invisibleecho
Newbie
Offline
Activity: 9
Merit: 1
|
 |
January 06, 2025, 12:42:08 PM |
|
I went into this knowing that without GPU acceleration or distributed systems, my chances of finding the key were practically zero. But for me, this was less about cracking ECC and more about learning and challenging myself.
This is only partly true. The only thing a GPU is better at in this scenario is higher electricity costs. GPUs can do insane amount of parallel work and thats because the Pollard Kangaroo algorithm is statistically faster than BSGS on a GPU, because the nature of the algorithm relies on collision delection and random walks. However, there is no garuantee that you find said solution in sqrt(k2-k1) steps. BSGS on the other side, receives its performance due to a big precomputed baby step table. This means for every known public key in the table, you can reduce the number of ECC operations (which are known to be slow, even when optimized). The only constraint here is available memory so in practise this means BSGS will most likely never achieve perfect runtime simply because there is not enough memory in the world. However, if you have high CPU cores and high RAM - it most likely performs better on CPU than on GPU due to more memory available. Even though the process didn’t lead to a solution, it gave me a deeper appreciation for the strength of ECC and how robust these systems are. (...) I share this not to "reinvent the wheel" or to claim expertise, but because I found the process rewarding and hope others might learn from my mistakes or even just my curiosity. While I’ll be stepping away from this puzzle, I’ve gained a lot from the experience, and for me, that’s what matters most.
Well, the fact that you realized how hard it is to crack the ECDLP - even when the problem is made much easier on purpose is valuable. That means you most likely understand now the main point of those puzzles.
|
|
|
|
saatoshi_falling
Newbie
Offline
Activity: 19
Merit: 0
|
 |
January 06, 2025, 03:13:35 PM |
|
Bitcoin just hit 100k again. Time for some ChatGPT + Python + Crackpot theories and the enduring acceptance of defeat as I cook my ramen noodles.
|
|
|
|
Denevron
Newbie
Offline
Activity: 112
Merit: 0
|
 |
January 06, 2025, 04:25:47 PM |
|
algorithms are of course good, but it seems to me that to find the same private key for the 135 puzzle, you just need luck and nothing more 
|
|
|
|
brainless
Member

Offline
Activity: 408
Merit: 35
|
 |
January 06, 2025, 05:02:47 PM |
|
algorithms are of course good, but it seems to me that to find the same private key for the 135 puzzle, you just need luck and nothing more  Lucky or unlucky, it's not subject Subject is Ecc And sha256, where claim one-way working But these all from hex to wif or pubkey then pubkey to address, there are some conversation process, and same creating tx also based on conversation, These all process are based on math calculation Add multiplayer substraction division, all used If you write python, c or use bsgs or kangaroo, all based math, Universe law is what ever step taken have footprint, which can be reversed, now see ECC Start from 1 and end at N (....4141) N also called 0 Mean before N-1 is called 1 = -1 same pubkey with direction of y Now understand it's game of 0 to 1 and 1 to 0 Definitely reverse or footprint available, inside math Example proof, when universe created, scientist send jamesweb telescope to find footprint of universe, definitely it's available Ecc is very small portion, by math you can find, no need gpu only CPU could work, First math based kangaroo used at CPU and take 100 bit rewards But don't stick your mind with gpu, use math in other form at CPU definitely 160th pubkey rewards could be yours BrainLess
|
13sXkWqtivcMtNGQpskD78iqsgVy9hcHLF
|
|
|
bibilgin
Newbie
Offline
Activity: 249
Merit: 0
|
 |
January 07, 2025, 05:57:18 AM |
|
Lucky or unlucky, it's not subject Subject is Ecc And sha256, where claim one-way working But these all from hex to wif or pubkey then pubkey to address, there are some conversation process, and same creating tx also based on conversation, These all process are based on math calculation Add multiplayer substraction division, all used If you write python, c or use bsgs or kangaroo, all based math, Universe law is what ever step taken have footprint, which can be reversed, now see ECC Start from 1 and end at N (....4141) N also called 0 Mean before N-1 is called 1 = -1 same pubkey with direction of y Now understand it's game of 0 to 1 and 1 to 0 Definitely reverse or footprint available, inside math Example proof, when universe created, scientist send jamesweb telescope to find footprint of universe, definitely it's available Ecc is very small portion, by math you can find, no need gpu only CPU could work, First math based kangaroo used at CPU and take 100 bit rewards But don't stick your mind with gpu, use math in other form at CPU definitely 160th pubkey rewards could be yours BrainLess
Now that you have written these, there are software developers here who will immediately attack you. They will say things like, you don't know ECC, you don't understand crypto, bla bla. I am also someone who believes that all of these can be solved mathematically. But why don't those who understand software use their codes in non-standard mathematical operations? Why do they always think of formulas like A = B - C (x.y) with ready-made logic? Even the A - B - C - x - y that is currently being written is mathematics. A nice saying, Every brave man eats yogurt differently.
