Bitcoin Forum
April 02, 2026, 12:21:29 PM *
News: Latest Bitcoin Core release: 30.2 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 [377] 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 ... 648 »
  Print  
Author Topic: Bitcoin puzzle transaction ~32 BTC prize to who solves it  (Read 377187 times)
mcdouglasx
Hero Member
*****
Offline Offline

Activity: 952
Merit: 532



View Profile WWW
February 25, 2025, 04:02:22 AM
 #7521

Did you read his methodology? It wasn't only random scanning and lots of GPU's.

The method was:

Break up puzzle 67's keyspace into 256 sub-ranges each with 2^58 keys
In each sub range, save every private key that generates an address starting with 48 zero's
Statistically there are 1024 proofs in each subrange
If an average of 1024 proofs are found in a sub-range, it statistically guarantees the whole sub-range has been scanned

You must cite the argument you are referring to here in order to cross-check and validate the information; otherwise, it can be misinterpreted. So according to this, was it a pattern search using bits?.

but...

I don't wan't to be disrespectful to anyone, but most of the theories I see here about patterns look crazy to me.
The ONLY way I could see a pattern between puzzles is if the creator messed up the randomess (unsecure RNG, predictable seed choice, etc...) and I really don't think he would make such a mistake.

I'm not sure if it really refers to prefix search as well. In any case, the only search options would be:

1- scan the entire range.
2- random search.
3- probabilistic search based on prefixes.

All these ideas have been discussed here, so the code is the least important part. Once the idea is created, anyone can replicate it.
walletrecovery
Copper Member
Member
**
Offline Offline

Activity: 514
Merit: 38


View Profile
February 25, 2025, 04:33:30 AM
Last edit: February 25, 2025, 10:17:05 PM by Mr. Big
 #7522

https://btcpuzzle.info/puzzle/67
It's hard to believe that Puzzle 67 was opened by simple enthusiasts and not by the creators themselves, since the pool was often attacked by DDOS and 6,69% of the range was already passed, and since the creators of the puzzles know the private key, they can easily monitor how close the pool participants got, so they could easily take their coins themselves under the guise of someone finding them, so this is most likely a scam than some kind of honest competition. Who wants to give strangers more than half a million dollars, it's unrealistic! Let's think about it. Does anyone doubt that this is how things are or do you think everything is honest?

It was open by me, and I'm not the creator of the puzzle.
Let's put those conspiracy theories to rest.

What program did you use for scanning and what equipment do you have, if these are video cards, then which ones and how many? Can you make a transaction to my wallet to prove your words???
What power did you use, how long did it take you to scan the ranges, where did you look for the key, in a pool or solo, and how will you prove that you were the one who opened puzzle 67? Thanks!



I see, one more question how many GPUs did you use to find it?
[/quote]

Several thousand
[/quote]

Show us your video cards, several thousand, you are lying, you are from the team of creators who created and know the private key and you are just mocking us here, it is very funny!

Bram24732
Member
**
Offline Offline

Activity: 322
Merit: 28


View Profile
February 25, 2025, 06:39:00 AM
Merited by kTimesG (3)
 #7523

Guys, stop trying to pressure the solver into doing anything. If you're nice, maybe he will stay and you can learn something from him.
We are all grateful for WP's post, sharing a method to securely withdraw a puzzle prize. Nobody is obligated to tip anyone just because you used MARA. You can always show your appreciation for what you've learned by directly sending a tip yourself.

It is not about a donation; that is up to each person if they feel like donating or not. It is more about valuing the contributions and not undermining them. He talks as if it were a 100% original milestone. It is obvious that his solution is just a method already exposed here, and its only advantage was great computing power. So, unless it is something else, the answer is simple: he has nothing to teach us that we do not already know. From what he says, random method with thousands of GPUs are things we already know. I suppose the most he could have added to the software is a database that records already scanned sectors to skip them later.

That's spot on. I did not invent anything because there is nothing to invent. None of the pattern theories I've read here are based on math or statistics, just wishful thinking.
The proofs I posted on Github are just a consequence of full random scan, they are not a method. They are the consequence of me scanning the whole range and are only useful to prove that I did so.

I did not come here to teach anyone anything, you have a few members like WP who know their stuff and do that very well already.

