Bitcoin Forum
March 12, 2026, 09:02:29 PM *
News: Latest Bitcoin Core release: 30.2 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 [356] 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 ... 639 »
  Print  
Author Topic: Bitcoin puzzle transaction ~32 BTC prize to who solves it  (Read 373096 times)
WanderingPhilospher
Sr. Member
****
Offline Offline

Activity: 1484
Merit: 285

Shooters Shoot...


View Profile
January 15, 2025, 10:13:11 PM
 #7101

I discovered last month the correct way to transfer without being robbed, without RBF. The method I use to transfer funds from wallets with 66 to 70 bits—I tested everything, especially 67—works with the method I created, without Marapool or Electrum. And it works. I even tried to steal from myself, and I had friends with powerful cards try

as well. I made the transfer, and 10 friends tried to steal from me, but it didn’t work. Even I tried to do an RBF, but it doesn’t replace the transaction, no matter how high I set the fee.

I found the flaw that allows thieves to steal, and if you use my method, it prevents this. If anyone wants to test with me, just let me know—I’m available. Forget Marapool and forget mining your own blocks. This is the only way I’ve managed to make it work.  I set a super low fee, and it stayed there for about 17 minutes, and no one

managed to steal it—not even I was able to replace the transaction. The only way to accelerate it was by doing a CPFP (Child Pays for Parent) on the receiver's side, and that’s it.  f anyone wants to test with me or talk to me, feel free. I had to study a lot to achieve this. Currently, I’m using a Raspberry Pi and some additional tools to make the

transfer. No bot has been able to steal from me—I’ve even tested it in under 5 seconds, and it doesn’t perform an RBF or manage to replace the transaction.

Just post your step by step method or don't talk about it. Mara works and the step by step is out there.

Lemme guess you will "help" the finder out for a small 3 BTC fee, lol.
hotmoney
Newbie
*
Offline Offline

Activity: 21
Merit: 0


View Profile
January 15, 2025, 10:18:25 PM
 #7102

WanderingPhilosopher, look, I don’t trust Marapool. Either they or someone there might have bad intentions. I don’t want any fees, I won’t charge 3 BTC or anything like that, but feel free to try. I also have bills to pay, and energy is expensive here. I know there’s an easy tutorial with Marapool, but it usually doesn’t work, and it says it's offline. So I don’t trust it; I’ve tried it before, and it took a long time. I prefer to do it my way—nothing works better.

As for RBF, there’s a lot of FOMO (fear of missing out) and fear involved. It’s not easy to steal from someone if the parameters are set correctly.
mcdouglasx
Hero Member
*****
Offline Offline

Activity: 938
Merit: 522



View Profile WWW
January 15, 2025, 10:31:24 PM
 #7103

I discovered last month the correct way to transfer without being robbed, without RBF. The method I use to transfer funds from wallets with 66 to 70 bits—I tested everything, especially 67—works with the method I created, without Marapool or Electrum. And it works. I even tried to steal from myself, and I had friends with powerful cards try

as well. I made the transfer, and 10 friends tried to steal from me, but it didn’t work. Even I tried to do an RBF, but it doesn’t replace the transaction, no matter how high I set the fee.

I found the flaw that allows thieves to steal, and if you use my method, it prevents this. If anyone wants to test with me, just let me know—I’m available. Forget Marapool and forget mining your own blocks. This is the only way I’ve managed to make it work.  I set a super low fee, and it stayed there for about 17 minutes, and no one

managed to steal it—not even I was able to replace the transaction. The only way to accelerate it was by doing a CPFP (Child Pays for Parent) on the receiver's side, and that’s it.  f anyone wants to test with me or talk to me, feel free. I had to study a lot to achieve this. Currently, I’m using a Raspberry Pi and some additional tools to make the

transfer. No boot has been able to steal from me—I’ve even tested it in under 5 seconds, and it doesn’t perform an RBF or manage to replace the transaction.

If anyone wants to test with me today, I can transfer $10 for you to try and steal it with your boots. I'll create a 67-bit key and share the address with you, okay? You can get the public key from the mempool with your bots, but you won’t be able to steal it.

Does anyone want to collaborate with a few dollars to do this today? I’ll leave the wallet here—I'll do it at 10 PM tonight. I'm in Uruguay, sorry for my bad English.

This will be the wallet (67-bit):

1BY8GQbBPGYEC58s9ckHmqf9doEX9mCKPR

Let me know who will try to steal it today and who will send some funds to this wallet!

