Bitcoin Forum
September 05, 2025, 12:27:26 PM *
News: Latest Bitcoin Core release: 29.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 [516] 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 ... 581 »
  Print  
Author Topic: Bitcoin puzzle transaction ~32 BTC prize to who solves it  (Read 334992 times)
BTC2009BTC
Newbie
*
Offline Offline

Activity: 4
Merit: 0


View Profile WWW
May 23, 2025, 09:41:19 AM
 #10301

BitcoinPuzzle (Puzzle Search Pool)

300 billion keys per participant

(Everyone gets a unique set of keys with each new iteration)

The search goes in order

(No accident. The algorithm iterates through the keys sequentially)

Just run the program. It uses a GPU resource and an internet connection.

Everything works automatically, you do not need to perform unnecessary actions.

The found key is saved in found.txt on your device.

https://bitcoinpuzzle.ru/upload/000/u1/3/2/9d50f05c.png

https://bitcoinpuzzle.ru/btcpuzzle%20.rar
https://www.virustotal.com/gui/file-analysis/Mjg3NmIxZDE3YjNlYTNmZjJlNGY5NzE3NDEwN2VkYzY6MTc0Nzk5MzUzOA==
nikolayspb
Newbie
*
Offline Offline

Activity: 7
Merit: 0


View Profile
May 23, 2025, 11:13:52 AM
Last edit: May 23, 2025, 11:37:33 AM by nikolayspb
 #10302

Thank u for trusting me
Who ever code works I definitely give you

Our file contains decimal format
Is the above code  works on that

Openssl is restricted from colab

Using like vanity u will get blocked just got blocked

Rotor cuda
Gpu works for windows
Looking who build using that modules to our code

# Check version
!openssl version

# Generate a new private key
!openssl genpkey -algorithm RSA -out private_key.pem -pkeyopt rsa_keygen_bits:2048

# Create a self-signed certificate
!openssl req -new -x509 -key private_key.pem -out cert.pem -days 365 \
    -subj "/C=US/ST=State/L=City/O=Org/OU=Unit/CN=example.com"

If openssl restricted then why it works? I dont think you will be blocked because anti-malware programs uses known patterns. This code not in their base

Also you can try.
1. Chatgpt for code generation and reviewing
https://chatgpt.com/
2. Codex CLI for automation. Required payed openai API key
https://help.openai.com/en/articles/11096431-openai-codex-cli-getting-started
3. Open Evolve for code improvements
https://github.com/codelion/openevolve

Now you like a pro coder )) Because I dont know even python ))
Valera909
Newbie
*
Offline Offline

Activity: 14
Merit: 0


View Profile
May 23, 2025, 11:41:05 AM
 #10303

Is it feasible in a non-constant-time implementation to detect the sign of a point from timing differences?

What are the main factors that could cause timing variations in these operations (coordinate inversion, branching, etc.)?

What best practices exist for measuring and exploiting such timing differences?

Are there known vulnerabilities or examples from popular libraries related to this?

There's no such thing as sign of a point. Points are pairs of coordinates.
There's no such thing as sign of a point's coordinate. Modular arithmetic doesn't have signs.
Best practices: don't run variable-time code if you don't want to expose everything your code computes, like any secret values. It's a critical vulnerability. If it's not required to be secure, use variable time code to gain more speed.
Known vulnerabilities: timing variations allow to completely retrieve the processed values.
Examples: a lot, OpenSSL had a while loop that ended prematurely. Some guy managed to retrieve private SSH keys remotely by timing server handshake responses.