To the MARA WP donation crew : Stop thinking this forum is the only place in the world that knows about slipstream and it's some kind of secret weapon. The release of their service was heavily discussed in many news articles and podcasts back then. I don't ask you for a donation each time you make a post on facebook because I made a tutorial to do so on an obscure forum in 2005.

I solved 67 and 68 using custom software distributing the load across ~25k GPUs. 4090 stocks speeds : ~8.1Bkeys/sec. Don’t challenge me technically if you know shit about fuck, I’ll ignore you. Same goes if all you can do is LLM reply.
kTimesG
Full Member
***
Offline Offline

Activity: 784
Merit: 242


View Profile
February 25, 2025, 09:18:55 AM
 #7524

Let's recap the main methods:

1. Magic-based

- Adobe Illustrator number horoscopes, misc. font sizes, arrows everywhere
- magic number patterns in hexagons, squares, rectangles;
- adding "hex" numbers left and right, maybe mix in decimals as well, so that we can fit somehow solutions


2. Random methods

- sliders to choose hex digits, maybe we get lucky by clicking the mouse!
- Python scripts that sit idle in background (we all like quiet environment, right?)
- pick random ranges, or random keys - ignore completely that testing 2/3/4/5/6/...N times the same keys or ranges becomes inevitable really, really quick, why care?!

3. Probabilities

- backward statistics: if something is probable, and it happens, than it can still be analyzed as if it was just probable, right? Sure.
- uniform distribution: if something is totally random, then it matters what values it ended up with (and also when), and hence we can predict where & when it's not likely to be repeated
- the keys must not look "not random": very low chances that the solution is key 0x1, or key 32768, 16777216, and so on. Because too many zero or one bits in a row. Even better, do the same with base-10 digits, or upgrade to using hex char strings. Also, invent some alphabet where hex digits are case-sensitive, and let everyone else figure out WTF you smoked.

4. Mystical

- hashes are broken; NSA has the backdoor to SHA256
- there is a hidden relation between secp256k1 formula and RIPEMD160 bits: this makes all sorts of statistical theories to not apply
- neural networks can be trained to predict the keys, because they are really so intelligent that they can predict the future.

5. A shitload of computing power, scanning the ranges just once by splitting the work. Keep some proof of work for each range, like keys for a fixed number of leading zeros. Laugh thinking that some people may interpret this as proof of backward statistics (maybe combined with mystical key-to-hash relationship) as the main reason of why the correct key was eventually found after around 50% checked keys.

Off the grid, training pigeons to broadcast signed messages.
frozenen
Newbie
*
Offline Offline

Activity: 46
Merit: 0


View Profile
February 25, 2025, 09:32:06 AM
 #7525

Let's recap the main methods:

1. Magic-based

- Adobe Illustrator number horoscopes, misc. font sizes, arrows everywhere
- magic number patterns in hexagons, squares, rectangles;
- adding "hex" numbers left and right, maybe mix in decimals as well, so that we can fit somehow solutions


2. Random methods

- sliders to choose hex digits, maybe we get lucky by clicking the mouse!
- Python scripts that sit idle in background (we all like quiet environment, right?)
- pick random ranges, or random keys - ignore completely that testing 2/3/4/5/6/...N times the same keys or ranges becomes inevitable really, really quick, why care?!

3. Probabilities

- backward statistics: if something is probable, and it happens, than it can still be analyzed as if it was just probable, right? Sure.
- uniform distribution: if something is totally random, then it matters what values it ended up with (and also when), and hence we can predict where & when it's not likely to be repeated
- the keys must not look "not random": very low chances that the solution is key 0x1, or key 32768, 16777216, and so on. Because too many zero or one bits in a row. Even better, do the same with base-10 digits, or upgrade to using hex char strings. Also, invent some alphabet where hex digits are case-sensitive, and let everyone else figure out WTF you smoked.

4. Mystical

- hashes are broken; NSA has the backdoor to SHA256
- there is a hidden relation between secp256k1 formula and RIPEMD160 bits: this makes all sorts of statistical theories to not apply
- neural networks can be trained to predict the keys, because they are really so intelligent that they can predict the future.