|
|
|
|
kTimesG
|
 |
January 07, 2025, 01:47:30 PM |
|
But why don't those who understand software use their codes in non-standard mathematical operations?
Why do they always think of formulas like A = B - C (x.y) with ready-made logic?
Even the A - B - C - x - y that is currently being written is mathematics.
Because illogical thinking cannot manifest itself as working software? At some point a logical contradiction occurs (unless you like software that includes intentional bugs), and it may be spotted even before attempting to touch a keyboard. Otherwise, the lesson is learned the hard way, but with no doubt that moment occurs sooner or later. But what stops you from giving it a shot, if you believe it's not a waste of time (or life); what are your results, besides spreading around your own beliefs, backed by nothing and impossible to prove or test?
|
Off the grid, training pigeons to broadcast signed messages.
|
|
|
hoanghuy2912
Newbie
Offline
Activity: 48
Merit: 0
|
 |
January 07, 2025, 06:53:30 PM |
|
In my opinion, this is not a quiz but a business selling solutions from the organizer and it is not known whether the winners are from the organizer or not
|
|
|
|
cctv5go
Newbie
Online
Activity: 46
Merit: 0
|
 |
January 07, 2025, 07:18:57 PM |
|
In my opinion, this is not a quiz but a business selling solutions from the organizer and it is not known whether the winners are from the organizer or not
Maybe you're right! But you don't have sufficient evidence.
|
|
|
|
brainless
Member

Offline
Activity: 408
Merit: 35
|
 |
January 07, 2025, 07:47:00 PM Last edit: January 07, 2025, 08:40:41 PM by Mr. Big |
|
In my opinion, this is not a quiz but a business selling solutions from the organizer and it is not known whether the winners are from the organizer or not
You need to read this thread from page 1 to till last page, Then your opinion maybe changed,
Puzzle #135 In 2015 it was 0.135 In 2017 it was 1.35 In 2023 it was 13.5 In 2025 it could be  Maybe 135.0  Your prediction???
|
13sXkWqtivcMtNGQpskD78iqsgVy9hcHLF
|
|
|
Jorge54PT
Newbie
Offline
Activity: 44
Merit: 0
|
 |
January 07, 2025, 09:22:21 PM |
|
In my opinion, this is not a quiz but a business selling solutions from the organizer and it is not known whether the winners are from the organizer or not
You need to read this thread from page 1 to till last page, Then your opinion maybe changed,
Puzzle #135 In 2015 it was 0.135 In 2017 it was 1.35 In 2023 it was 13.5 In 2025 it could be  Maybe 135.0  Your prediction??? It doesn't matter the value, most likely 135 will go to the same person as find 120, 125 and 130 
|
|
|
|
Denevron
Newbie
Offline
Activity: 112
Merit: 0
|
 |
January 07, 2025, 10:53:38 PM |
|
In my opinion, this is not a quiz but a business selling solutions from the organizer and it is not known whether the winners are from the organizer or not
You need to read this thread from page 1 to till last page, Then your opinion maybe changed,
Puzzle #135 In 2015 it was 0.135 In 2017 it was 1.35 In 2023 it was 13.5 In 2025 it could be  Maybe 135.0  Your prediction??? It doesn't matter the value, most likely 135 will go to the same person as find 120, 125 and 130  Well, why should he, if you sort from the beginning of the range or from the end, then yes, he has every chance, and if you believe in the power of randomness, then absolutely anyone can get it)
|
|
|
|
bibilgin
Newbie
Offline
Activity: 249
Merit: 0
|
 |
January 07, 2025, 11:14:32 PM |
|
But why don't those who understand software use their codes in non-standard mathematical operations?