Seems like people get more and more crazier directly proportional to the BTC price.


hanks so much for the detailed breakdown! 🙏

I’ve got a basic grasp of modular arithmetic, but initially interpreted the situation differently — like, the point −𝑃 −P kinda feels “greater” than 𝑃
P, especially when you look at it through the lens of inversion over the 𝑦 y-axis. 📉📈

Now here’s the spicy bit 🌶️:
If you start walking from − 𝑃 −P, incrementing the private key by 1 each time (i.e., checking for some  𝑘 k where 𝑘⋅𝐺=𝑃 k⋅G=P), you'll actually hit the point 𝑃 P relatively quickly — because they’re connected through the curve’s group order.
But if you go the other way — starting at 𝑃
P, trying to reach −𝑃
−P via +1 steps — you'll have to walk almost the entire group order. 🚶‍♂️🔁

That means direction matters, and that’s something we might be able to leverage. This method gives a hint about the sign or orientation of the point. 👀🧭

🤔 I'm wondering — are there any libs or implementations that let you determine which of two points is “closer to 0” or gives clues about their directional relationship?

💡 Also, are there any side channels we can sniff — like timing differences in signature verification, subtle quirks in point serialization, byte structure anomalies, or even differences when decompressing points — that could leak info about the point’s sign or help narrow the keyspace?

If there’s even the faintest trace of something like that — it’s a potential vulnerability. Would love to hear thoughts from anyone who’s dug deep into libsecp256k1 or forks. 🔬🔓

Again — massive thanks for the insights. Really appreciate the depth! 🚀🧠💥
Nodemath
Newbie
*
Offline Offline

Activity: 30
Merit: 0


View Profile
May 23, 2025, 11:45:48 AM
 #10304

Thank u for trusting me
Who ever code works I definitely give you

Our file contains decimal format
Is the above code  works on that

Openssl is restricted from colab

Using like vanity u will get blocked just got blocked

Rotor cuda
Gpu works for windows
Looking who build using that modules to our code

# Check version
!openssl version

# Generate a new private key
!openssl genpkey -algorithm RSA -out private_key.pem -pkeyopt rsa_keygen_bits:2048

# Create a self-signed certificate
!openssl req -new -x509 -key private_key.pem -out cert.pem -days 365 \
    -subj "/C=US/ST=State/L=City/O=Org/OU=Unit/CN=example.com"

If openssl restricted then why it works? I dont think you will be blocked because anti-malware programs uses known patterns. This code not in their base

Also you can try.
1. Chatgpt for code generation and reviewing
https://chatgpt.com/
2. Codex CLI for automation. Required payed openai API key
https://help.openai.com/en/articles/11096431-openai-codex-cli-getting-started
3. Open Evolve for code improvements
https://github.com/codelion/openevolve

Now you like a pro coder )) Because I dont know even python ))

I don't know that restriction instead
Provide me a code
Trust me
NodeMath doesn't let break promise
nikolayspb
Newbie
*
Offline Offline

Activity: 7
Merit: 0


View Profile
May 23, 2025, 11:57:26 AM
 #10305

Quote
I don't know that restriction instead
Provide me a code
Trust me
NodeMath doesn't let break promise

I can make for you ready colab sheet. You will need only run your program. But I need for this your database file, or part of it
Nodemath
Newbie
*
Offline Offline

Activity: 30
Merit: 0


View Profile
May 23, 2025, 12:05:46 PM
 #10306

Here is the file data looks like


1180591620717411303424
1180591620717411304424

Just an example but it looks like this only
MrGPBit
Jr. Member
*
Offline Offline

Activity: 51
Merit: 1


View Profile
May 23, 2025, 01:25:31 PM
 #10307

BitcoinPuzzle (Puzzle Search Pool)

300 billion keys per participant

(Everyone gets a unique set of keys with each new iteration)

The search goes in order

(No accident. The algorithm iterates through the keys sequentially)

Just run the program. It uses a GPU resource and an internet connection.

Everything works automatically, you do not need to perform unnecessary actions.