5. A shitload of computing power, scanning the ranges just once by splitting the work. Keep some proof of work for each range, like keys for a fixed number of leading zeros. Laugh thinking that some people may interpret this as proof of backward statistics (maybe combined with mystical key-to-hash relationship) as the main reason of why the correct key was eventually found after around 50% checked keys.


Hey I like Magic-based methods , I still have the wheel of fortune!
Niekko
Jr. Member
*
Offline Offline

Activity: 49
Merit: 11


View Profile
February 25, 2025, 12:52:35 PM
 #7526

Let's recap the main methods:

1. Magic-based

- Adobe Illustrator number horoscopes, misc. font sizes, arrows everywhere
- magic number patterns in hexagons, squares, rectangles;
- adding "hex" numbers left and right, maybe mix in decimals as well, so that we can fit somehow solutions


2. Random methods

- sliders to choose hex digits, maybe we get lucky by clicking the mouse!
- Python scripts that sit idle in background (we all like quiet environment, right?)
- pick random ranges, or random keys - ignore completely that testing 2/3/4/5/6/...N times the same keys or ranges becomes inevitable really, really quick, why care?!

3. Probabilities

- backward statistics: if something is probable, and it happens, than it can still be analyzed as if it was just probable, right? Sure.
- uniform distribution: if something is totally random, then it matters what values it ended up with (and also when), and hence we can predict where & when it's not likely to be repeated
- the keys must not look "not random": very low chances that the solution is key 0x1, or key 32768, 16777216, and so on. Because too many zero or one bits in a row. Even better, do the same with base-10 digits, or upgrade to using hex char strings. Also, invent some alphabet where hex digits are case-sensitive, and let everyone else figure out WTF you smoked.

4. Mystical

- hashes are broken; NSA has the backdoor to SHA256
- there is a hidden relation between secp256k1 formula and RIPEMD160 bits: this makes all sorts of statistical theories to not apply
- neural networks can be trained to predict the keys, because they are really so intelligent that they can predict the future.

5. A shitload of computing power, scanning the ranges just once by splitting the work. Keep some proof of work for each range, like keys for a fixed number of leading zeros. Laugh thinking that some people may interpret this as proof of backward statistics (maybe combined with mystical key-to-hash relationship) as the main reason of why the correct key was eventually found after around 50% checked keys.


... you forgot the improbable mathematical solutions.  Grin


7xminer
Newbie
*
Offline Offline

Activity: 38
Merit: 0


View Profile
February 25, 2025, 01:45:04 PM
 #7527

Let's recap the main methods:

1. Magic-based

- Adobe Illustrator number horoscopes, misc. font sizes, arrows everywhere
- magic number patterns in hexagons, squares, rectangles;
- adding "hex" numbers left and right, maybe mix in decimals as well, so that we can fit somehow solutions


2. Random methods

- sliders to choose hex digits, maybe we get lucky by clicking the mouse!
- Python scripts that sit idle in background (we all like quiet environment, right?)
- pick random ranges, or random keys - ignore completely that testing 2/3/4/5/6/...N times the same keys or ranges becomes inevitable really, really quick, why care?!

3. Probabilities

- backward statistics: if something is probable, and it happens, than it can still be analyzed as if it was just probable, right? Sure.
- uniform distribution: if something is totally random, then it matters what values it ended up with (and also when), and hence we can predict where & when it's not likely to be repeated
- the keys must not look "not random": very low chances that the solution is key 0x1, or key 32768, 16777216, and so on. Because too many zero or one bits in a row. Even better, do the same with base-10 digits, or upgrade to using hex char strings. Also, invent some alphabet where hex digits are case-sensitive, and let everyone else figure out WTF you smoked.

4. Mystical

- hashes are broken; NSA has the backdoor to SHA256
- there is a hidden relation between secp256k1 formula and RIPEMD160 bits: this makes all sorts of statistical theories to not apply
- neural networks can be trained to predict the keys, because they are really so intelligent that they can predict the future.

5. A shitload of computing power, scanning the ranges just once by splitting the work. Keep some proof of work for each range, like keys for a fixed number of leading zeros. Laugh thinking that some people may interpret this as proof of backward statistics (maybe combined with mystical key-to-hash relationship) as the main reason of why the correct key was eventually found after around 50% checked keys.


