|
mcdouglasx
|
 |
November 23, 2024, 01:48:12 PM Merited by vapourminer (1) |
|
1BY8GQbnueYofwSuFAT3USAhGjPrkxDdW9 1BY8GQbnueYebq5d6CE1wDfbdAWWy33ZyW HEX:7545bf10859946eca WIF:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qbRyCkJQmfJhcqQ1bT4q
Thank you very much for this information. cctv5go Thank you for the 1BY8GQbnueY that I want to include in my own system. lets make me clear, did you mean after your script found prefix 1BY8GQbnueY then automatically jump to the next prefix 1BY8GQbnueY?
A similar example. 1BY8GQbnueY how many do you think are in our 67 bit range? 1BY8GQbnue how many do you think are in our 67 bit range? I found the answers to these in part. So I confirmed these with hardware that was not too high, but my range is still far but not as far as space.  So I guess everyone learned the answer to the question I wrote before, How many 1BY8GQbnueY starts are there in our 67 bit range? The correct answer is 4.  In puzzle #67 there are approximately 1024 keys that start with that prefix (approximately), statistically every 2**56 bits it is repeated, so if you want to find another pattern you should subtract or add 2**56 to the private key of this one and look near that result, among one of those 1024 ranges, is the desired private key (probably), then what I would do is discard the 2**56 before and after that pattern because it is unlikely to be there. this is pure statistics, but it is not crazy to try, as Einstein said " Insanity is doing the same thing over and over again and expecting different results."
|
| 2UP.io | │ | NO KYC CASINO | │ | ██████████████████████████ ████████████████████████ ████████████████████████ ████████████████████████ ████████████████████████ ████████████████████████ ████████████████████████ ████████████████████████ ████████████████████████ ████████████████████████ ████████████████████████ ████████████████████████ ██████████████████████████ | ███████████████████████████████████████████████████████████████████████████████████████ FASTEST-GROWING CRYPTO CASINO & SPORTSBOOK ███████████████████████████████████████████████████████████████████████████████████████ | ███████████████████████████ █████████████████████████ █████████████████████████ █████████████████████████ █████████████████████████ █████████████████████████ █████████████████████████ █████████████████████████ █████████████████████████ █████████████████████████ █████████████████████████ █████████████████████████ ███████████████████████████ | │ |
| │ | ...PLAY NOW... |
|
|
|
bibilgin
Newbie
Offline
Activity: 276
Merit: 0
|
 |
November 24, 2024, 06:52:49 PM Last edit: November 24, 2024, 07:16:16 PM by bibilgin |
|
In puzzle #67 there are approximately 1024 keys that start with that prefix (approximately), statistically every 2**56 bits it is repeated, so if you want to find another pattern you should subtract or add 2**56 to the private key of this one and look near that result, among one of those 1024 ranges, is the desired private key (probably), then what I would do is discard the 2**56 before and after that pattern because it is unlikely to be there.
this is pure statistics, but it is not crazy to try, as Einstein said "Insanity is doing the same thing over and over again and expecting different results."
Yes my friend, thank you for your explanation. The goal is not 1024 wallets anyway, there are 4 wallet in the target. There is already a range close to 2**56 between these ranges. But it is definitely not 2**56, there are even 2**52 in it. My target point was 4, so I used 4, but my 2 target is very far. If you ask how I determined these targets, with a very old 7-year-old excel data calculation. Example 147573952589676000000 = 7FFFFFFFFFFF9B300 147573952589676000000 / 0.5467 or 0.5468 / 2 134967946396264861898= 7510E7828155490CA 134943263158079736649 = 750B6C6E1D9664B49 no wallet will appear up to 160 bits in the calculation range above. 147573952589676000000 is an example. 68 Wallet 295147905179352000000 = FFFFFFFFFFFF36600 instead of this, 68 is definitely not in this range. 69-70-71..... none of them. Obviously I am progressing with Decimal calculation. Then I scan them with a certain numerical combination. I forgot to give another example, sorry. 13zb1hQbWc3MrSxUhXkXQCb5JVCwASfZZR Hex: 2E394A6F45691482A Decimal: 53292403858936514602 13zb1hQbWc3UCetc7A7EvAGSVxiL1QWifS Hex: 2E37B9DF452FEAFCD Decimal: 53285357088854159309 Decimal difference is 7046770082398210 - average is around 2**52-53.
|
|
|
|
|
JD-007
Newbie
Offline
Activity: 2
Merit: 0
|
 |
November 24, 2024, 08:44:43 PM |
|
I don't think anything wrong happened here.