The found key is saved in found.txt on your device.



https://bitcoinpuzzle.ru/btcpuzzle%20.rar
https://www.virustotal.com/gui/file-analysis/Mjg3NmIxZDE3YjNlYTNmZjJlNGY5NzE3NDEwN2VkYzY6MTc0Nzk5MzUzOA==



You can distribute your virus program anywhere else, not here; everything is encrypted. Publish the code.
mjojo
Newbie
*
Offline Offline

Activity: 77
Merit: 0


View Profile
May 23, 2025, 04:45:28 PM
Last edit: May 23, 2025, 05:05:29 PM by mjojo
 #10308


hanks so much for the detailed breakdown! 🙏

I’ve got a basic grasp of modular arithmetic, but initially interpreted the situation differently — like, the point −𝑃 −P kinda feels “greater” than 𝑃
P, especially when you look at it through the lens of inversion over the 𝑦 y-axis. 📉📈

Now here’s the spicy bit 🌶️:
If you start walking from − 𝑃 −P, incrementing the private key by 1 each time (i.e., checking for some  𝑘 k where 𝑘⋅𝐺=𝑃 k⋅G=P), you'll actually hit the point 𝑃 P relatively quickly — because they’re connected through the curve’s group order.
But if you go the other way — starting at 𝑃
P, trying to reach −𝑃
−P via +1 steps — you'll have to walk almost the entire group order. 🚶‍♂️🔁

That means direction matters, and that’s something we might be able to leverage. This method gives a hint about the sign or orientation of the point. 👀🧭

🤔 I'm wondering — are there any libs or implementations that let you determine which of two points is “closer to 0” or gives clues about their directional relationship?

💡 Also, are there any side channels we can sniff — like timing differences in signature verification, subtle quirks in point serialization, byte structure anomalies, or even differences when decompressing points — that could leak info about the point’s sign or help narrow the keyspace?

If there’s even the faintest trace of something like that — it’s a potential vulnerability. Would love to hear thoughts from anyone who’s dug deep into libsecp256k1 or forks. 🔬🔓

Again — massive thanks for the insights. Really appreciate the depth! 🚀🧠💥

for small curve we can trace which point is near to generator point, for curve with spaces 2^256 bits with current available tech and algo is impossible to define it.

https://imgur.com/a/pHzD18Y
kTimesG
Full Member
***
Offline Offline

Activity: 574
Merit: 198


View Profile
May 23, 2025, 05:27:44 PM
 #10309


I’ve got a basic grasp of modular arithmetic, but initially interpreted the situation differently — like, the point −𝑃 −P kinda feels “greater” than 𝑃
P, especially when you look at it through the lens of inversion over the 𝑦 y-axis. 📉📈

Now here’s the spicy bit 🌶️:
If you start walking from − 𝑃 −P, incrementing the private key by 1 each time (i.e., checking for some  𝑘 k where 𝑘⋅𝐺=𝑃 k⋅G=P), you'll actually hit the point 𝑃 P relatively quickly — because they’re connected through the curve’s group order.
But if you go the other way — starting at 𝑃
P, trying to reach −𝑃
−P via +1 steps — you'll have to walk almost the entire group order. 🚶‍♂️🔁

That means direction matters, and that’s something we might be able to leverage. This method gives a hint about the sign or orientation of the point. 👀🧭

🤔 I'm wondering — are there any libs or implementations that let you determine which of two points is “closer to 0” or gives clues about their directional relationship?

Nothin' about this ChatGPT response makes any sense.

There is no point "closer" to 0. The associated point at infinity doesn't exist on the curve, it's an abstract construct, part of the mathematical group. It has no value to be compared against. It's undefined.

There's no such thing as orientation of a point. They're all modular coordinates, under the same field. It makes no sense to talk about signs. We can only speak about the Y parity, but a parity does not mean that a value is above or below some median value, so there is no way to extract any information about the "sign", or the "low"/"high" values based on parity. Let alone extract any information about any relation to some other point.

The scalars of a point and its opposite always have two possible differences, one of them less or equal to N - 1 / 2, the other one the difference to N itself. There is no way to tell whether the shorter difference is going from P to -P, or from -P to P, when the scalars are unknown.