I liked the magic-method. LOL  Cheesy Cheesy Cheesy
zahid888
Member
**
Offline Offline

Activity: 335
Merit: 24

the right steps towards the goal


View Profile
February 25, 2025, 02:22:40 PM
 #7528


puzzle: 66 HuhHuh?? Possibilities : ??



puzzle: 67 HuhHuh?? Possibilities : ??


In my previous two posts, a question mark turned into an answer. As I mentioned, there are 5 to 20 possible starting points, and the answer is...

puzzle: 66 2832ed74 Possibilities : 10         puzzle: 67 730fc235 Possibilities : 13

   Seed : 1198740450 KHex : 2832ed74            Seed : 2113081982 KHex : 730fc235
   Seed : 1869248704 KHex : 2832ed74            Seed : 2179848786 KHex : 730fc235
   Seed : 3920977047 KHex : 2832ed74            Seed : 2620256395 KHex : 730fc235
   Seed : 4138865358 KHex : 2832ed74            Seed : 3559516538 KHex : 730fc235
   Seed : 5491054614 KHex : 2832ed74            Seed : 5559894373 KHex : 730fc235
   Seed : 5889540521 KHex : 2832ed74            Seed : 5960477113 KHex : 730fc235
   Seed : 6227837743 KHex : 2832ed74            Seed : 6204436682 KHex : 730fc235
   Seed : 7311367263 KHex : 2832ed74            Seed : 7016671995 KHex : 730fc235
   Seed : 7442940504 KHex : 2832ed74            Seed : 8305603871 KHex : 730fc235
   Seed : 8850149776 KHex : 2832ed74            Seed : 8560029709 KHex : 730fc235
                                                Seed : 8633074902 KHex : 730fc235
                                                Seed : 9737552820 KHex : 730fc235
                                                Seed : 9997208084 KHex : 730fc235


Higher Probability of Success – Brute force requires exact matching, while this method increases chances by working with 5 to 20 potential seeds rather than the entire massive keyspace. still applies on Puzzle 68

@Bram24732...... Belated congratulations!

1BGvwggxfCaHGykKrVXX7fk8GYaLQpeixA
dastic
Jr. Member
*
Offline Offline

Activity: 35
Merit: 1


View Profile
February 25, 2025, 03:00:00 PM
 #7529


puzzle: 66 HuhHuh?? Possibilities : ??



puzzle: 67 HuhHuh?? Possibilities : ??


In my previous two posts, a question mark turned into an answer. As I mentioned, there are 5 to 20 possible starting points, and the answer is...

puzzle: 66 2832ed74 Possibilities : 10         puzzle: 67 730fc235 Possibilities : 13

   Seed : 1198740450 KHex : 2832ed74            Seed : 2113081982 KHex : 730fc235
   Seed : 1869248704 KHex : 2832ed74            Seed : 2179848786 KHex : 730fc235
   Seed : 3920977047 KHex : 2832ed74            Seed : 2620256395 KHex : 730fc235
   Seed : 4138865358 KHex : 2832ed74            Seed : 3559516538 KHex : 730fc235
   Seed : 5491054614 KHex : 2832ed74            Seed : 5559894373 KHex : 730fc235
   Seed : 5889540521 KHex : 2832ed74            Seed : 5960477113 KHex : 730fc235
   Seed : 6227837743 KHex : 2832ed74            Seed : 6204436682 KHex : 730fc235
   Seed : 7311367263 KHex : 2832ed74            Seed : 7016671995 KHex : 730fc235
   Seed : 7442940504 KHex : 2832ed74            Seed : 8305603871 KHex : 730fc235
   Seed : 8850149776 KHex : 2832ed74            Seed : 8560029709 KHex : 730fc235
                                                Seed : 8633074902 KHex : 730fc235
                                                Seed : 9737552820 KHex : 730fc235
                                                Seed : 9997208084 KHex : 730fc235


Higher Probability of Success – Brute force requires exact matching, while this method increases chances by working with 5 to 20 potential seeds rather than the entire massive keyspace. still applies on Puzzle 68

@Bram24732...... Belated congratulations!

But how did you get the seeds if you don't know the starting hex?
nomachine
Full Member
***
Offline Offline

Activity: 812
Merit: 134



View Profile
February 25, 2025, 05:09:39 PM
 #7530

A shitload of computing power

This is where the fun begins and ends for fools who are full of money.