Why do they always think of formulas like A = B - C (x.y) with ready-made logic?
Even the A - B - C - x - y that is currently being written is mathematics.
Because illogical thinking cannot manifest itself as working software? At some point a logical contradiction occurs (unless you like software that includes intentional bugs), and it may be spotted even before attempting to touch a keyboard. Otherwise, the lesson is learned the hard way, but with no doubt that moment occurs sooner or later. But what stops you from giving it a shot, if you believe it's not a waste of time (or life); what are your results, besides spreading around your own beliefs, backed by nothing and impossible to prove or test? Can you be patient a little longer? Because when the time comes to prove it, I will just say that I did it. My hardware is not very high, so it may take a few weeks. After that, I will publish the HEX code SHA256 here before transferring it. After that, I will just sit and watch. I am not telling you to write illogical software, if you know MATHEMATICS. This includes basic statistics, PROBABILITY PERCENTAGE... I can list many reasons. I can show many examples and proofs for this. Actually, I don't have to, you will understand this when I am done.
|
|
|
|
K0rvexX
Newbie
Offline
Activity: 21
Merit: 0
|
 |
January 08, 2025, 06:49:24 PM |
|
But why don't those who understand software use their codes in non-standard mathematical operations?
Why do they always think of formulas like A = B - C (x.y) with ready-made logic?
Even the A - B - C - x - y that is currently being written is mathematics.
Because illogical thinking cannot manifest itself as working software? At some point a logical contradiction occurs (unless you like software that includes intentional bugs), and it may be spotted even before attempting to touch a keyboard. Otherwise, the lesson is learned the hard way, but with no doubt that moment occurs sooner or later. But what stops you from giving it a shot, if you believe it's not a waste of time (or life); what are your results, besides spreading around your own beliefs, backed by nothing and impossible to prove or test? Can you be patient a little longer? Because when the time comes to prove it, I will just say that I did it. My hardware is not very high, so it may take a few weeks. After that, I will publish the HEX code SHA256 here before transferring it. After that, I will just sit and watch. I am not telling you to write illogical software, if you know MATHEMATICS. This includes basic statistics, PROBABILITY PERCENTAGE... I can list many reasons. I can show many examples and proofs for this. Actually, I don't have to, you will understand this when I am done. You want maths? here's a bit of maths for you. You have N=3(mod 4), tell me what N is. It's math, it's reversible right? I recommend at least reading how hashing functions, Ripemd and sha work before spewing nonsense. Same goes for the brainless guy.
|
|
|
|
bibilgin
Newbie
Offline
Activity: 249
Merit: 0
|
 |
January 08, 2025, 07:01:03 PM |
|
But why don't those who understand software use their codes in non-standard mathematical operations?
Why do they always think of formulas like A = B - C (x.y) with ready-made logic?
Even the A - B - C - x - y that is currently being written is mathematics.