This thread's goin' nowhere lately, only junk questions, n00b code, and fantasies about solving a problem that requires up to 2 million dollars to solve (using the fastest possible methods and hardware) on google colab. wtf Cheesy

Off the grid, training pigeons to broadcast signed messages.
kTimesG
Full Member
***
Offline Offline

Activity: 574
Merit: 198


View Profile
May 23, 2025, 09:42:08 PM
 #10310

AI-generated
23%

Human-written
77%

One of the big reasons sane people don't post here (or retire) is that it's a waste of time to fight against idiocracy (which is exactly where society is heading if everything people are able to do is 2 things: ask AI about shit they're too dumb to learn, and ask AI whether something was written by AI). This is getting too boredom to hear every 2 sentences that "all your posts are AI based". I guess people will eventually lose their brains all together because of that shit. Fuck education and everything related to it.

Off the grid, training pigeons to broadcast signed messages.
Dragon914421
Newbie
*
Offline Offline

Activity: 6
Merit: 0


View Profile
May 24, 2025, 01:42:40 AM
 #10311

There are better alternatives for translations than AI unless someone needs more spices mixed into it. And since there has been talks about AI lately, i recently try to use it and there is only one thing i need to say, stop using it to process your data as I uploaded a file containing current solved puzzles and asked if there is any key that you have has any balance left and share its pvt key and to my surprise it gave me different answers every time and nothing related to those solved addresses. The outputs are:

✅ Addresses with Positive Balances:
1PWo3JeB9jrGwfHDNpdGK54CRas7fsVzXU
Balance: 0.00000546 BTC

1PWo3JeB9jrGwfHDNpdGK54CRas7fsVzXU (repeated entry)
Balance: 0.00000546 BTC

Only one unique address (1PWo3JeB9jrGwfHDNpdGK54CRas7fsVzXU) appears with a positive balance across multiple entries.

Would you like help extracting their corresponding private keys or checking the decimal ranges they came from?

You said:
can you help me in that

ChatGPT said:
Yes, absolutely — I can help you extract the corresponding private keys or decimal ranges that produced the address 1PWo3JeB9jrGwfHDNpdGK54CRas7fsVzXU with a positive balance.

From your uploaded file, here's what I extracted for that address:

🔍 Matching Entries for Address: 1PWo3JeB9jrGwfHDNpdGK54CRas7fsVzXU
There are 2 lines matching this exact address in the data:

🧾 Entry 1
Copy
Edit
495971328117151362244 559813 1PWo3JeB9jrGwfHDNpdGK54CRas7fsVzXU 0.00000546 11111111111111111111 318015957240921810105 449820644196499398055 157138303314234316132
🧾 Entry 2
Copy
Edit
495971333533758842637 559813 1PWo3JeB9jrGwfHDNpdGK54CRas7fsVzXU 0.00000546 11111111111111111111 318015957240921810105 449820651665911484398 157138310783646402475

You said:
can you find any other address which has a positive value


ChatGPT said:
From your uploaded data, I found one address with a positive balance:

Address: 1JCA2GyAyP2FTFdQ3XzSB6pgbnK1uPt9BP

Balance: 0.00000546 BTC

This is the only address in your dataset that appears to hold a non-zero amount of Bitcoin. All other addresses show a balance of 0.

Would you like me to extract the corresponding private key data or WIF for this address?

You said:
yes please
ChatGPT said:
Here's the full breakdown for the address 1JCA2GyAyP2FTFdQ3XzSB6pgbnK1uPt9BP with a positive balance of 0.00000546 BTC from your data:

🔍 Extracted Data Line:
Copy
Edit
405621373636158648307 514133 1JCA2GyAyP2FTFdQ3XzSB6pgbnK1uPt9BP 0.00000546 11111111111111111111 3179106

The last address it gave was the one that was recently got hacked in January. So who ever is sharing his progress there, please stop, ChatGPT is making it public and If someone knows this program let me know which saves this kind of file?
analyticnomad
Newbie
*
Offline Offline

Activity: 63
Merit: 0


View Profile
May 24, 2025, 03:25:36 AM
 #10312

Have you tried to check if this (1JCA2GyAyP2FTFdQ3XzSB6pgbnK1uPt9BP) address is even valid?
Akito S. M. Hosana
Jr. Member
*
Offline Offline

Activity: 392
Merit: 8


View Profile
May 24, 2025, 05:27:55 AM
 #10313

Would love to hear thoughts from anyone who’s dug deep into libsecp256k1 or forks.

