Bitcoin Forum
March 07, 2026, 02:38:03 PM *
News: Latest Bitcoin Core release: 30.2 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 [339] 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 ... 638 »
  Print  
Author Topic: Bitcoin puzzle transaction ~32 BTC prize to who solves it  (Read 372397 times)
mcdouglasx
Hero Member
*****
Offline Offline

Activity: 938
Merit: 522



View Profile WWW
November 23, 2024, 01:48:12 PM
Merited by vapourminer (1)
 #6761

1BY8GQbnueYofwSuFAT3USAhGjPrkxDdW9
1BY8GQbnueYebq5d6CE1wDfbdAWWy33ZyW
HEX:7545bf10859946eca
WIF:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qbRyCkJQmfJhcqQ1bT4q

Thank you very much for this information. cctv5go

Thank you for the 1BY8GQbnueY that I want to include in my own system.


Quote

lets make me clear, did you mean after your script found prefix 1BY8GQbnueY then automatically jump to the next prefix 1BY8GQbnueY?

A similar example.

1BY8GQbnueY how many do you think are in our 67 bit range?
1BY8GQbnue how many do you think are in our 67 bit range?

I found the answers to these in part.

So I confirmed these with hardware that was not too high, but my range is still far but not as far as space. Smiley

So I guess everyone learned the answer to the question I wrote before,
How many 1BY8GQbnueY starts are there in our 67 bit range? The correct answer is 4. Wink
In puzzle #67 there are approximately 1024 keys that start with that prefix (approximately), statistically every 2**56 bits it is repeated, so if you want to find another pattern you should subtract or add 2**56 to the private key of this one and look near that result, among one of those 1024 ranges, is the desired private key (probably), then what I would do is discard the 2**56 before and after that pattern because it is unlikely to be there.

this is pure statistics, but it is not crazy to try, as Einstein said "Insanity is doing the same thing over and over again and expecting different results."

█████████████████████████
█████████████████████████
███████▀█████████▀███████
█████████████████████████
█████████████████████████
████████████▀████████████
███████▀███████▄███████
███████████▄▄▄███████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████

 2UP.io 
NO KYC
CASINO
██████████████████████████
████████████████████████
███████████████████████
███████████████████
██████████████████████
███████████████████████
███████████████████████
██████████████████
███████████████████████
██████████████████
███████████████████████
████████████████████████
██████████████████████████
███████████████████████████████████████████████████████████████████████████████████████
 
FASTEST-GROWING CRYPTO
CASINO & SPORTSBOOK

 

███████████████████████████████████████████████████████████████████████████████████████
███████████████████████████
█████████████████████████
███████████████████████
███████████████████████
████████████████████████
███████████████████████
███████████████████████
██████████████████████
████████████████████████
███████████████████████
███████████████████████
█████████████████████████
███████████████████████████
 

...PLAY NOW...
bibilgin
Newbie
*
Offline Offline

Activity: 276
Merit: 0


View Profile
November 24, 2024, 06:52:49 PM
Last edit: November 24, 2024, 07:16:16 PM by bibilgin
 #6762

Quote
In puzzle #67 there are approximately 1024 keys that start with that prefix (approximately), statistically every 2**56 bits it is repeated, so if you want to find another pattern you should subtract or add 2**56 to the private key of this one and look near that result, among one of those 1024 ranges, is the desired private key (probably), then what I would do is discard the 2**56 before and after that pattern because it is unlikely to be there.

this is pure statistics, but it is not crazy to try, as Einstein said "Insanity is doing the same thing over and over again and expecting different results."


Yes my friend, thank you for your explanation.

The goal is not 1024 wallets anyway, there are 4 wallet in the target.
There is already a range close to 2**56 between these ranges.
But it is definitely not 2**56, there are even 2**52 in it.

My target point was 4, so I used 4, but my 2 target is very far. If you ask how I determined these targets, with a very old 7-year-old excel data calculation.

