Bitcoin Forum
October 19, 2024, 01:13:44 AM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 [294] 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 »
  Print  
Author Topic: Bitcoin puzzle transaction ~32 BTC prize to who solves it  (Read 219330 times)
COBRAS
Member
**
Offline Offline

Activity: 995
Merit: 23


View Profile
September 14, 2024, 08:41:48 PM
 #5861

Seems there are 12 satoshi left to grab on the #66 address. Hurry up guys.

TX input:
Code:
1FuckUmT5yBAvozf6gT8GRQVbJ7iBDUnrH

TX outputs:
Code:
1Jvv4yWkE9MhbuwGU66666666669sugEF 0.00000001
1YouAreSoDumbLoL666666666667K5aR4 0.00000002
1WhatWereUThinking6666666662wkqq1 0.00000003
1YouDeserveNothing6666666665sbbBC 0.00000004
1YouEpicFaiLure66666666666688GSDA 0.00000005
1BitchAssLoser66666666666669dBUVg 0.00000006
1AndEveryoneELse666666666669Vnc8C 0.00000007
1ThisisALosingGame6666666667HAZdf 0.00000008
1JustGetAReaLJob666666666665vGKVD 0.00000009
1YoureWastingTimeAndMoney664CVExC 0.00000010
1AndCausingCLimateChange6666HK8Qc 0.00000011
13zb1hQbWVsc2S7ZTZnP2G4undNNpdh5so 0.00000012
1Jvv4yWkE9MhbuwGUoqFYzDjRVQHaLWuJd 0.00000013
1FK5PjPNARQmg94n2cNHTo9417kWfXUDBQ 0.00002125

I think whoever sent these sats stole the price from the real solver of puzzle 66.


Can sender of microsat know of balace move faster then others because  this microsathoshi ?


Probably we will seen transaction replace again.

[
AndrewWeb
Jr. Member
*
Offline Offline

Activity: 55
Merit: 2


View Profile
September 14, 2024, 10:53:11 PM
 #5862

I don't think anything wrong happened here.

5.94 BTC went to

bc1ql5lrt3y97djyu5k8ewmz87nnemxheycp6wdree
bc1qdplvug87leypur2a27xh64u8cu78e0td8edwv7
bc1qpa20zkg6kr55yl7gxnwh37aj8q00rt70k6q8ru

whereas 0.66 BTC (exactly 10% of the prize 6.60 BTC) went straight to Binance (for cash out ?)

Someone helped the finder with the transaction and got 10% of the prize ?
masken
Newbie
*
Offline Offline

Activity: 4
Merit: 0


View Profile
September 15, 2024, 02:29:00 AM
 #5863

https://github.com/nzengi/Dual-Vanity/blob/main/dual_vanity.py


Dual-Vanity new version v0.1

start_range = 0x40000000000000000
end_range = 0x7ffffffffffffffff


prefix = "1B"
suffix = "W9"

sample output :: C Address :: 1BxxxxxxxxxxxxxxxxxW9


Kelvin555
Newbie
*
Offline Offline

Activity: 9
Merit: 0


View Profile
September 15, 2024, 03:55:09 AM
Last edit: September 15, 2024, 04:05:13 AM by Kelvin555
 #5864

I don't think anything wrong happened here.


There were so many bots listening to that address at every moment, and not even one tried to replace the transaction ? I doubt it, if so then the person who sent those sats is mocking us..... I interpreted "you're so dumb, what were you thinking and you deserve nothing" as what were you thinking trying to send out the coins through the mempool(exposing the public key), you're so dumb, the coins have been stolen from you, you deserve nothing  OR  mocking us, what were you thinking playing a losing game, you're so dumb, you deserve nothing.



Can sender of microsat know of balace move faster then others because  this microsathoshi ?