This test with your friends is not valid for multiple reasons, since you have exposed this address, I invite you to fund it and give a notice here of the time and day you will do it, and you will see if your method works or not.
Even knowing how bitcoin works, if you transmit your transaction and its pk is in bit67 it will surely be replaced, because I doubt there is a different technique that has not been previously raised here.

█████████████████████████
█████████████████████████
███████▀█████████▀███████
█████████████████████████
█████████████████████████
████████████▀████████████
███████▀███████▄███████
███████████▄▄▄███████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████

 2UP.io 
NO KYC
CASINO
██████████████████████████
████████████████████████
███████████████████████
███████████████████
██████████████████████
███████████████████████
███████████████████████
██████████████████
███████████████████████
██████████████████
███████████████████████
████████████████████████
██████████████████████████
███████████████████████████████████████████████████████████████████████████████████████
 
FASTEST-GROWING CRYPTO
CASINO & SPORTSBOOK

 

███████████████████████████████████████████████████████████████████████████████████████
███████████████████████████
█████████████████████████
███████████████████████
███████████████████████
████████████████████████
███████████████████████
███████████████████████
██████████████████████
████████████████████████
███████████████████████
███████████████████████
█████████████████████████
███████████████████████████
 

...PLAY NOW...
hotmoney
Newbie
*
Offline Offline

Activity: 21
Merit: 0


View Profile
January 15, 2025, 10:45:40 PM
Last edit: January 15, 2025, 10:56:41 PM by hotmoney
 #7104

message   15/01/2025 hotmoney


address    1BY8GQbBPGYEC58s9ckHmqf9doEX9mCKPR


signature   H0J+wKAwGGMiVWHLuwEaZpLePkQAYx0HoTVvEZJu/wx3N6QYbUJMuajlj//yyjD7WLh42Ydlg+/vTJm50Td1LS0=



I can financially manage, yes, but if someone is willing to send a small amount for testing, $10 or $20 should be enough. Once the value enters, I will withdraw it to another 67-bit wallet to keep trying to see if any bot can catch it, though I’m sure they won’t succeed. It can be today if someone sends $10, I can do this.

It can be today at 22:00 o'clock. I’m sure no one will be able to override the RBF, not even the most powerful bot will succeed.

Of course, if someone knows the same thing I discovered, they won't publish it. There are a lot of good software that no one will put here for free, because those who know how to fish good fish will fish for themselves and won't show the techniques to others.
WanderingPhilospher
Sr. Member
****
Offline Offline

Activity: 1484
Merit: 285

Shooters Shoot...


View Profile
January 16, 2025, 03:02:20 AM
 #7105

WanderingPhilosopher, look, I don’t trust Marapool. Either they or someone there might have bad intentions. I don’t want any fees, I won’t charge 3 BTC or anything like that, but feel free to try. I also have bills to pay, and energy is expensive here. I know there’s an easy tutorial with Marapool, but it usually doesn’t work, and it says it's offline. So I don’t trust it; I’ve tried it before, and it took a long time. I prefer to do it my way—nothing works better.

As for RBF, there’s a lot of FOMO (fear of missing out) and fear involved. It’s not easy to steal from someone if the parameters are set correctly.

Just because you couldn't get it to work, doesn't mean it doesn't. Several of us have tested this method and it has worked every time.

Spread solutions, instead of fear. Maybe if you post your fail-proof method, the solver may use it and donate you something. If not, I imagine they will use Mara or take a shot in the dark.
hotmoney
Newbie
*
Offline Offline

Activity: 21
Merit: 0


View Profile
January 16, 2025, 03:05:45 AM
Last edit: January 16, 2025, 03:21:12 AM by hotmoney
 #7106

I am selling it for 1 BTC. If you are interested, feel free to contact me. Thank you. I will not share any further details—those willing to take a leap of faith or use Mara can proceed at their own risk.

There are proxies involved, and hackers can obtain your private key (PK) even through them. You managed to avoid this because the addresses you used were not part of the 67 range from the challenge. The challenge addresses are already configured with proxies and other hacker tools designed to extract the key in just 5 seconds using an RTX 4090, lol.

I’m not saying that Mara doesn’t work; of course, it does, and it effectively hides the private key. However, you not tested it using the challenge addresses?. These addresses, starting from 67 and above, are actively monitored by hackers—even within Mara. They use SSH proxies and pre-configured scripts that might not even be known to the people running the system, but they are capable of extracting sensitive information in seconds.