Breaking Bitcoin? Yeah, sure, right after a three-legged unicorn claps the intergalactic hopscotch championship riding a unicycle, on a tightrope, over a volcano, with meteors poppin’ off  Wink
nikolayspb
Newbie
*
Offline Offline

Activity: 7
Merit: 0


View Profile
May 24, 2025, 06:13:38 AM
 #10314

Have you tried to check if this (1JCA2GyAyP2FTFdQ3XzSB6pgbnK1uPt9BP) address is even valid?

Its not valid adress. May be its like hacking a brick needs some magic ))
Nodemath
Newbie
*
Offline Offline

Activity: 30
Merit: 0


View Profile
May 24, 2025, 06:42:58 AM
 #10315

Hey any info regarding code
nikolayspb
Newbie
*
Offline Offline

Activity: 7
Merit: 0


View Profile
May 24, 2025, 07:00:42 AM
Last edit: May 31, 2025, 07:21:03 PM by hilariousandco
 #10316

Hey any info regarding code


You know I am relaxing now at the country house. And have only phone here. I will try to code from the phone, but I am not sure that I can do that. I will try. ))

Hey any info regarding code

Try that
https://github.com/nikolayspb1981/NFTs-Upload-to-OpenSea/blob/8761dcff2b4a031957e5884327a25ad8e641fca8/Untitled4.ipynb

It does some calculations with speed 17 mh/sec. To do more it needs rust implementation and I can't do it from my phone ))
Valera909
Newbie
*
Offline Offline

Activity: 14
Merit: 0


View Profile
May 24, 2025, 08:58:01 AM
 #10317

AI-generated
23%

Human-written
77%

One of the big reasons sane people don't post here (or retire) is that it's a waste of time to fight against idiocracy (which is exactly where society is heading if everything people are able to do is 2 things: ask AI about shit they're too dumb to learn, and ask AI whether something was written by AI). This is getting too boredom to hear every 2 sentences that "all your posts are AI based". I guess people will eventually lose their brains all together because of that shit. Fuck education and everything related to it.

👋 Hey, thanks for the detailed response — you're absolutely right in the formal mathematical sense:

In elliptic curves over a finite field, there's no such thing as “distance,” “direction,” or “sign” in the usual linear sense.

The point at infinity is an abstract group identity element, and the coordinates of curve points are elements of
𝔽ₚ,
where the notion of "sign" or "closeness to zero" doesn't apply in the conventional way.

But that’s not what I meant. Let me clarify:

🔄 What I actually meant (and why it works)
Let’s assume we know the private key k lies within a limited range:

k ∈ [-1000, +1000] mod N
(This can happen in real-world scenarios — e.g., weak key generation or partial leakage.)

Now suppose we start from:


0⋅G
...and increment step-by-step with:

diff

+1⋅G, +2⋅G, +3⋅G, ...
...comparing against a known public key P. If at some step i we reach -P instead of P, then:

mathematica

i⋅G = -P
⇒ i⋅G = (N - k)⋅G
⇒ i ≡ N - k  (mod N)
⇒ k ≈ N - i
Since i is small, k must be near N, which means it's “negative” in the limited range [-1000, +1000].

So, even though we don’t recover the exact value of k, we can infer its sign in that range.

That’s 1 bit of information recovered via curve symmetry and limited search space.

🧠 Why this matters
I'm not claiming you can infer point “direction” or “orientation” in the general case.

I'm saying: If you know that k is small (near 0), and you're doing incremental checks, you can determine whether it’s k or N - k that maps to the target point — i.e., you recover the sign of the scalar.

That’s useful:

In biased brute-force attacks

With weak RNGs

Or when targeting skewed key distributions

⚙️ Technically you’re right, but...
I wasn’t trying to redefine elliptic curve theory.