Example

147573952589676000000 = 7FFFFFFFFFFF9B300

147573952589676000000 / 0.5467 or 0.5468 / 2
134967946396264861898= 7510E7828155490CA
134943263158079736649 = 750B6C6E1D9664B49


no wallet will appear up to 160 bits in the calculation range above. 147573952589676000000 is an example.

68 Wallet
295147905179352000000 = FFFFFFFFFFFF36600 instead of this, 68 is definitely not in this range. 69-70-71..... none of them.

Obviously I am progressing with Decimal calculation. Then I scan them with a certain numerical combination.

I forgot to give another example, sorry.

13zb1hQbWc3MrSxUhXkXQCb5JVCwASfZZR
Hex: 2E394A6F45691482A
Decimal: 53292403858936514602

13zb1hQbWc3UCetc7A7EvAGSVxiL1QWifS
Hex: 2E37B9DF452FEAFCD
Decimal: 53285357088854159309

Decimal difference is 7046770082398210 - average is around 2**52-53.
JD-007
Newbie
*
Offline Offline

Activity: 2
Merit: 0


View Profile
November 24, 2024, 08:44:43 PM
 #6763

I don't think anything wrong happened here.

5.94 BTC went to

bc1ql5lrt3y97djyu5k8ewmz87nnemxheycp6wdree
bc1qdplvug87leypur2a27xh64u8cu78e0td8edwv7
bc1qpa20zkg6kr55yl7gxnwh37aj8q00rt70k6q8ru

whereas 0.66 BTC (exactly 10% of the prize 6.60 BTC) went straight to Binance (for cash out ?)

Someone helped the finder with the transaction and got 10% of the prize?


How did he help him with the transaction? I have been reading this thread for quite some time but I think I missed the part about BOTs where someone tries to steal the sats after when someone withdraws the BTC.   Is there someone who can reply to this explanation of what really is going on?  If we really find out the private key then how can we claim it safely by not getting trapped by the Bots?
Cricktor
Legendary
*
Offline Offline

Activity: 1428
Merit: 3707



View Profile
November 24, 2024, 09:15:32 PM
Merited by vapourminer (1)
 #6764

have been reading this thread for quite some time but I think I missed the part about BOTs where someone tries to steal the sats after when someone withdraws the BTC.
Search for slipstream.mara.com and you will find answers in this thread or the other one with 1000 BTC in the thread's title.

TL;DR is, you can't safely publish the withdrawal transaction where you expose the public key when you want to claim low-entropy puzzles after you managed to find the private key.

Bots will recognize your transaction, take the public key and find within seconds the private key with Kangaroo or whatever is really fast for this. They will then simply replace your withdrawal transaction with their own to their own address. Bots will compete against each other until some substantial amount of the puzzle's price will become transaction fee. Mining pools might participate in this race because they may benefit from the rising transaction fee that every Full-RBF replacement will cause.

Simple answer: you can't publish the withdrawal transaction publicly, you risk loosing the replacement race and thus the puzzle's prize.

███████████████████████████
███████▄████████████▄██████
████████▄████████▄████████
███▀█████▀▄███▄▀█████▀███
█████▀█▀▄██▀▀▀██▄▀█▀█████
███████▄███████████▄███████
███████████████████████████
███████▀███████████▀███████
████▄██▄▀██▄▄▄██▀▄██▄████
████▄████▄▀███▀▄████▄████
██▄███▀▀█▀██████▀█▀███▄███
██▀█▀████████████████▀█▀███
███████████████████████████
.
.Duelbits PREDICT..
█████████████████████████
█████████████████████████
███████████▀▀░░░░▀▀██████
██████████░░▄████▄░░████
█████████░░████████░░████
█████████░░████████░░████
█████████▄▀██████▀▄████
████████▀▀░░░▀▀▀▀░░▄█████
██████▀░░░░██▄▄▄▄████████
████▀░░░░▄███████████████
█████▄▄█████████████████
█████████████████████████
█████████████████████████
.
.WHERE EVERYTHING IS A MARKET..
█████
██
██







██
██
██████
Will Bitcoin hit $200,000
before January 1st 2027?