5.94 BTC went to
bc1ql5lrt3y97djyu5k8ewmz87nnemxheycp6wdree bc1qdplvug87leypur2a27xh64u8cu78e0td8edwv7 bc1qpa20zkg6kr55yl7gxnwh37aj8q00rt70k6q8ru
whereas 0.66 BTC (exactly 10% of the prize 6.60 BTC) went straight to Binance (for cash out ?)
Someone helped the finder with the transaction and got 10% of the prize?
How did he help him with the transaction? I have been reading this thread for quite some time but I think I missed the part about BOTs where someone tries to steal the sats after when someone withdraws the BTC. Is there someone who can reply to this explanation of what really is going on? If we really find out the private key then how can we claim it safely by not getting trapped by the Bots?
|
|
|
|
|
Cricktor
Legendary
Offline
Activity: 1428
Merit: 3707
|
 |
November 24, 2024, 09:15:32 PM Merited by vapourminer (1) |
|
have been reading this thread for quite some time but I think I missed the part about BOTs where someone tries to steal the sats after when someone withdraws the BTC.
Search for slipstream.mara.com and you will find answers in this thread or the other one with 1000 BTC in the thread's title. TL;DR is, you can't safely publish the withdrawal transaction where you expose the public key when you want to claim low-entropy puzzles after you managed to find the private key. Bots will recognize your transaction, take the public key and find within seconds the private key with Kangaroo or whatever is really fast for this. They will then simply replace your withdrawal transaction with their own to their own address. Bots will compete against each other until some substantial amount of the puzzle's price will become transaction fee. Mining pools might participate in this race because they may benefit from the rising transaction fee that every Full-RBF replacement will cause. Simple answer: you can't publish the withdrawal transaction publicly, you risk loosing the replacement race and thus the puzzle's prize.
|
|
|
|
|
albert0bsd
|
 |
November 24, 2024, 09:15:46 PM Merited by vapourminer (1) |
|
How did he help him with the transaction? I have been reading this thread for quite some time but I think I missed the part about BOTs where someone tries to steal the sats after when someone withdraws the BTC. Is there someone who can reply to this explanation of what really is going on? If we really find out the private key then how can we claim it safely by not getting trapped by the Bots?
It already was explained here is the post, but basically you need to trust to the Private service of Mara slipstream. Link: https://bitcointalk.org/index.php?topic=1306983.msg64379149#msg64379149The death of the monitoring bots for the low bit challenge/puzzles such as the 66, 67, 68 bits. The sure fire way to get all of your hard earned 6.6 BTC into one of your safe wallets...or is it a sure fire way? Let me know what you think.
Ok, so here is the current, thoughtout way to beat the bots when dealing with the puzzle/challenge low bit wallets.
...
The main problem for those low entropy puzzles is the FullRBF feature of some versions of the bitcoin core, if the miners set the flag to accept TX that replace other TX without the RBF Flag
|
|
|
|
|
Cricktor
Legendary
Offline
Activity: 1428
Merit: 3707
|
 |
November 24, 2024, 09:41:00 PM |
|
~~~ Why do you write "if the miners set the flag" for their node(s) to accept Full-RBF? They would be stupid to not enable Full-RBF for them by default. Every miner has a financial incentive to have Full-RBF enabled. I can't think of a reason why any miner or mining pool won't do this. Do you have an example of a miner who doesn't?
|
|
|
|
|
albert0bsd
|
 |
November 24, 2024, 10:15:51 PM |
|
Why do you write "if the miners set the flag" for their node(s) to accept Full-RBF? They would be stupid to not enable Full-RBF for them by default. Every miner has a financial incentive to have Full-RBF enabled. I can't think of a reason why any miner or mining pool won't do this.
Do you have an example of a miner who doesn't?
From what I understand (correct me if I'm wrong), the flag is disabled by default. Miners would need to manually change the config file or something to enable it. Obviously, anyone who knows what they're doing would turn on the Full-RBF feature. That's not really the point here, though. I'm not trying to start a debate about whether miners would set the flag of course they would. It was just a way of write it, so sorry if it sounded dumb or confusing. Maybe it's just how it came out in my head since English isn’t my first language.
|
|
|
|
|
sneeky777
Newbie
Offline
Activity: 21
Merit: 1
|
 |
November 25, 2024, 01:34:38 AM Merited by vapourminer (1) |
|
I don't think anything wrong happened here.
5.94 BTC went to
bc1ql5lrt3y97djyu5k8ewmz87nnemxheycp6wdree bc1qdplvug87leypur2a27xh64u8cu78e0td8edwv7 bc1qpa20zkg6kr55yl7gxnwh37aj8q00rt70k6q8ru
whereas 0.66 BTC (exactly 10% of the prize 6.60 BTC) went straight to Binance (for cash out ?)