With the wallets you tested, the bad hackers wouldn’t even bother trying to steal. Remember, the second mouse always gets the cheese.
WanderingPhilospher
Sr. Member
****
Offline Offline

Activity: 1484
Merit: 285

Shooters Shoot...


View Profile
January 16, 2025, 03:44:33 AM
 #7107

I am selling it for 1 BTC. If you are interested, feel free to contact me. Thank you. I will not share any further details—those willing to take a leap of faith or use Mara can proceed at their own risk.

There are proxies involved, and hackers can obtain your private key (PK) even through them. You managed to avoid this because the addresses you used were not part of the 67 range from the challenge. The challenge addresses are already configured with proxies and other hacker tools designed to extract the key in just 5 seconds using an RTX 4090, lol.

I’m not saying that Mara doesn’t work; of course, it does, and it effectively hides the private key. However, you not tested it using the challenge addresses?. These addresses, starting from 67 and above, are actively monitored by hackers—even within Mara. They use SSH proxies and pre-configured scripts that might not even be known to the people running the system, but they are capable of extracting sensitive information in seconds.

With the wallets you tested, the bad hackers wouldn’t even bother trying to steal. Remember, the second mouse always gets the cheese.
Ok, it's obvious you have no clue what you are saying now. Did you test the address of a previous found wallet? No. If I had the priv key to the 66 or 67 wallet, I wouldn't run a test with it, I would just sweep it lol.

We all know about solving any key under 80 bits within mere seconds.

And why heck no I'm not interested in your 1 BTC method lol. And neither will no one on here. Watch how it all unfolds when 67 is found.
fireman3100
Newbie
*
Offline Offline

Activity: 3
Merit: 0


View Profile
January 16, 2025, 05:54:45 AM
 #7108

This is the first time I have posted here but have been reading this board for a few months. I am a math guy and am disabled.  Being disabled and not able to do much of anything physical I have dove head first in cryptography focusing on bitcoin wallets and these puzzles. Now I have finally found a pattern and mathematical equations to narrow down the location to within about 1-2% of a specific set of keys in the ranges where the private key is located. A lot of it I have to thank all of you and your posts concerning puzzle 67. Problem is that i have a crappy computer that can't scan private keys worth a damn. So still going through a quintillion set of keys still will take along time without having the resources to do so. And the cloud search on the website doesn't allow you to do custom range searches or I would have been done by now. Also I know a little code to get in trouble with but not enough to be fully able to write a python code for the other cloud search over on the other website.

With so many other people working on this puzzle I doubt if it will be unsolved much longer.

I have two other ways to solve the puzzles but once again don't have the coding experience and know how with python, java script, etc. to do it. I am not going to divulge the ways because then it would put me at a severe disadvantage because there are many programmers out there that would leave me and others in the dust with their coding superiority. For example, with all the information on this puzzle everyone has published on this forum gave me a plethora of information for me to spend the last three months to find my edge to narrow down the location. So I am not going to disclose here but would like to collaborate with people who are serious about solving these puzzles. Note that with what I have found and able to do all the puzzles became not impossible or improbable anymore. With bitcoin continuing to blow through the roof, this is life changing money for a lot of people including me.

So if you are serious and wish to collaborate, email me and we will talk. But I am not just gonna jump in with just anyone.

Also to show I am not shoveling a bunch of crap there are 73 plus quintillion keys in this puzzle. Each main range has roughly 18-19 quintillion keys, with roughly 1.1 or so quintillion keys in each sub range and so on and so forth. My computer can only scan roughly 1 trillion keys a day. And I only make a very small amount of money enough so I can't afford a new computer to get one with a GPU to scan faster. I know I don't have to explain myself but with some of the crackpots that have been on here I want to show that I am not one of them. Sorry for rambling.

My name is Lee and my email is freshstart2900@outlook.com.

bibilgin
Newbie
*
Offline Offline

Activity: 276
Merit: 0


View Profile
January 16, 2025, 07:18:26 AM
 #7109

bibilgin  How so, Bibilgin? I use an RTX 4060, and it goes to 1320 MH/s overclocked. Which card do you use, Bibilgin?

I have 3 4070 ti 7000m/sec speed. (approximately)

But I find around 15-20 1BY8GQbnu prefixes per day. Sometimes more.


Which tools are you using?

I use VanitySearch256.