    No @1.15         Yes @6.00    
█████
██
██







██
██
██████

  CHECK MORE > 
albert0bsd
Hero Member
*****
Offline Offline

Activity: 1120
Merit: 718



View Profile
November 24, 2024, 09:15:46 PM
Merited by vapourminer (1)
 #6765

How did he help him with the transaction? I have been reading this thread for quite some time but I think I missed the part about BOTs where someone tries to steal the sats after when someone withdraws the BTC.   Is there someone who can reply to this explanation of what really is going on?  If we really find out the private key then how can we claim it safely by not getting trapped by the Bots?

It already was explained here is the post, but basically you need to trust to the Private service of Mara slipstream.

Link: https://bitcointalk.org/index.php?topic=1306983.msg64379149#msg64379149

The death of the monitoring bots for the low bit challenge/puzzles such as the 66, 67, 68 bits.
The sure fire way to get all of your hard earned 6.6 BTC into one of your safe wallets...or is it a sure fire way?
Let me know what you think.

Ok, so here is the current, thoughtout way to beat the bots when dealing with the puzzle/challenge low bit wallets.

...

The main problem for those low entropy puzzles is the FullRBF feature of some versions of the bitcoin core, if the miners set the flag to accept TX that replace other TX without the RBF Flag

Cricktor
Legendary
*
Offline Offline

Activity: 1428
Merit: 3707



View Profile
November 24, 2024, 09:41:00 PM
 #6766

~~~
Why do you write "if the miners set the flag" for their node(s) to accept Full-RBF? They would be stupid to not enable Full-RBF for them by default. Every miner has a financial incentive to have Full-RBF enabled. I can't think of a reason why any miner or mining pool won't do this.

Do you have an example of a miner who doesn't?

███████████████████████████
███████▄████████████▄██████
████████▄████████▄████████
███▀█████▀▄███▄▀█████▀███
█████▀█▀▄██▀▀▀██▄▀█▀█████
███████▄███████████▄███████
███████████████████████████
███████▀███████████▀███████
████▄██▄▀██▄▄▄██▀▄██▄████
████▄████▄▀███▀▄████▄████
██▄███▀▀█▀██████▀█▀███▄███
██▀█▀████████████████▀█▀███
███████████████████████████
.
.Duelbits PREDICT..
█████████████████████████
█████████████████████████
███████████▀▀░░░░▀▀██████
██████████░░▄████▄░░████
█████████░░████████░░████
█████████░░████████░░████
█████████▄▀██████▀▄████
████████▀▀░░░▀▀▀▀░░▄█████
██████▀░░░░██▄▄▄▄████████
████▀░░░░▄███████████████
█████▄▄█████████████████
█████████████████████████
█████████████████████████
.
.WHERE EVERYTHING IS A MARKET..
█████
██
██







██
██
██████
Will Bitcoin hit $200,000
before January 1st 2027?

    No @1.15         Yes @6.00    
█████
██
██







██
██
██████

  CHECK MORE > 
albert0bsd
Hero Member
*****
Offline Offline

Activity: 1120
Merit: 718



View Profile
November 24, 2024, 10:15:51 PM
 #6767

Why do you write "if the miners set the flag" for their node(s) to accept Full-RBF? They would be stupid to not enable Full-RBF for them by default. Every miner has a financial incentive to have Full-RBF enabled. I can't think of a reason why any miner or mining pool won't do this.

Do you have an example of a miner who doesn't?

From what I understand (correct me if I'm wrong), the flag is disabled by default. Miners would need to manually change the config file or something to enable it. Obviously, anyone who knows what they're doing would turn on the Full-RBF feature.

That's not really the point here, though. I'm not trying to start a debate about whether miners would set the flag of course they would. It was just a way of write  it, so sorry if it sounded dumb or confusing. Maybe it's just how it came out in my head since English isn’t my first language.
sneeky777
Newbie
*
Offline Offline

Activity: 21
Merit: 1


View Profile
November 25, 2024, 01:34:38 AM
Merited by vapourminer (1)
 #6768

I don't think anything wrong happened here.

5.94 BTC went to

bc1ql5lrt3y97djyu5k8ewmz87nnemxheycp6wdree
bc1qdplvug87leypur2a27xh64u8cu78e0td8edwv7
bc1qpa20zkg6kr55yl7gxnwh37aj8q00rt70k6q8ru

whereas 0.66 BTC (exactly 10% of the prize 6.60 BTC) went straight to Binance (for cash out ?)

Someone helped the finder with the transaction and got 10% of the prize?


How did he help him with the transaction? I have been reading this thread for quite some time but I think I missed the part about BOTs where someone tries to steal the sats after when someone withdraws the BTC.   Is there someone who can reply to this explanation of what really is going on?  If we really find out the private key then how can we claim it safely by not getting trapped by the Bots?