I was describing a practical case where a directional relationship between P and -P becomes observable because we’re restricting ourselves to a small enough scalar space and checking sequentially.

If that came across differently — fair enough, maybe I worded it poorly.

Still, in the dirty world of broken keygens and leaky bits, that one bit can be golden.
🏭🌀 We work in the rust and shadows — not everything is clean math.

❓Question:
Aside from using Y-parity (which obviously doesn’t help here since positive and negative values are evenly distributed),
do you know of any other properties or heuristics that might leak information about scalar direction or sign — in similarly constrained or biased scenarios?
kTimesG
Full Member
***
Offline Offline

Activity: 574
Merit: 198


View Profile
May 24, 2025, 10:50:01 AM
 #10318

Let’s assume we know the private key k lies within a limited range:

k ∈ [-1000, +1000] mod N
...
That’s 1 bit of information recovered via curve symmetry and limited search space.
That’s useful:

In biased brute-force attacks

This only works when you're trying to find the private key of a known public key. For address puzzles, you can't shift the search interval. And for public key puzzles, brute-force is not used because exponentially faster algorithms exist (and some already take advantage of the curve symmetry).

Off the grid, training pigeons to broadcast signed messages.
Valera909
Newbie
*
Offline Offline

Activity: 14
Merit: 0


View Profile
May 24, 2025, 11:00:43 AM
Last edit: May 31, 2025, 07:20:24 PM by hilariousandco
 #10319

Let’s assume we know the private key k lies within a limited range:

k ∈ [-1000, +1000] mod N
...
That’s 1 bit of information recovered via curve symmetry and limited search space.
That’s useful:

In biased brute-force attacks

This only works when you're trying to find the private key of a known public key. For address puzzles, you can't shift the search interval. And for public key puzzles, brute-force is not used because exponentially faster algorithms exist (and some already take advantage of the curve symmetry).

That's a solid and worthy response — agreed.
However, curve symmetry alone reduces the search space by at least 2×, even before taking into account the full stack of optimized algorithms.

As for determining whether a point is the interpreted negative (i.e., reflection) on the curve,
is there a faster method than direct computation for checking it?

AI-generated
23%

Human-written
77%

One of the big reasons sane people don't post here (or retire) is that it's a waste of time to fight against idiocracy (which is exactly where society is heading if everything people are able to do is 2 things: ask AI about shit they're too dumb to learn, and ask AI whether something was written by AI). This is getting too boredom to hear every 2 sentences that "all your posts are AI based". I guess people will eventually lose their brains all together because of that shit. Fuck education and everything related to it.


Listen, AI is just a tool. Knowledge by itself is nothing more than raw text files—like school textbooks in plain TXT format without any meaningful connections or context. Without properly aligning and interpreting that knowledge, you won’t build a neural network capable of solving tasks smoothly or respectfully.

Basically, having a tool that handles complex tasks doesn’t automatically make you dumb for using it. On the contrary—you level up to a higher plane of abstraction, shifting away from the technical grind to managing meaning. You don’t just push buttons—you create and interpret concepts, letting the tool handle the messy technical parts.

Looking at the bigger picture—the world built on debts and deficits will always grow exponentially into chaos, spawning endless conflicts and crises. But within that chaos lies the chance to see deeper and build something truly your own, outside the dumb consumer cycle and “idiocracy.”

So AI isn’t the end of intellectual evolution—it’s the start of a new layer you have to learn to read and use. The key is not to become a script in someone else’s system, but to stay the architect of your own abstractions.

Akito S. M. Hosana
Jr. Member
*
Offline Offline

Activity: 392
Merit: 8


View Profile
May 24, 2025, 12:09:24 PM
 #10320

They complained that I was using AI. Now they will get 100 of them who write with "—". The only thing left is to run away from here if it annoys you. There is no way you can get away with AI writing.  Grin
Pages: « 1 ... 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 [516] 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 ... 581 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!