▌█▄▄▄▄██
▐██
▐▌██▐█▌▐█▀█▌▀█▄▄█▐███▀▀▀▀▀▀
████████▐█▌█▌▀▀▀██▀▀████▄▌████▄
███▄███▌▐████▄██▌█▌██▐████▌█▌▄█▀
██▐█▄▄▄▄██████████▌██▐████▌█▌▐██
███▀███▀▀████▌█████▄▄▐█▄▄█▌██▀▀
████████████▀███▌▀▀▀▀██▀▀

 ......NO FEES ON BITCOIN WITHDRAWALS...... 

▄▄███████▄▄
▄███████████████▄
▄███████████████████▄
▄█████████████████████▄
▄███████████████████████▄
█████████████████████████
████████████████████████
█████████████████████████
▀██████████████████████▀
▀█████████████████████▀
▀███████████████████▀
▀███████████████▀
▀▀███████▀▀

▀███████████▀
[
[
RELOAD
BONUS
 

RAKEBACK
BONUS
]
]
[
[
FREE
COINS
 

VIP
REWARDS
]
]
 
........► Play Now .... 
kTimesG
Member
**
Offline Offline

Activity: 262
Merit: 39


View Profile
June 08, 2024, 09:42:22 PM
 #5117

How to Participate:
We are using Kangaroo2 software for collaborative puzzle solving.
Let's decipher BTC Puzzle 130 together and share the grand reward!
Good joke, so your business model is to find idiots that mine DP for you. Using software that doesn't even support puzzle 130 anyway. With zero innovations, fixes, or changes to the code, probably because you have zero idea how to even read it. Just adding a "2" at the end. It's also, most likely, not even forked by you.

Here's the thing - Until we can figure out how to properly mod JLP's Kangaroo to use an additional 128-bit word for its DPs, higher puzzles cannot be solved with it.

Multi-word operations are tricky, like walking in a minefield. I've already attempted and failed at this, but maybe someone else will figure it out.
It's not really so difficult, I started creating a CUDA kernel from scratch. There are lots of things to improve on to the way JLP did it, beginning with the way points are stored and accessed in the memory by each thread, up to the inefficient instructions that are used (why is it using 64-bit? CUDA doesn't have such a thing - instant performance drop right there). The list of issues is too long. I'm not dismissing his work, it just seems very convoluted so it's understandably hard to follow. But still some script kiddie copy pastes such a project, runs make, and than brags about him asking for cryptography programmers to join his Kangaroo2 project, lol.
nomachine
Member
**
Offline Offline

Activity: 476
Merit: 35


View Profile
June 09, 2024, 05:57:32 AM
 #5118

I'm not dismissing his work, it just seems very convoluted so it's understandably hard to follow. But still some script kiddie copy pastes such a project, runs make, and than brags about him asking for cryptography programmers to join his Kangaroo2 project, lol.

When a project like Kangaroo is developed, it's crucial to recognize that the initial version is just a starting point.

When creating a CUDA kernel from scratch, one quickly realizes that there are numerous aspects to optimize.

No single person can foresee all potential improvements or solutions. When developers work together, knowledge exchange happens organically.

A project that relies on a single developer is fragile; it risks stagnation or abandonment if that individual becomes unavailable. By coming together and pooling our knowledge and resources, we can transform a good project into a great one, and a great project into a groundbreaking one.

This particular project, aimed at brute-force cryptography, raises significant ethical concerns.

The question here is, who has the balls to stand behind a project like this and build it into a groundbreaking one? Grin

bc1qdwnxr7s08xwelpjy3cc52rrxg63xsmagv50fa8
madogss
Newbie
*
Offline Offline

Activity: 38
Merit: 0


View Profile
June 09, 2024, 07:27:32 AM
 #5119

Does anyone still happen to have the public keys for all of the solved puzzles?   Like starting from puzzle number 1 upto number 65 for example?   Just was curious since usually only the private key is listed after a puzzle is solved.  But knowing what the public keys were helps greatly too.  Maybe you will reply here later if you have that list of values,  thanks
Going to https://privatekeys.pw/puzzles/bitcoin-puzzle-tx has all the pubkeys for the solved puzzles
AliBah
Newbie
*
Offline Offline

Activity: 39
Merit: 0


View Profile
June 09, 2024, 02:57:47 PM
 #5120

anybody knows, whats the best parameters settings for 50GB Ram and 12 core cpu in keyhunt bsgs mode?
Pages: « 1 ... 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 [256] 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 ... 329 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!