I've thought about it and I think we shouldn't want to win everything. If I have to pay 5 BTC in commission to win just 1, so be it. At least if I don't win the BOT will lose more than 5 Smiley
But if the bot gets the private key in seconds, why isn't Puzzle 135, 140 etc solved? The bots belong to the owner of the puzzle..I think because it has the private keys to all puzzle Smiley

Once the public key of any puzzle up to say around 90-100 ish is out there kangaroo will solve it in minutes. It will not solve anything higher in minutes or even hours unless you're very very lucky.
People had been going at it for years for 120 and up.
The bots are run from users on this forum believe it or not.
One user on this forum in particular has the fastest bot in the world apparently i wont name them but just think about how the bots works and search this forum you will see for yourself.

Also mara is apparently the place to go to make a TX without broadcasting the public key.
There's a guide to it in this thread.
someone in this thread done a test and it worked. However that was with like $50 or so.
All the answers are in this thread.

JD-007
Newbie
*
Offline Offline

Activity: 2
Merit: 0


View Profile
November 25, 2024, 07:49:26 AM
 #6769

How did he help him with the transaction? I have been reading this thread for quite some time but I think I missed the part about BOTs where someone tries to steal the sats after when someone withdraws the BTC.   Is there someone who can reply to this explanation of what really is going on?  If we really find out the private key then how can we claim it safely by not getting trapped by the Bots?

It already was explained here is the post, but basically you need to trust to the Private service of Mara slipstream.

Link: https://bitcointalk.org/index.php?topic=1306983.msg64379149#msg64379149

The death of the monitoring bots for the low bit challenge/puzzles such as the 66, 67, 68 bits.
The sure fire way to get all of your hard earned 6.6 BTC into one of your safe wallets...or is it a sure fire way?
Let me know what you think.

Ok, so here is the current, thoughtout way to beat the bots when dealing with the puzzle/challenge low bit wallets.

...

The main problem for those low entropy puzzles is the FullRBF feature of some versions of the bitcoin core, if the miners set the flag to accept TX that replace other TX without the RBF Flag



Thank You all for your responses, I will look into this deeply before I start working on it.  Maybe we have to create another bot to compete with it as well, hehe

For what it's worth, Learning is Earning for me in the first place.
themathematician
Newbie
*
Offline Offline

Activity: 1
Merit: 0


View Profile
November 25, 2024, 10:14:08 PM
 #6770

Hey guys, am new in bitcoin  and i discovered this puzzle about a month ago. Why are you guys brute forcing big numbers just wasting time, for me it just took me a month and now i already cracked 140, 145 150 155 and 160 by using maths, so you say no one  have discoverd the math behind bitcoin public keys?
albert0bsd
Hero Member
*****
Offline Offline

Activity: 1120
Merit: 718



View Profile
November 25, 2024, 10:28:10 PM
Merited by vapourminer (1)
 #6771

Hey guys, am new in bitcoin  and i discovered this puzzle about a month ago. Why are you guys brute forcing big numbers just wasting time, for me it just took me a month and now i already cracked 140, 145 150 155 and 160 by using maths, so you say no one  have discoverd the math behind bitcoin public keys?

It is easy to prove that you have the keys just by publishing a Signed text message that anyone can validate. So if you said that you solve these and you want that the users here believe you then you just need to publish such signatures.

Just like RetiredCoder did:

Address: 1PXAyUB8ZoH3WD8n5zoAthYjN15yN5CVq5
Message: RetiredCoder is a winner for 120,125,130
Signature: ILsD3ydVDKulUbTykvnPl8RNwPeBKqw58rv+ftq0HRxbWyzIbgl29Wup6uTahQ7xkKUG/LAUJLF8xcBxc2FDUU8=

Address: 1Fo65aKq8s8iquMt6weF1rku1moWVEd5Ua
Message: RetiredCoder is a winner for 120,125,130
Signature: IN6XCSv7fAIUioJ7T4ti2x4YmnOcd4FXmd9eb7Na6IofP0+ji8uxdhVEb6vG++vO77t9BS7KnOE2s6Sme38NT0I=


A lot of people here knows the math behind the ECDSA and right know the 2 best algorithms that we have to solve this have a complexity of Square root of N aka (meet me in the middle) [1]

- Baby step giant step
- Kangaroo (This one is the best because it don't have the memory limitation)



[1] https://andrea.corbellini.name/2015/06/08/elliptic-curve-cryptography-breaking-security-and-a-comparison-with-rsa/
Cricktor
Legendary
*
Offline Offline

Activity: 1428
Merit: 3707



View Profile
November 25, 2024, 11:17:20 PM
 #6772