I don't know.
COBRAS
Member
**
Offline Offline

Activity: 995
Merit: 23


View Profile
September 15, 2024, 04:07:56 AM
 #5865

https://github.com/nzengi/Dual-Vanity/blob/main/dual_vanity.py


Dual-Vanity new version v0.1

start_range = 0x40000000000000000
end_range = 0x7ffffffffffffffff


prefix = "1B"
suffix = "W9"

sample output :: C Address :: 1BxxxxxxxxxxxxxxxxxW9




thank you for the scrypt

[
COBRAS
Member
**
Offline Offline

Activity: 995
Merit: 23


View Profile
September 15, 2024, 04:10:08 AM
 #5866

vanity adresses like this , I read, what some of them more vulneranble then other.

1FuckUmT5yBAvozf6gT8GRQVbJ7iBDUnrH

because they generated not all time in 256 bit range, mach smaler

[
nomachine
Member
**
Offline Offline

Activity: 476
Merit: 35


View Profile
September 15, 2024, 10:30:09 AM
 #5867

There were so many bots listening to that address at every moment, and not even one tried to replace the transaction ? I doubt it, if so then the person who sent those sats is mocking us..... I interpreted "you're so dumb, what were you thinking and you deserve nothing" as what were you thinking trying to send out the coins through the mempool(exposing the public key), you're so dumb, the coins have been stolen from you, you deserve nothing  OR  mocking us, what were you thinking playing a losing game, you're so dumb, you deserve nothing.

I even turned off the bot, thinking that the winner would go through Mara's slipstream.

We’ll see next time if that person is mocking anyone. Next time, all my bots will be ON.

bc1qdwnxr7s08xwelpjy3cc52rrxg63xsmagv50fa8
Baskentliia
Jr. Member
*
Offline Offline

Activity: 64
Merit: 1

34Sf4DnMt3z6XKKoWmZRw2nGyfGkDgNJZZ


View Profile WWW
September 15, 2024, 11:58:13 AM
 #5868

The more private keys we have, the smaller the error would be....5% deviation on puzzle 130 is too big.

Hello, can you share the guess range or decimal number of puzzle 130

34Sf4DnMt3z6XKKoWmZRw2nGyfGkDgNJZZ
nomachine
Member
**
Offline Offline

Activity: 476
Merit: 35


View Profile
September 15, 2024, 12:53:43 PM
 #5869

The more private keys we have, the smaller the error would be....5% deviation on puzzle 130 is too big.

Hello, can you share the guess range or decimal number of puzzle 130

python3 predict.py 130
Puzzle 130 Predicted Value: 794791040024653568798270036743662075904.00

bc1qdwnxr7s08xwelpjy3cc52rrxg63xsmagv50fa8
gygy
Newbie
*
Offline Offline

Activity: 19
Merit: 0


View Profile
September 15, 2024, 01:39:08 PM
 #5870

The more private keys we have, the smaller the error would be....5% deviation on puzzle 130 is too big.

Hello, can you share the guess range or decimal number of puzzle 130

python3 predict.py 130
Puzzle 130 Predicted Value: 794791040024653568798270036743662075904.00


🔮🔮🔮
nomachine
Member
**
Offline Offline

Activity: 476
Merit: 35


View Profile
September 15, 2024, 02:09:36 PM
Last edit: September 15, 2024, 02:26:57 PM by nomachine
 #5871

🔮🔮🔮

Exactly. However, if I happen to succeed in any way, I will donate to everyone in this thread. I will definitely not send any mocking messages in addresses. Grin

bc1qdwnxr7s08xwelpjy3cc52rrxg63xsmagv50fa8
zhengxingshui123
Newbie
*
Offline Offline

Activity: 1
Merit: 0


View Profile
September 15, 2024, 06:15:54 PM
 #5872

I am a fool, and the 66 puzzle seems to have been taken away by a robot. I have no idea why this happened. Please tell me how to avoid being snatched away by robots if I crack the private key.
COBRAS
Member
**
Offline Offline

Activity: 995
Merit: 23


View Profile
September 15, 2024, 06:56:00 PM
Last edit: September 16, 2024, 08:36:57 PM by Mr. Big
 #5873

I am a fool, and the 66 puzzle seems to have been taken away by a robot. I have no idea why this happened. Please tell me how to avoid being snatched away by robots if I crack the private key.