Spending a fortune on a problem without a second thought, completely indifferent to whether it all goes up in smoke or not..It's hard to understand how anyone could have turned a profit from it.

Was it all just for fun? Grin

The British band The KLF burned one million pounds sterling in cash as part of an art performance.

Maybe this is part of some artistic performance.

BTC: bc1qdwnxr7s08xwelpjy3cc52rrxg63xsmagv50fa8
Akito S. M. Hosana
Jr. Member
*
Offline Offline

Activity: 420
Merit: 8


View Profile
February 25, 2025, 05:25:31 PM
 #7531

Maybe this is part of some artistic performance.


It reminds me more of a circus.  Cheesy
0x1FFFFFF
Newbie
*
Offline Offline

Activity: 9
Merit: 0


View Profile
February 25, 2025, 05:26:33 PM
 #7532


puzzle: 66 HuhHuh?? Possibilities : ??



puzzle: 67 HuhHuh?? Possibilities : ??


In my previous two posts, a question mark turned into an answer. As I mentioned, there are 5 to 20 possible starting points, and the answer is...

puzzle: 66 2832ed74 Possibilities : 10         puzzle: 67 730fc235 Possibilities : 13

   Seed : 1198740450 KHex : 2832ed74            Seed : 2113081982 KHex : 730fc235
   Seed : 1869248704 KHex : 2832ed74            Seed : 2179848786 KHex : 730fc235
   Seed : 3920977047 KHex : 2832ed74            Seed : 2620256395 KHex : 730fc235
   Seed : 4138865358 KHex : 2832ed74            Seed : 3559516538 KHex : 730fc235
   Seed : 5491054614 KHex : 2832ed74            Seed : 5559894373 KHex : 730fc235
   Seed : 5889540521 KHex : 2832ed74            Seed : 5960477113 KHex : 730fc235
   Seed : 6227837743 KHex : 2832ed74            Seed : 6204436682 KHex : 730fc235
   Seed : 7311367263 KHex : 2832ed74            Seed : 7016671995 KHex : 730fc235
   Seed : 7442940504 KHex : 2832ed74            Seed : 8305603871 KHex : 730fc235
   Seed : 8850149776 KHex : 2832ed74            Seed : 8560029709 KHex : 730fc235
                                                Seed : 8633074902 KHex : 730fc235
                                                Seed : 9737552820 KHex : 730fc235
                                                Seed : 9997208084 KHex : 730fc235



Hi @zahid888. I am curious about this from last year.. I even write some python script to try to understand this, but still didnt get that :

Code:
import hashlib
from ecdsa import SigningKey, SECP256k1
import binascii
import base58
import random
import time

def set_random_seed(manual_seed=None):
    if manual_seed is not None:
        random.seed(manual_seed)
    else:
        # Auto seed between 1000000000 to 9999999999
        random_seed = random.randint(1000000000, 9999999999)
        random.seed(random_seed)
        print(f"Auto Generated Seed: {random_seed}")

def get_random_private_key(start_range, end_range):
    return random.randint(start_range, end_range)

def private_key_to_public_key(private_key_hex):
    signing_key = SigningKey.from_string(bytes.fromhex(private_key_hex), curve=SECP256k1)
    verifying_key = signing_key.get_verifying_key()
    pub_key = verifying_key.to_string("compressed")
    return pub_key

def public_key_to_address(public_key):
    sha256_hash = hashlib.sha256(public_key).digest()
    ripemd160_hash = hashlib.new('ripemd160')
    ripemd160_hash.update(sha256_hash)
    hash160 = ripemd160_hash.digest()
    version_hash160 = b'\x00' + hash160
    double_sha256 = hashlib.sha256(hashlib.sha256(version_hash160).digest()).digest()
    binary_address = version_hash160 + double_sha256[:4]
    address = base58.b58encode(binary_address).decode('utf-8')
    return address

def generate_address_from_private_key(private_key_int):
    private_key_hex = format(private_key_int, '064x')
    public_key = private_key_to_public_key(private_key_hex)
    address = public_key_to_address(public_key)
    return {
        'private_key': private_key_hex,
        'address': address
    }