~~~
Very nice of you that you leave #135 for us puny plebs. Interesting though, none of the coins from #140, #145, #150, #155 and #160 have moved so far or am I only blinded by the overwhelming excellence of your pure math mind? Impressive... your achievement within only one month, show proof... I'm confused...

As albert0bsd said, sign messages or STFU!

███████████████████████████
███████▄████████████▄██████
████████▄████████▄████████
███▀█████▀▄███▄▀█████▀███
█████▀█▀▄██▀▀▀██▄▀█▀█████
███████▄███████████▄███████
███████████████████████████
███████▀███████████▀███████
████▄██▄▀██▄▄▄██▀▄██▄████
████▄████▄▀███▀▄████▄████
██▄███▀▀█▀██████▀█▀███▄███
██▀█▀████████████████▀█▀███
███████████████████████████
.
.Duelbits PREDICT..
█████████████████████████
█████████████████████████
███████████▀▀░░░░▀▀██████
██████████░░▄████▄░░████
█████████░░████████░░████
█████████░░████████░░████
█████████▄▀██████▀▄████
████████▀▀░░░▀▀▀▀░░▄█████
██████▀░░░░██▄▄▄▄████████
████▀░░░░▄███████████████
█████▄▄█████████████████
█████████████████████████
█████████████████████████
.
.WHERE EVERYTHING IS A MARKET..
█████
██
██







██
██
██████
Will Bitcoin hit $200,000
before January 1st 2027?

    No @1.15         Yes @6.00    
█████
██
██







██
██
██████

  CHECK MORE > 
COBRAS
Member
**
Offline Offline

Activity: 1136
Merit: 25


View Profile
November 25, 2024, 11:23:21 PM
 #6773

Hey guys, am new in bitcoin  and i discovered this puzzle about a month ago. Why are you guys brute forcing big numbers just wasting time, for me it just took me a month and now i already cracked 140, 145 150 155 and 160 by using maths, so you say no one  have discoverd the math behind bitcoin public keys?

Try, all math especially move from biger range  to smaller with more many pubkeys etc. No profit math in bitcoin bruteforce. Kangaroo description provide RogueCodee , JLP not say how select DP, without knowing how select DP right, you only spend time nothing also. If money interested, I think most profit is a join to private btc mining pool.