Because illogical thinking cannot manifest itself as working software? At some point a logical contradiction occurs (unless you like software that includes intentional bugs), and it may be spotted even before attempting to touch a keyboard. Otherwise, the lesson is learned the hard way, but with no doubt that moment occurs sooner or later. But what stops you from giving it a shot, if you believe it's not a waste of time (or life); what are your results, besides spreading around your own beliefs, backed by nothing and impossible to prove or test? Can you be patient a little longer? Because when the time comes to prove it, I will just say that I did it. My hardware is not very high, so it may take a few weeks. After that, I will publish the HEX code SHA256 here before transferring it. After that, I will just sit and watch. I am not telling you to write illogical software, if you know MATHEMATICS. This includes basic statistics, PROBABILITY PERCENTAGE... I can list many reasons. I can show many examples and proofs for this. Actually, I don't have to, you will understand this when I am done. You want maths? here's a bit of maths for you. You have N=3(mod 4), tell me what N is. It's math, it's reversible right? I recommend at least reading how hashing functions, Ripemd and sha work before spewing nonsense. Same goes for the brainless guy. Did you really write with such intelligence? Even in the question you wrote, there are PROBABILITY values that I wrote in capital letters.  Really? Let me give you the answer, don't force it. N = 4k + 3 That is; If k=0 then N=3 k=1 then N=7 k=2 then N=11 k=3 then N=15 .... That is, there is no exact result for the N value. But there are PROBABILITY results. LOL 
|
|
|
|
brainless
Member

Offline
Activity: 408
Merit: 35
|
 |
January 09, 2025, 04:28:33 AM Last edit: January 09, 2025, 07:30:06 AM by brainless |
|
But why don't those who understand software use their codes in non-standard mathematical operations?
Why do they always think of formulas like A = B - C (x.y) with ready-made logic?
Even the A - B - C - x - y that is currently being written is mathematics.
Because illogical thinking cannot manifest itself as working software? At some point a logical contradiction occurs (unless you like software that includes intentional bugs), and it may be spotted even before attempting to touch a keyboard. Otherwise, the lesson is learned the hard way, but with no doubt that moment occurs sooner or later. But what stops you from giving it a shot, if you believe it's not a waste of time (or life); what are your results, besides spreading around your own beliefs, backed by nothing and impossible to prove or test? Can you be patient a little longer? Because when the time comes to prove it, I will just say that I did it. My hardware is not very high, so it may take a few weeks. After that, I will publish the HEX code SHA256 here before transferring it. After that, I will just sit and watch. I am not telling you to write illogical software, if you know MATHEMATICS. This includes basic statistics, PROBABILITY PERCENTAGE... I can list many reasons. I can show many examples and proofs for this. Actually, I don't have to, you will understand this when I am done. You want maths? here's a bit of maths for you. You have N=3(mod 4), tell me what N is. It's math, it's reversible right? I recommend at least reading how hashing functions, Ripemd and sha work before spewing nonsense. Same goes for the brainless guy. In simple math ans is 3 But maybe u forget read my wrote, Let me ask you question 17 apple div in 3 person as per below division Rule No apple / part left after div No apple will cut in pieces 1st person will get 1/2 share 2nd person will get 1/3 share 3rd person will get 1/9 share Hope u will enjoy this math calc Edited https://bitcointalk.org/index.php?action=profile;u=3675728;sa=showPostsYour post mention you are newer at cryptography and you skipped math courses in college And you call yourself stupid,,, Come to know why your math subject professor kick out you from their classes, due to your bad mouth, and no manner's
|
13sXkWqtivcMtNGQpskD78iqsgVy9hcHLF
|
|
|
kTimesG
|
 |
January 09, 2025, 10:23:40 AM |
|
This thread is very toxic. For your own sanity you should remember a couple things:
1. ChatGPT will always agree with whatever BS you pull into his mouth to swallow. As a result, everyone can easily break ECDSA and ECDLP, you only need to know a bit of math and probabilities, and maybe not more than an Raspberry Pi chip.