Actually, the important thing here is to calculate the range you want to scan and where that range is before the program. In other words, I am working with PROBABILITY and MATHEMATICAL theorem.
saatoshi_falling
Newbie
*
Offline Offline

Activity: 20
Merit: 0


View Profile
January 16, 2025, 01:20:22 PM
 #7110

Quote
I am selling it for 1 BTC
lol
Quote
I am a math guy and am disabled.... Now I have finally found a pattern
and lol
I rarely laugh reading things but I swear you guys provide some level of entertainment not found elsewhere.


nomachine
Full Member
***
Offline Offline

Activity: 798
Merit: 134



View Profile
January 16, 2025, 03:07:33 PM
 #7111

Quote
I am selling it for 1 BTC
lol
Quote
I am a math guy and am disabled.... Now I have finally found a pattern
and lol
I rarely laugh reading things but I swear you guys provide some level of entertainment not found elsewhere.


 laughter is the universal equation for happiness!   Grin

BTC: bc1qdwnxr7s08xwelpjy3cc52rrxg63xsmagv50fa8
K0rvexX
Newbie
*
Offline Offline

Activity: 21
Merit: 0


View Profile
January 16, 2025, 03:18:46 PM
 #7112

The amount of insanity surfacing these couple of weeks is genuinely insane. People coming out of nowhere, claiming they found the magical way to transfer funds with absolutely zero proof and charging bands for it, the other one is apparently Gauss 2.0 and found a way to crack sha256, and others think they can outsmart a damn random distribution and find a pattern in a double hashed address...

I'm not a mathematician or anything, far from it, I'm just in my 3rd year of cybersecurity engineering. With that said, I studied hashing functions and cryptography for years, and if any of you has magically found a method to reverse sha256 or ecdsa there will be bigger things at stake than a bitcoin puzzle. That's "if", because as far as I can see all of them are spewing actual bullcrap in a last act of desperation. Trying to make sense of randomness is a shot in the dark black hole that won't yield anything but wasted time, energy, sanity, and hope for those who think it's feasible.

I'm not saying randomness is uncrackable, nothing a computer does is truly random. But unless you have an idea of the procedure used to generate the wallets or ran a side-channel attack on the author's machine, there's practically no way to predict it. The reality is painful, and so far the only way to actually crack the puzzle is to simply bruteforce it, and the only breakthroughs that could be made are in optimizing the software used to sweep through all possible keys.

I'm not attacking anyone in particular, but if you genuinely think that this could be magically solved through PROBABILITY and MATHEMATICS where the only mathematics you've used are calculating the average of the keys with wallets that "look like" the target wallet, you need to reconsider what you're doing and genuinely understand the cryptography behind bitcoin, or in general.
vneos
Jr. Member
*
Offline Offline

Activity: 40
Merit: 12


View Profile
January 16, 2025, 03:21:04 PM
 #7113

message   15/01/2025 hotmoney
address    1BY8GQbBPGYEC58s9ckHmqf9doEX9mCKPR
signature   H0J+wKAwGGMiVWHLuwEaZpLePkQAYx0HoTVvEZJu/wx3N6QYbUJMuajlj//yyjD7WLh42Ydlg+/vTJm50Td1LS0=

Can you crack and post the PVK of that signed address??

Code:
-----BEGIN BITCOIN SIGNED MESSAGE-----
I also own this address
-----BEGIN SIGNATURE-----
13zb1hQbWVuYdZoAkztVrNrm65aReL2pYD
H8SlTYJ7a/Mp5cra9VzqgDFMGRQUYfA5NLrSCb0GkwbeEDqx8vKWGYWX3YmiqIU8nl6THdprDK/k34y1GQrFFDk=
-----END BITCOIN SIGNED MESSAGE-----

It took 5 minutes in my laptop and less of 1 minute in main computer
That is cheap to do that, Actually I am doing it.

Although I don't know how albert did it, if the address 1BY8GQbBPGYEC58s9ckHmqf9doEX9mCKPR falls within the 67-bit range, it is undoubtedly no longer secure. It is possible to recover the public key from the signature and then recover the private key from the public key.

I tried to recover the public key using the following python script, but it seems to have generated incorrect public key. I think I didn't understand how the 65-byte signature operates. Perhaps albert can explain in detail how to recover the public key from the signature? Thanks a lot.