[
Kelvin555
Jr. Member
*
Offline Offline

Activity: 63
Merit: 1


View Profile
November 28, 2024, 05:24:02 AM
 #6774


If money interested, I think most profit is a join to private btc mining pool.

I sent you a message.
benjaniah
Jr. Member
*
Offline Offline

Activity: 54
Merit: 3


View Profile
November 28, 2024, 09:08:40 AM
 #6775

Not here trying to toot my own horn...

I'm the one that first found 1BY8GQbnueYebq5d6CE1wDfbdAWWy33ZyW, sent it some change, and then sent that change to 67. If someone here is the one that gets 67 and you used the starting point I found and shared with you all, be cool and throw a coin my way, will ya?

txid that first funded 1BY8GQbnueYebq5d6CE1wDfbdAWWy33ZyW: https://mempool.space/tx/cff866f5a1eb771a5886535e4722a9361faf7a912791671a191f825228597a6a

Address: 1CgcibFXFiT2SuY4XiDvGZbUA8wJJagjb3
Message: I found 1BY8GQbnueYebq5d6CE1wDfbdAWWy33ZyW.
Signature: H4sY61XNuImEueQnrhKNxkaeLG3EUHdUq0QdNpwwU9UWfnwBL8QqikbdX0zz2zG696pBOvTvIjIkYtY BFi2cVNI=

Amongst the chatter in various Russian speaking Telegram groups, it looks like several 1BY8GQbnueY prefixes have possibly been found, but I haven't been able to verify any of them. Could be real, or not, but my hunch is that they're fake/disinfo. But I'm no longer monitoring those channels for updates, nor searching for 67, I've dropped out of the race... Thanks everyone and good luck out there.

2008TOKi
Newbie
*
Offline Offline

Activity: 6
Merit: 0


View Profile
November 28, 2024, 02:13:56 PM
 #6776

This puzzle made me lose my sense of reality
vneos
Jr. Member
*
Offline Offline

Activity: 40
Merit: 12


View Profile
November 29, 2024, 05:54:11 AM
 #6777

Not here trying to toot my own horn...

I'm the one that first found 1BY8GQbnueYebq5d6CE1wDfbdAWWy33ZyW, sent it some change, and then sent that change to 67. If someone here is the one that gets 67 and you used the starting point I found and shared with you all, be cool and throw a coin my way, will ya?

txid that first funded 1BY8GQbnueYebq5d6CE1wDfbdAWWy33ZyW: https://mempool.space/tx/cff866f5a1eb771a5886535e4722a9361faf7a912791671a191f825228597a6a

Address: 1CgcibFXFiT2SuY4XiDvGZbUA8wJJagjb3
Message: I found 1BY8GQbnueYebq5d6CE1wDfbdAWWy33ZyW.
Signature: H4sY61XNuImEueQnrhKNxkaeLG3EUHdUq0QdNpwwU9UWfnwBL8QqikbdX0zz2zG696pBOvTvIjIkYtY BFi2cVNI=

Amongst the chatter in various Russian speaking Telegram groups, it looks like several 1BY8GQbnueY prefixes have possibly been found, but I haven't been able to verify any of them. Could be real, or not, but my hunch is that they're fake/disinfo. But I'm no longer monitoring those channels for updates, nor searching for 67, I've dropped out of the race... Thanks everyone and good luck out there.




7545BF10859946ECA
So what's the point? It's just a coincidence in 67.
Dimas2024
Newbie
*
Offline Offline

Activity: 5
Merit: 0


View Profile
November 29, 2024, 08:55:04 AM
 #6778

Not here trying to toot my own horn...