2. Reality is a bitch. You know, made out of actual people that can think. ECDSA and ECDLP are safe against any form of probability attack (except Kangaroo if you have a pubKey). Anyone who thinks otherwise should check 1 above. All forms of trying to include probability to break an address (e.g. a hash function) will fail, because the effort to "divide and conquer" doubles by each bit, and becomes higher than normal brute-force. They will only realize this when trying to put in practice their fallacy-based theories and end up needing to have clusters of hundreds of thousands of computers to do the job.
|
Off the grid, training pigeons to broadcast signed messages.
|
|
|
bibilgin
Newbie
Offline
Activity: 249
Merit: 0
|
 |
January 09, 2025, 11:25:32 AM |
|
This thread is very toxic. For your own sanity you should remember a couple things:
1. ChatGPT will always agree with whatever BS you pull into his mouth to swallow. As a result, everyone can easily break ECDSA and ECDLP, you only need to know a bit of math and probabilities, and maybe not more than an Raspberry Pi chip.
2. Reality is a bitch. You know, made out of actual people that can think. ECDSA and ECDLP are safe against any form of probability attack (except Kangaroo if you have a pubKey). Anyone who thinks otherwise should check 1 above. All forms of trying to include probability to break an address (e.g. a hash function) will fail, because the effort to "divide and conquer" doubles by each bit, and becomes higher than normal brute-force. They will only realize this when trying to put in practice their fallacy-based theories and end up needing to have clusters of hundreds of thousands of computers to do the job.
1- No one said they could crack ECDSA or ECDLP. 2- There are probability values in the entire system. It means that transactions can only be made in low bit wallets. 3- You said except for Pubkey and Kangaroo. Why? Can you make a wallet with high bit? For example 135 bit? Yes, it can be done, but it takes time. If I tell you that you need to scan certain intervals, how much time will it reduce? I'm talking about the Basics of Probability. I'll start to think that you've never dealt with encryption before. Brute Force was always done. So, does the time shorten for a password that consists only of text? Or does the time shorten for a password that consists only of numbers? Also, if you know the length of the password.  How many hours, how many days will it take? How long do you think it will take to break? If you can't think, it means you've never tried to break a password.
|
|
|
|
kTimesG
|
 |
January 09, 2025, 11:40:16 AM |
|
This thread is very toxic. For your own sanity you should remember a couple things:
1. ChatGPT will always agree with whatever BS you pull into his mouth to swallow. As a result, everyone can easily break ECDSA and ECDLP, you only need to know a bit of math and probabilities, and maybe not more than an Raspberry Pi chip.
2. Reality is a bitch. You know, made out of actual people that can think. ECDSA and ECDLP are safe against any form of probability attack (except Kangaroo if you have a pubKey). Anyone who thinks otherwise should check 1 above. All forms of trying to include probability to break an address (e.g. a hash function) will fail, because the effort to "divide and conquer" doubles by each bit, and becomes higher than normal brute-force. They will only realize this when trying to put in practice their fallacy-based theories and end up needing to have clusters of hundreds of thousands of computers to do the job.
1- No one said they could crack ECDSA or ECDLP. 2- There are probability values in the entire system. It means that transactions can only be made in low bit wallets. 3- You said except for Pubkey and Kangaroo. Why? Can you make a wallet with high bit? For example 135 bit? Yes, it can be done, but it takes time. If I tell you that you need to scan certain intervals, how much time will it reduce? I'm talking about the Basics of Probability. I'll start to think that you've never dealt with encryption before. Brute Force was always done. So, does the time shorten for a password that consists only of text? Or does the time shorten for a password that consists only of numbers? Also, if you know the length of the password.  How many hours, how many days will it take? How long do you think it will take to break? If you can't think, it means you've never tried to break a password. 1. Yeah, lots of people did. We're still waiting on their breakthroughs since they were all something around the lines of "I'll break this by February 2024 / 2 weeks / this year / I already did it". As a bonus, you're claiming you broke a hash function, not DLP, which is exponentially more difficult of a problem (2^256 or 2^160, vs 2^128 or 2^67 or 2^33.5). Congrats, we'll wait. 2. I don't think you know what you are talking about. 3. I don't think you know the difference between hashing functions, public key signatures, and symmetric encryption. You're making a mess out of them all while calling everyone else idiots without ever knowing what they do for a living. Also, my post was not directed to you. You can keep going with whatever you're trying to do in peace.