def generate_from_bit_range(bit_number):
    start_range = 2 ** (bit_number - 1)
    end_range = (2 ** bit_number) - 1
    private_key_int = get_random_private_key(start_range, end_range)
    result = generate_address_from_private_key(private_key_int)
   
    print(f"\nBit {bit_number}")
    print(f"Range: {hex(start_range)[2:]}:{hex(end_range)[2:]}")
    print(f"Address: {result['address']}")
    print(f"Private Key: {result['private_key']}")
    print("-" * 80)
    return result

def main():
    while True:
        print("\nSelect seed option:")
        print("\n1. Manual seed (input your own number)")
        print("2. Auto seed (random between 1000000000 to 9999999999)")
        print("3. Exit")
       
        choice = input("\nEnter your choice (1-3): ")
       
        if choice == "1":
            try:
                seed = int(input("Enter your seed number: "))
                set_random_seed(seed)
            except ValueError:
                print("Invalid input. Please enter a valid number.")
                continue
        elif choice == "2":
            set_random_seed()
        elif choice == "3":
            print("Exiting program...")
            break
        else:
            print("Invalid choice. Please select 1, 2, or 3.")
            continue
       
        print("\n=== Random Generation from Bit Ranges ===")
        for bit in range(1, 70):
            generate_from_bit_range(bit)

if __name__ == "__main__":
    main()
Kelvin555
Jr. Member
*
Offline Offline

Activity: 63
Merit: 1


View Profile
February 25, 2025, 06:31:24 PM
 #7533

If you do the calculation, puzzle 67 solver only realized a lot of losses,
67 days x 24 hours x several thousand GPUs = more than puzzle 67 price. I think that's why he is not giving any donations right now.
Desyationer
Jr. Member
*
Offline Offline

Activity: 64
Merit: 2


View Profile
February 25, 2025, 06:36:16 PM
 #7534

The profitability of Puzzle 67 can be assessed using AI, and it turns out to be quite profitable, maybe even 68.

At a speed of 7 Terrakeys, approximately 1,750 RTX 4090 GPUs with undervolting to 350 W would be required.

🔹 Power Consumption:

Total power: 612.5 kW
Runtime: 67 days (1,608 hours)
Total consumption: 984,900 kWh
🔹 Electricity Costs:

USA (0.19 USD/kWh): 187,131 USD
UK (0.318 USD/kWh): 313,198 USD (≈244,686 GBP)
These costs vary by region and tariff, but the USA and the UK remain among the most expensive places for electricity.
Kelvin555
Jr. Member
*
Offline Offline

Activity: 63
Merit: 1


View Profile
February 25, 2025, 06:38:59 PM
 #7535

The profitability of Puzzle 67 can be assessed using AI, and it turns out to be quite profitable, maybe even 68.

At a speed of 7 Terrakeys, approximately 1,750 RTX 4090 GPUs with undervolting to 350 W would be required.

🔹 Power Consumption:

Total power: 612.5 kW
Runtime: 67 days (1,608 hours)
Total consumption: 984,900 kWh
🔹 Electricity Costs:

USA (0.19 USD/kWh): 187,131 USD
UK (0.318 USD/kWh): 313,198 USD (≈244,686 GBP)
These costs vary by region and tariff, but the USA and the UK remain among the most expensive places for electricity.

1,750 RTX 4090s rented for 67 days or bought is more than puzzle 67 price.
Desyationer
Jr. Member
*
Offline Offline

Activity: 64
Merit: 2


View Profile
February 25, 2025, 06:42:14 PM
 #7536

If the GPUs are free for them—let's say it's some AI organization whose computing power the solver has access to—then paid rental is madness.
hoanghuy2912
Newbie
*
Offline Offline

Activity: 60
Merit: 0


View Profile
February 25, 2025, 07:29:24 PM
 #7537

The profitability of Puzzle 67 can be assessed using AI, and it turns out to be quite profitable, maybe even 68.

At a speed of 7 Terrakeys, approximately 1,750 RTX 4090 GPUs with undervolting to 350 W would be required.

🔹 Power Consumption:

Total power: 612.5 kW
Runtime: 67 days (1,608 hours)
Total consumption: 984,900 kWh
🔹 Electricity Costs:

USA (0.19 USD/kWh): 187,131 USD
UK (0.318 USD/kWh): 313,198 USD (≈244,686 GBP)
These costs vary by region and tariff, but the USA and the UK remain among the most expensive places for electricity.