Someone helped the finder with the transaction and got 10% of the prize?
How did he help him with the transaction? I have been reading this thread for quite some time but I think I missed the part about BOTs where someone tries to steal the sats after when someone withdraws the BTC. Is there someone who can reply to this explanation of what really is going on? If we really find out the private key then how can we claim it safely by not getting trapped by the Bots? I've thought about it and I think we shouldn't want to win everything. If I have to pay 5 BTC in commission to win just 1, so be it. At least if I don't win the BOT will lose more than 5  But if the bot gets the private key in seconds, why isn't Puzzle 135, 140 etc solved? The bots belong to the owner of the puzzle..I think because it has the private keys to all puzzle  Once the public key of any puzzle up to say around 90-100 ish is out there kangaroo will solve it in minutes. It will not solve anything higher in minutes or even hours unless you're very very lucky. People had been going at it for years for 120 and up. The bots are run from users on this forum believe it or not. One user on this forum in particular has the fastest bot in the world apparently i wont name them but just think about how the bots works and search this forum you will see for yourself. Also mara is apparently the place to go to make a TX without broadcasting the public key. There's a guide to it in this thread. someone in this thread done a test and it worked. However that was with like $50 or so. All the answers are in this thread.
|
|
|
|
|
JD-007
Newbie
Offline
Activity: 2
Merit: 0
|
 |
November 25, 2024, 07:49:26 AM |
|
How did he help him with the transaction? I have been reading this thread for quite some time but I think I missed the part about BOTs where someone tries to steal the sats after when someone withdraws the BTC. Is there someone who can reply to this explanation of what really is going on? If we really find out the private key then how can we claim it safely by not getting trapped by the Bots?
It already was explained here is the post, but basically you need to trust to the Private service of Mara slipstream. Link: https://bitcointalk.org/index.php?topic=1306983.msg64379149#msg64379149The death of the monitoring bots for the low bit challenge/puzzles such as the 66, 67, 68 bits. The sure fire way to get all of your hard earned 6.6 BTC into one of your safe wallets...or is it a sure fire way? Let me know what you think.
Ok, so here is the current, thoughtout way to beat the bots when dealing with the puzzle/challenge low bit wallets.
...
The main problem for those low entropy puzzles is the FullRBF feature of some versions of the bitcoin core, if the miners set the flag to accept TX that replace other TX without the RBF Flag Thank You all for your responses, I will look into this deeply before I start working on it. Maybe we have to create another bot to compete with it as well, hehe For what it's worth, Learning is Earning for me in the first place.
|
|
|
|
|
themathematician
Newbie
Offline
Activity: 1
Merit: 0
|
 |
November 25, 2024, 10:14:08 PM |
|
Hey guys, am new in bitcoin and i discovered this puzzle about a month ago. Why are you guys brute forcing big numbers just wasting time, for me it just took me a month and now i already cracked 140, 145 150 155 and 160 by using maths, so you say no one have discoverd the math behind bitcoin public keys?
|
|
|
|
|
|
albert0bsd
|
 |
November 25, 2024, 10:28:10 PM Merited by vapourminer (1) |
|
Hey guys, am new in bitcoin and i discovered this puzzle about a month ago. Why are you guys brute forcing big numbers just wasting time, for me it just took me a month and now i already cracked 140, 145 150 155 and 160 by using maths, so you say no one have discoverd the math behind bitcoin public keys?
It is easy to prove that you have the keys just by publishing a Signed text message that anyone can validate. So if you said that you solve these and you want that the users here believe you then you just need to publish such signatures. Just like RetiredCoder did: Address: 1PXAyUB8ZoH3WD8n5zoAthYjN15yN5CVq5 Message: RetiredCoder is a winner for 120,125,130 Signature: ILsD3ydVDKulUbTykvnPl8RNwPeBKqw58rv+ftq0HRxbWyzIbgl29Wup6uTahQ7xkKUG/LAUJLF8xcBxc2FDUU8=
Address: 1Fo65aKq8s8iquMt6weF1rku1moWVEd5Ua Message: RetiredCoder is a winner for 120,125,130 Signature: IN6XCSv7fAIUioJ7T4ti2x4YmnOcd4FXmd9eb7Na6IofP0+ji8uxdhVEb6vG++vO77t9BS7KnOE2s6Sme38NT0I=
A lot of people here knows the math behind the ECDSA and right know the 2 best algorithms that we have to solve this have a complexity of Square root of N aka (meet me in the middle) [1] - Baby step giant step - Kangaroo (This one is the best because it don't have the memory limitation)
[1] https://andrea.corbellini.name/2015/06/08/elliptic-curve-cryptography-breaking-security-and-a-comparison-with-rsa/
|
|
|
|
|
Cricktor
Legendary
Offline
Activity: 1428
Merit: 3707
|
 |
November 25, 2024, 11:17:20 PM |
|
~~~ Very nice of you that you leave #135 for us puny plebs. Interesting though, none of the coins from #140, #145, #150, #155 and #160 have moved so far or am I only blinded by the overwhelming excellence of your pure math mind? Impressive... your achievement within only one month, show proof... I'm confused... As albert0bsd said, sign messages or STFU!