|
Off the grid, training pigeons to broadcast signed messages.
|
|
|
bibilgin
Newbie
Offline
Activity: 249
Merit: 0
|
 |
January 09, 2025, 12:00:46 PM Last edit: January 09, 2025, 12:10:53 PM by bibilgin |
|
This thread is very toxic. For your own sanity you should remember a couple things:
1. ChatGPT will always agree with whatever BS you pull into his mouth to swallow. As a result, everyone can easily break ECDSA and ECDLP, you only need to know a bit of math and probabilities, and maybe not more than an Raspberry Pi chip.
2. Reality is a bitch. You know, made out of actual people that can think. ECDSA and ECDLP are safe against any form of probability attack (except Kangaroo if you have a pubKey). Anyone who thinks otherwise should check 1 above. All forms of trying to include probability to break an address (e.g. a hash function) will fail, because the effort to "divide and conquer" doubles by each bit, and becomes higher than normal brute-force. They will only realize this when trying to put in practice their fallacy-based theories and end up needing to have clusters of hundreds of thousands of computers to do the job.
1- No one said they could crack ECDSA or ECDLP. 2- There are probability values in the entire system. It means that transactions can only be made in low bit wallets. 3- You said except for Pubkey and Kangaroo. Why? Can you make a wallet with high bit? For example 135 bit? Yes, it can be done, but it takes time. If I tell you that you need to scan certain intervals, how much time will it reduce? I'm talking about the Basics of Probability. I'll start to think that you've never dealt with encryption before. Brute Force was always done. So, does the time shorten for a password that consists only of text? Or does the time shorten for a password that consists only of numbers? Also, if you know the length of the password.  How many hours, how many days will it take? How long do you think it will take to break? If you can't think, it means you've never tried to break a password. 1. Yeah, lots of people did. We're still waiting on their breakthroughs since they were all something around the lines of "I'll break this by February 2024 / 2 weeks / this year / I already did it". As a bonus, you're claiming you broke a hash function, not DLP, which is exponentially more difficult of a problem (2^256 or 2^160, vs 2^128 or 2^67 or 2^33.5). Congrats, we'll wait. 2. I don't think you know what you are talking about. 3. I don't think you know the difference between hashing functions, public key signatures, and symmetric encryption. You're making a mess out of them all while calling everyone else idiots without ever knowing what they do for a living. Also, my post was not directed to you. You can keep going with whatever you're trying to do in peace. I agree with you on some issues. No one thinks they can do anything without knowing anything. I never promised anyone a time like this. Everyone has a method, work, planning. I respect that. I never belittled anyone about how they do their job by saying it can't be done, it won't happen or anything like that. I am one of those who understand that there is knowledge here. But you want everyone to think the way you think. Every idea needs RESPECT. That's why I respect everyone in your studies or other conversations. But MATHEMATICS is used everywhere. I like to say this, you may not like it. If you even want a proof, we can do something like this. Tell me a 67 bit hex starting with 6D000 and 7CFFF, a place, I will tell you the closest 1BY8GQbnu and 1BY8GQbnue.
|
|
|
|
WanderingPhilospher
Sr. Member
  
Offline
Activity: 1400
Merit: 271
Shooters Shoot...
|
 |
January 09, 2025, 02:24:54 PM |
|
If you even want a proof, we can do something like this. Tell me a 67 bit hex starting with 6D000 and 7CFFF, a place, I will tell you the closest
1BY8GQbnu and 1BY8GQbnue.
This only proves that maybe you ran those ranges in their entirety. How does this prove anything about "math"? Maybe I don't understand what you are really saying. If you can determine via math, where all "1BY8GQbnue" prefixes are, then just solve 67 and be done with it. If you tell me a 67 bit hex starting with 75A3E and 57604, I will tell you the closest 1BY8GQbnu and 1BY8GQbnue.
|
|
|
|
|