I'm the one that first found 1BY8GQbnueYebq5d6CE1wDfbdAWWy33ZyW, sent it some change, and then sent that change to 67. If someone here is the one that gets 67 and you used the starting point I found and shared with you all, be cool and throw a coin my way, will ya?

txid that first funded 1BY8GQbnueYebq5d6CE1wDfbdAWWy33ZyW: https://mempool.space/tx/cff866f5a1eb771a5886535e4722a9361faf7a912791671a191f825228597a6a

Address: 1CgcibFXFiT2SuY4XiDvGZbUA8wJJagjb3
Message: I found 1BY8GQbnueYebq5d6CE1wDfbdAWWy33ZyW.
Signature: H4sY61XNuImEueQnrhKNxkaeLG3EUHdUq0QdNpwwU9UWfnwBL8QqikbdX0zz2zG696pBOvTvIjIkYtY BFi2cVNI=

Amongst the chatter in various Russian speaking Telegram groups, it looks like several 1BY8GQbnueY prefixes have possibly been found, but I haven't been able to verify any of them. Could be real, or not, but my hunch is that they're fake/disinfo. But I'm no longer monitoring those channels for updates, nor searching for 67, I've dropped out of the race... Thanks everyone and good luck out there.


Tell me, what program do you use to find a pattern in low ranges, and where can I download such a program?
bibilgin
Newbie
*
Offline Offline

Activity: 276
Merit: 0


View Profile
November 29, 2024, 12:33:24 PM
 #6779

Not here trying to toot my own horn...

I'm the one that first found 1BY8GQbnueYebq5d6CE1wDfbdAWWy33ZyW, sent it some change, and then sent that change to 67. If someone here is the one that gets 67 and you used the starting point I found and shared with you all, be cool and throw a coin my way, will ya?

txid that first funded 1BY8GQbnueYebq5d6CE1wDfbdAWWy33ZyW: https://mempool.space/tx/cff866f5a1eb771a5886535e4722a9361faf7a912791671a191f825228597a6a

Address: 1CgcibFXFiT2SuY4XiDvGZbUA8wJJagjb3
Message: I found 1BY8GQbnueYebq5d6CE1wDfbdAWWy33ZyW.
Signature: H4sY61XNuImEueQnrhKNxkaeLG3EUHdUq0QdNpwwU9UWfnwBL8QqikbdX0zz2zG696pBOvTvIjIkYtY BFi2cVNI=

Amongst the chatter in various Russian speaking Telegram groups, it looks like several 1BY8GQbnueY prefixes have possibly been found, but I haven't been able to verify any of them. Could be real, or not, but my hunch is that they're fake/disinfo. But I'm no longer monitoring those channels for updates, nor searching for 67, I've dropped out of the race... Thanks everyone and good luck out there.



Yes my friend,

Apparently, 1BY8GQbnueYebq5d6CE1wDfbdAWWy33ZyW is this wallet, the hex code is 7545BF10859946ECA you discovered it. Therefore, if it is found by me, the first gift will be sent to you. Then, since cctvgo5 was the first to report, it will be sent to him as well.

For each hex code with another prefix, more gifts will be given. Thank you for the information.
vneos
Jr. Member
*
Offline Offline

Activity: 40
Merit: 12


View Profile
November 29, 2024, 05:03:26 PM
 #6780

I have a question: If the 66 bit original outgoing transaction 8c8ec6b3511c62500ea9b3a1c30ca937e15d251b55d30290a2a6da2f1124f3fb includes addresses other than 13zb1hQbWVsc2S7ZTZnP2G4undNNpdh5so, can the transaction still be replaced?

For example: If the outgoing addresses include not only 13zb1hQbWVsc2S7ZTZnP2G4undNNpdh5so but also a new address 1KDwiguXGo4JFJoHA3azAHx4Neqkr76kKs with an outgoing amount of 10,000 satoshis, and the attacker does not possess the private key for 1KDwiguXGo4JFJoHA3azAHx4Neqkr76kKs, can the transaction originating from 13zb1hQbWVsc2S7ZTZnP2G4undNNpdh5so still be replaced?
Pages: « 1 ... 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 [339] 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 ... 638 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!