Code:
import base64
import hashlib
from coincurve import PublicKey


message_str = "15/01/2025 hotmoney"
signature_b64 = "H0J+wKAwGGMiVWHLuwEaZpLePkQAYx0HoTVvEZJu/wx3N6QYbUJMuajlj//yyjD7WLh42Ydlg+/vTJm50Td1LS0="

message_bytes = message_str.encode("utf-8")
msg_hash = hashlib.sha256(message_bytes).digest()
signature_raw = base64.b64decode(signature_b64)

r_s = signature_raw[1:65]
v_initial = signature_raw[0]

print("signature (hex):", signature_raw.hex())
print("initial recovery bit (hex) =", v_initial)
print("-" * 100)

possible_vs = [0, 1]

for v in possible_vs:
    sig_65 = r_s + bytes([v])
    try:
        pub = PublicKey.from_signature_and_message(
            signature=sig_65,
            message=msg_hash,
            hasher=None
        )
        print(f"v = {v} uncompressed pubkey (hex):{pub.format(compressed=False).hex()}")
        print(f"v = {v} compressed pubkey (hex):  {pub.format(compressed=True).hex()}")
        print("-" * 100)
    except Exception as e:
        print(f"v = {v} error: {e}")
        print("-" * 100)
hotmoney
Newbie
*
Offline Offline

Activity: 21
Merit: 0


View Profile
January 16, 2025, 03:21:17 PM
Last edit: January 16, 2025, 03:36:34 PM by hotmoney
 #7114

Of course, what prevents me from selling a script that I created, which has the correct functions for safe transfers without being stolen?

If I want to sell it, I won't give it away for free. I’m not foolish enough to hand over the ‘knife and the cheese’ to someone so they can benefit from it without my compensation. I’ve already tested it multiple times. Even

military-grade security measures haven’t succeeded in interfering with my transfers, which range from 66 to 100 bits—all tested and functioning perfectly."


C:\Users\dev\Desktop>python PUP.py
signature (hex): 1f427ec0a0301863225561cbbb011a6692de3e4400631d07a1356f11926eff0c7737a4186d424cb 9a8e58ffff2ca30fb58b878d9876583efef4c99b9d137752d2d
initial recovery bit (hex) = 31
----------------------------------------------------------------------------------------------------
v = 0 uncompressed pubkey (hex):04b784045a2e0c5d7852dd9794621600c2f161ed3d4189a71abd918c02eab22725707800f889d15 dedbd119ff0a77fb838c922391dcb54d2bdf999d5b9130fc11d
v = 0 compressed pubkey (hex):  03b784045a2e0c5d7852dd9794621600c2f161ed3d4189a71abd918c02eab22725
----------------------------------------------------------------------------------------------------
v = 1 uncompressed pubkey (hex):04a8d02d18f6f21246f3a51be2f5d6fa4c963280447dcaf44aca13565a2362c8db4ef8200033d12 d865199d99dc394201946dd92c7cc116c82a9b7888c972b70f9
v = 1 compressed pubkey (hex):  03a8d02d18f6f21246f3a51be2f5d6fa4c963280447dcaf44aca13565a2362c8db
----------------------------------------------------------------------------------------------------

your scrypt got the wrong keys

K0rvexX
Newbie
*
Offline Offline

Activity: 21
Merit: 0


View Profile
January 16, 2025, 03:30:32 PM
Last edit: January 16, 2025, 10:32:45 PM by Mr. Big
 #7115

And for those who still think that a hashing function is reversible, let me give you a quick rundown on why that's practically impossible.

A hashing function like SHA256 or RIPEMD160 or MD5 aren't encryption functions, meaning they are NOT meant to "hide" data so only someone with the correct keys could read it. They are only used for VERIFICATION, meaning they don't hold ANY information on the underlying data, but are simply used to represent a unique signature associated with that specific piece of data to detect alterations or tampering.

What makes them irreversible is that they completely disregard some parts of the data through the use of bit-shifting and mixing different keys. Take a modular function for example, N = m (mod k),  m still hold a piece of information related to N, but you can't recover N knowing m and k. Now combine that with conditional operations, boolean operations and so one, for 64 rounds. And there you have it, a 256bit string that just tells you the file or message is what it's claiming to be.

Focus your efforts on more software or hardware optimizations instead of wasting your time on mathematical paradoxes. That's the whole point of this challenge, to push creativity and ingenuity to its limits, not foster insanity and delusion.



Of course, what prevents me from selling a script that I created, which has the correct functions for safe transfers without being stolen?

If I want to sell it, I won't give it away for free. I’m not foolish enough to hand over the ‘knife and the cheese’ to someone so they can benefit from it without my compensation. I’ve already tested it multiple times. Even

military-grade security measures haven’t succeeded in interfering with my transfers, which range from 66 to 100 bits—all tested and functioning perfectly."