Make a transaction fee in 5% of 1btc and more ballance, for any of ballance transfer transactions ! Robot have no so many money for fee



The more private keys we have, the smaller the error would be....5% deviation on puzzle 130 is too big.

Hello, can you share the guess range or decimal number of puzzle 130

python3 predict.py 130
Puzzle 130 Predicted Value: 794791040024653568798270036743662075904.00


why all try gake 130, but not 110 for ex ? need only 2^20 pubketxs of 2^110 crack, or make a pool for crack 2^50 keys in 2^80.
 

[
Baskentliia
Jr. Member
*
Offline Offline

Activity: 64
Merit: 1

34Sf4DnMt3z6XKKoWmZRw2nGyfGkDgNJZZ


View Profile WWW
September 15, 2024, 07:05:24 PM
 #5874

🔮🔮🔮

Exactly. However, if I happen to succeed in any way, I will donate to everyone in this thread. I will definitely not send any mocking messages in addresses. Grin


It's a 100% successful prediction, rest assured. Thank you. Puzzle 130

34Sf4DnMt3z6XKKoWmZRw2nGyfGkDgNJZZ
random3425
Newbie
*
Offline Offline

Activity: 4
Merit: 0


View Profile
September 15, 2024, 07:27:15 PM
 #5875


Hey,

hypothetically i find the key, submit tx transaction with 0.1BTC going to my address and pay fee of 6.5 BTC. How do you steal my transaction ?

Thank you!

It is a lose-lose example in my case the bot will keep increment 1sat/vB more than your or anyone else TX.

In the final round in case to reach the limit of the input balance it will append an extra input to the TX and send 100% of the puzzle address as fee.
  HuhHuhHuhHuh cant understand is worth or not to try for puzzle 67,68,69??
gygy
Newbie
*
Offline Offline

Activity: 19
Merit: 0


View Profile
September 15, 2024, 07:27:51 PM
 #5876

I am a fool, and the 66 puzzle seems to have been taken away by a robot. I have no idea why this happened. Please tell me how to avoid being snatched away by robots if I crack the private key.

Yes, unfortunately it seems it has been snatched. At least https://privatekeys.pw/puzzles/bitcoin-puzzle-tx directly states that. I don't know if they have proofs. And based on that, the original address is one of that was the target of the mocking transaction.

To avoid this you need to keep the public key (of this low range keys) in secret. Unfortunately public key is designed to be public, so it is not so easy to transact without making them public.
Option 1: Mine your own block or have a deal with a mining pool.
Option 2: Mara Slipstream. But Mara still can stole it in this case.
Kelvin555
Newbie
*
Offline Offline

Activity: 9
Merit: 0


View Profile
September 15, 2024, 07:48:56 PM
 #5877


I even turned off the bot, thinking that the winner would go through Mara's slipstream.

We’ll see next time if that person is mocking anyone. Next time, all my bots will be ON.

Me too, I thought whoever found the private key would go through Mara's slipstream, that no one would dare go through mempool directly but how wrong I was.

The thief who stole the coins must have a nice setup, it took his bot 45 seconds to replace the transaction, I assume whether he used BSGS or Kangaroo, it took 30 seconds to find the private key and the remaining 15 seconds for opening and shutting down apps.
mcdouglasx
Member
**
Offline Offline

Activity: 347
Merit: 89

New ideas will be criticized and then admired.


View Profile WWW
September 15, 2024, 10:43:59 PM
 #5878

Me too, I thought whoever found the private key would go through Mara's slipstream, that no one would dare go through mempool directly but how wrong I was.