1,750 RTX 4090s rented for 67 days or bought is more than puzzle 67 price.
he is obviously lying, lol
kTimesG
Full Member
***
Offline Offline

Activity: 784
Merit: 242


View Profile
February 25, 2025, 08:01:06 PM
 #7538

For those who didn't catch on this yet, the 67 solver wants to use RetiredCoder's skills to go after 135, since the amount of computing power to break 135 is pretty much what he used to break 67.

Or he wants to rent the GPUs to him to make up for his losses, lol.

Off the grid, training pigeons to broadcast signed messages.
zahid888
Member
**
Offline Offline

Activity: 335
Merit: 24

the right steps towards the goal


View Profile
February 25, 2025, 08:19:51 PM
Last edit: February 25, 2025, 08:34:38 PM by zahid888
 #7539

Hi @zahid888. I am curious about this from last year.. I even write some python script to try to understand this, but still didnt get that :

It’s just a few lines of code, bro—why overcomplicate it?  Remember, it’s only for generating the starting point!

Below is full demonstration & Code

Demo:



Code:
import random
import subprocess

print('''\n\n      Demo By Zahid888\n
puzzle: 67 730fc235 Possibilities : 13\n
Seed : 2113081982 KHex : 730fc235
Seed : 2179848786 KHex : 730fc235
Seed : 2620256395 KHex : 730fc235
Seed : 3559516538 KHex : 730fc235
Seed : 5559894373 KHex : 730fc235
Seed : 5960477113 KHex : 730fc235
Seed : 6204436682 KHex : 730fc235
Seed : 7016671995 KHex : 730fc235
Seed : 8305603871 KHex : 730fc235
Seed : 8560029709 KHex : 730fc235
Seed : 8633074902 KHex : 730fc235
Seed : 9737552820 KHex : 730fc235
Seed : 9997208084 KHex : 730fc235\n\n''')
while True:
    x = input('seed integer : ')
    seed_value = int(x)
    random.seed(seed_value)
    seed = str(seed_value)
    a = random.randrange(2**30, 2**31)
    random_start = "%00x" % a
    random_range = (random_start+"000000000:"+random_start+"fffffffff")
    print('\nSeed : ' + str(x) + ' KHex : ' + str(random_start) + '\n')
    cmd_command =('BitCrack.exe -b 128 -t 256 -p 512 --keyspace '+random_range+' 1BY8GQbnueYofwSuFAT3USAhGjPrkxDdW9\n')
    subprocess.call(cmd_command, shell=True)

If you do the calculation, puzzle 67 solver only realized a lot of losses,
67 days x 24 hours x several thousand GPUs = more than puzzle 67 price. I think that's why he is not giving any donations right now.

There’s a big difference between someone posting a youtube tutorial in 2005 and someone introducing an idea at the right time and right place, @Wondrig philosopher didn’t just share information—he brought forward a solution when it was needed the most.

Innovations aren't always about inventing something entirely new; sometimes, they’re about applying knowledge when it is truly needed.

Anyway...

Hi @zahid888. I am curious about this from last year.. I even write some python script to try to understand this, but still didnt get that :

Hey Bro, welcome to the black hole! Cheesy Just a friendly reminder—if you win, I definitely expect an appreciation fee... Fair trade, right?  Grin Grin

1BGvwggxfCaHGykKrVXX7fk8GYaLQpeixA
Bram24732
Member
**
Offline Offline

Activity: 322
Merit: 28


View Profile
February 25, 2025, 08:32:03 PM
 #7540

For those who didn't catch on this yet, the 67 solver wants to use RetiredCoder's skills to go after 135, since the amount of computing power to break 135 is pretty much what he used to break 67.

Or he wants to rent the GPUs to him to make up for his losses, lol.

What makes you think that ?

I solved 67 and 68 using custom software distributing the load across ~25k GPUs. 4090 stocks speeds : ~8.1Bkeys/sec. Don’t challenge me technically if you know shit about fuck, I’ll ignore you. Same goes if all you can do is LLM reply.
Pages: « 1 ... 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 [377] 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 ... 648 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!