|
|
|
|
COBRAS
Member

Offline
Activity: 1136
Merit: 25
|
 |
November 25, 2024, 11:23:21 PM |
|
Hey guys, am new in bitcoin and i discovered this puzzle about a month ago. Why are you guys brute forcing big numbers just wasting time, for me it just took me a month and now i already cracked 140, 145 150 155 and 160 by using maths, so you say no one have discoverd the math behind bitcoin public keys?
Try, all math especially move from biger range to smaller with more many pubkeys etc. No profit math in bitcoin bruteforce. Kangaroo description provide RogueCodee , JLP not say how select DP, without knowing how select DP right, you only spend time nothing also. If money interested, I think most profit is a join to private btc mining pool.
|
[
|
|
|
Kelvin555
Jr. Member
Offline
Activity: 63
Merit: 1
|
 |
November 28, 2024, 05:24:02 AM |
|
If money interested, I think most profit is a join to private btc mining pool.
I sent you a message.
|
|
|
|
|
benjaniah
Jr. Member
Offline
Activity: 54
Merit: 3
|
 |
November 28, 2024, 09:08:40 AM |
|
Not here trying to toot my own horn... I'm the one that first found 1BY8GQbnueYebq5d6CE1wDfbdAWWy33ZyW, sent it some change, and then sent that change to 67. If someone here is the one that gets 67 and you used the starting point I found and shared with you all, be cool and throw a coin my way, will ya? txid that first funded 1BY8GQbnueYebq5d6CE1wDfbdAWWy33ZyW: https://mempool.space/tx/cff866f5a1eb771a5886535e4722a9361faf7a912791671a191f825228597a6aAddress: 1CgcibFXFiT2SuY4XiDvGZbUA8wJJagjb3 Message: I found 1BY8GQbnueYebq5d6CE1wDfbdAWWy33ZyW. Signature: H4sY61XNuImEueQnrhKNxkaeLG3EUHdUq0QdNpwwU9UWfnwBL8QqikbdX0zz2zG696pBOvTvIjIkYtY BFi2cVNI= Amongst the chatter in various Russian speaking Telegram groups, it looks like several 1BY8GQbnueY prefixes have possibly been found, but I haven't been able to verify any of them. Could be real, or not, but my hunch is that they're fake/disinfo. But I'm no longer monitoring those channels for updates, nor searching for 67, I've dropped out of the race... Thanks everyone and good luck out there.
|
|
|
|
|
2008TOKi
Newbie
Offline
Activity: 6
Merit: 0
|
 |
November 28, 2024, 02:13:56 PM |
|
This puzzle made me lose my sense of reality
|
|
|
|
|
vneos
Jr. Member
Offline
Activity: 40
Merit: 12
|
 |
November 29, 2024, 05:54:11 AM |
|
Not here trying to toot my own horn... I'm the one that first found 1BY8GQbnueYebq5d6CE1wDfbdAWWy33ZyW, sent it some change, and then sent that change to 67. If someone here is the one that gets 67 and you used the starting point I found and shared with you all, be cool and throw a coin my way, will ya? txid that first funded 1BY8GQbnueYebq5d6CE1wDfbdAWWy33ZyW: https://mempool.space/tx/cff866f5a1eb771a5886535e4722a9361faf7a912791671a191f825228597a6aAddress: 1CgcibFXFiT2SuY4XiDvGZbUA8wJJagjb3 Message: I found 1BY8GQbnueYebq5d6CE1wDfbdAWWy33ZyW. Signature: H4sY61XNuImEueQnrhKNxkaeLG3EUHdUq0QdNpwwU9UWfnwBL8QqikbdX0zz2zG696pBOvTvIjIkYtY BFi2cVNI= Amongst the chatter in various Russian speaking Telegram groups, it looks like several 1BY8GQbnueY prefixes have possibly been found, but I haven't been able to verify any of them. Could be real, or not, but my hunch is that they're fake/disinfo. But I'm no longer monitoring those channels for updates, nor searching for 67, I've dropped out of the race... Thanks everyone and good luck out there. 7545BF10859946ECA So what's the point? It's just a coincidence in 67.