The thief who stole the coins must have a nice setup, it took his bot 45 seconds to replace the transaction, I assume whether he used BSGS or Kangaroo, it took 30 seconds to find the private key and the remaining 15 seconds for opening and shutting down apps.

kTimesG bragged about having a very fast setup and also started precalculating tames for 66bit, 67bit... Preparations you would only need if you plan to steal the transaction sitting in the mempool.
Every other user that took part in the stealing-bot-script discussions a few pages ago is suspicious.
The thief likely active here but would never confess because of repercussions...and well he would unmask as an asshole  Roll Eyes.

Is it considered the one who uses bots as a thief? Very little ethical, yes, but they are the rules, I think RBF is poorly implemented, it should be an irrevocable choice of those who send the funds and not depend on the configuration of each node.

BTC bc1qxs47ttydl8tmdv8vtygp7dy76lvayz3r6rdahu
COBRAS
Member
**
Offline Offline

Activity: 995
Merit: 23


View Profile
September 15, 2024, 10:56:47 PM
 #5879

Me too, I thought whoever found the private key would go through Mara's slipstream, that no one would dare go through mempool directly but how wrong I was.

The thief who stole the coins must have a nice setup, it took his bot 45 seconds to replace the transaction, I assume whether he used BSGS or Kangaroo, it took 30 seconds to find the private key and the remaining 15 seconds for opening and shutting down apps.

kTimesG bragged about having a very fast setup and also started precalculating tames for 66bit, 67bit... Preparations you would only need if you plan to steal the transaction sitting in the mempool.
Every other user that took part in the stealing-bot-script discussions a few pages ago is suspicious.
The thief likely active here but would never confess because of repercussions...and well he would unmask as an asshole  Roll Eyes.

Is it considered the one who uses bots as a thief? Very little ethical, yes, but they are the rules, I think RBF is poorly implemented, it should be an irrevocable choice of those who send the funds and not depend on the configuration of each node.


jiHe is steal 66

https://bitcointalk.org/index.php?topic=5218972.msg64536611#msg64536611

[
CY4NiDE
Member
**
Offline Offline

Activity: 63
Merit: 14


View Profile
September 15, 2024, 11:30:54 PM
Last edit: September 16, 2024, 12:18:11 AM by CY4NiDE
 #5880

Me too, I thought whoever found the private key would go through Mara's slipstream, that no one would dare go through mempool directly but how wrong I was.

The thief who stole the coins must have a nice setup, it took his bot 45 seconds to replace the transaction, I assume whether he used BSGS or Kangaroo, it took 30 seconds to find the private key and the remaining 15 seconds for opening and shutting down apps.

kTimesG bragged about having a very fast setup and also started precalculating tames for 66bit, 67bit... Preparations you would only need if you plan to steal the transaction sitting in the mempool.
Every other user that took part in the stealing-bot-script discussions a few pages ago is suspicious.
The thief likely active here but would never confess because of repercussions...and well he would unmask as an asshole  Roll Eyes.

I'm tending to think it wasn't any of the usuals in this thread 'cause we all thought the solver would go through MARA. For this very reason I didn't even bother to finish developing mine.

Also, I don't think anyone would bother to precompute against 66 in this scenario as the key can be cracked in mere seconds anyways.

If that was the case it would have taken much less than 45s to replace the original tx, as once you have the key it might take less than 1 second to relay the first replacement.

I was also thinking.... What if the creator himself triggered the first attempted withdraw?

Reason: To officially embed this event in the challenge's timeline at the cost of 6.6 BTC, as now "puzzle #66" will be notoriously known to have been hijacked by a bot in the proposed scenario.

The bot scenario is now undeniably part of this puzzle's history. Am I making any sense here or am I just hitting my bong too much?  Cheesy

1CY4NiDEaNXfhZ3ndgC2M2sPnrkRhAZhmS
Pages: « 1 ... 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 [294] 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!