I too created a one of kind, state of the art, military grade, quantum immune, AI powered, blockchain mathematics, once in a millennia, [insert buzzword here] method that transfers funds in an instant with no fees cross-blockchain completely securely. I thoroughly tested it with my buddies in my basement and it completely works (source: trust me bro). I won't be giving it away since I want to profit from the code that chatgpt gave me in 2 minutes, that's why I'm selling it for 999 morbillion BTC.
hotmoney
Newbie
*
Offline Offline

Activity: 21
Merit: 0


View Profile
January 16, 2025, 03:40:02 PM
 #7116

K0rvexX.
It's funny, my friend. I'm just choosing to sell, and no, it wasn't created in ChatGPT, lol. That's for beginners. I'm not speaking ill of anyone, but all you do is criticize. Yes, I created my own method for withdrawals—it's immune to RBF and surcharges. That's it, my friend, nothing more. It's nothing like those fantasies you keep talking about.
Would you give something away for free that took hours of programming, testing, and even spending your own money to test?
and simply to not use third parties as a mara pool.
mcdouglasx
Hero Member
*****
Offline Offline

Activity: 938
Merit: 522



View Profile WWW
January 16, 2025, 03:46:37 PM
 #7117

Of course, what prevents me from selling a script that I created, which has the correct functions for safe transfers without being stolen?

If I want to sell it, I won't give it away for free. I’m not foolish enough to hand over the ‘knife and the cheese’ to someone so they can benefit from it without my compensation. I’ve already tested it multiple times. Even

military-grade security measures haven’t succeeded in interfering with my transfers, which range from 66 to 100 bits—all tested and functioning perfectly."



You are in the least opportune group to make such claims. Bitcoin follows a set of rules for making transactions, which are already well known and well documented. There is no way to make a transaction (tx), expose a public key (in the case of puzzles) and build a tx without it being replaceable. Once the public key is exposed, it can be replaced by anyone who has the private key. However, the tx can be hidden before its confirmation in only two cases: by mining your own block or by using https://slipstream.mara.com/

█████████████████████████
█████████████████████████
███████▀█████████▀███████
█████████████████████████
█████████████████████████
████████████▀████████████
███████▀███████▄███████
███████████▄▄▄███████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████

 2UP.io 
NO KYC
CASINO
██████████████████████████
████████████████████████
███████████████████████
███████████████████
██████████████████████
███████████████████████
███████████████████████
██████████████████
███████████████████████
██████████████████
███████████████████████
████████████████████████
██████████████████████████
███████████████████████████████████████████████████████████████████████████████████████
 
FASTEST-GROWING CRYPTO
CASINO & SPORTSBOOK

 

███████████████████████████████████████████████████████████████████████████████████████
███████████████████████████
█████████████████████████
███████████████████████
███████████████████████
████████████████████████
███████████████████████
███████████████████████
██████████████████████
████████████████████████
███████████████████████
███████████████████████
█████████████████████████
███████████████████████████
 

...PLAY NOW...
hotmoney
Newbie
*
Offline Offline

Activity: 21
Merit: 0


View Profile
January 16, 2025, 03:49:58 PM
 #7118

Okay, I respect your knowledge, but I created a third option that I use to handle my friends' transactions, and that's it. I’ve spent enough time testing it and even offered you the chance to test it as well, but that's okay. I’ll take my leave now. Hugs!
iceland2k14
Member
**
Offline Offline

Activity: 76
Merit: 89


View Profile
January 16, 2025, 03:58:34 PM
 #7119

Maybe he is talking about setting the sequence filed to maximum value when making the first transaction to finalize it and precluding any further updates.

hotmoney
Newbie
*
Offline Offline

Activity: 21
Merit: 0


View Profile
January 16, 2025, 04:01:18 PM
Last edit: January 16, 2025, 05:04:16 PM by hotmoney
 #7120

In the end, an optimistic and intelligent guy and that's pretty much it, but I managed to get something even better.
the only thing that works is a CPFP (Child Pays for Parent) from the receiving party

Why, after sending it with my transaction, was nobody able to override it, not even with maximum fees? It really worked. The only thing that accelerated it was CPFP from others, separately, to speed it up. I set the fee very low, almost like an OCM block with a low value, and no one could override it with RBF, as that function is completely blocked. However, I adapted a few things to make it work. I studied the DER signature and its correct sizes. Even the transaction itself must have the correct size to function properly.
Pages: « 1 ... 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 [356] 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 ... 639 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!