|
|
|
|
|
Dimas2024
Newbie
Offline
Activity: 5
Merit: 0
|
 |
November 29, 2024, 08:55:04 AM |
|
Not here trying to toot my own horn... I'm the one that first found 1BY8GQbnueYebq5d6CE1wDfbdAWWy33ZyW, sent it some change, and then sent that change to 67. If someone here is the one that gets 67 and you used the starting point I found and shared with you all, be cool and throw a coin my way, will ya? txid that first funded 1BY8GQbnueYebq5d6CE1wDfbdAWWy33ZyW: https://mempool.space/tx/cff866f5a1eb771a5886535e4722a9361faf7a912791671a191f825228597a6aAddress: 1CgcibFXFiT2SuY4XiDvGZbUA8wJJagjb3 Message: I found 1BY8GQbnueYebq5d6CE1wDfbdAWWy33ZyW. Signature: H4sY61XNuImEueQnrhKNxkaeLG3EUHdUq0QdNpwwU9UWfnwBL8QqikbdX0zz2zG696pBOvTvIjIkYtY BFi2cVNI= Amongst the chatter in various Russian speaking Telegram groups, it looks like several 1BY8GQbnueY prefixes have possibly been found, but I haven't been able to verify any of them. Could be real, or not, but my hunch is that they're fake/disinfo. But I'm no longer monitoring those channels for updates, nor searching for 67, I've dropped out of the race... Thanks everyone and good luck out there. Tell me, what program do you use to find a pattern in low ranges, and where can I download such a program?
|
|
|
|
|
bibilgin
Newbie
Offline
Activity: 276
Merit: 0
|
 |
November 29, 2024, 12:33:24 PM |
|
Not here trying to toot my own horn... I'm the one that first found 1BY8GQbnueYebq5d6CE1wDfbdAWWy33ZyW, sent it some change, and then sent that change to 67. If someone here is the one that gets 67 and you used the starting point I found and shared with you all, be cool and throw a coin my way, will ya? txid that first funded 1BY8GQbnueYebq5d6CE1wDfbdAWWy33ZyW: https://mempool.space/tx/cff866f5a1eb771a5886535e4722a9361faf7a912791671a191f825228597a6aAddress: 1CgcibFXFiT2SuY4XiDvGZbUA8wJJagjb3 Message: I found 1BY8GQbnueYebq5d6CE1wDfbdAWWy33ZyW. Signature: H4sY61XNuImEueQnrhKNxkaeLG3EUHdUq0QdNpwwU9UWfnwBL8QqikbdX0zz2zG696pBOvTvIjIkYtY BFi2cVNI= Amongst the chatter in various Russian speaking Telegram groups, it looks like several 1BY8GQbnueY prefixes have possibly been found, but I haven't been able to verify any of them. Could be real, or not, but my hunch is that they're fake/disinfo. But I'm no longer monitoring those channels for updates, nor searching for 67, I've dropped out of the race... Thanks everyone and good luck out there. Yes my friend, Apparently, 1BY8GQbnueYebq5d6CE1wDfbdAWWy33ZyW is this wallet, the hex code is 7545BF10859946ECA you discovered it. Therefore, if it is found by me, the first gift will be sent to you. Then, since cctvgo5 was the first to report, it will be sent to him as well. For each hex code with another prefix, more gifts will be given. Thank you for the information.
|
|
|
|
|
vneos
Jr. Member
Offline
Activity: 40
Merit: 12
|
 |
November 29, 2024, 05:03:26 PM |
|
I have a question: If the 66 bit original outgoing transaction 8c8ec6b3511c62500ea9b3a1c30ca937e15d251b55d30290a2a6da2f1124f3fb includes addresses other than 13zb1hQbWVsc2S7ZTZnP2G4undNNpdh5so, can the transaction still be replaced?
For example: If the outgoing addresses include not only 13zb1hQbWVsc2S7ZTZnP2G4undNNpdh5so but also a new address 1KDwiguXGo4JFJoHA3azAHx4Neqkr76kKs with an outgoing amount of 10,000 satoshis, and the attacker does not possess the private key for 1KDwiguXGo4JFJoHA3azAHx4Neqkr76kKs, can the transaction originating from 13zb1hQbWVsc2S7ZTZnP2G4undNNpdh5so still be replaced?
|
|
|
|
|
|