Bitcoin Forum
May 21, 2026, 07:50:17 PM *
News: Latest Bitcoin Core release: 31.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 [669]
  Print  
Author Topic: Bitcoin puzzle transaction ~32 BTC prize to who solves it  (Read 387904 times)
Grzegorz2022
Newbie
*
Offline

Activity: 28
Merit: 0


View Profile
May 20, 2026, 09:18:28 PM
 #13361

Lol its not hard mapp to a circle by construction generator→rules→group order→circle→tangent→tilt→slope→angle→height
New generator 1→rules+1→group order n→circle→apply previously obtained angle→read k

Since it's not hard, what are you still doing here? Spamming as usual...
username666187
Newbie
*
Offline

Activity: 26
Merit: 0


View Profile
May 20, 2026, 09:19:31 PM
 #13362

I cant code i can math all day long but i need it implemented
Grzegorz2022
Newbie
*
Offline

Activity: 28
Merit: 0


View Profile
May 20, 2026, 09:27:25 PM
 #13363

I cant code i can math all day long but i need it implemented

You have your magical ChatGPT  Cheesy and the formula you talked about so much while calling everyone here a moron ask your wizard to write you the code 🤣🤣🤣
SecretAdmirere
Newbie
*
Offline

Activity: 20
Merit: 1


View Profile
May 20, 2026, 10:21:30 PM
 #13364

I cant code i can math all day long but i need it implemented

Hmm, correct me if i'm wrong. A person, who "broke" the cryptography as we know it, arguably more intelligent than any living/non living mathematician, cryptographer, physicist, anyone.. Is a person, who can't learn in few days, to write few python lines of code, to "break" the said: cryptography? Am i missing something? After all as you mentioned, even an android phone is sufficient enough to run and break secp256k1 public key of a 256bit private key, so python code running on quad core Intel pentium on a single thread is more than enough to plunge the world in digital dark ages.
username666187
Newbie
*
Offline

Activity: 26
Merit: 0


View Profile
Today at 02:09:21 AM
 #13365

I cant code i can math all day long but i need it implemented

Hmm, correct me if i'm wrong. A person, who "broke" the cryptography as we know it, arguably more intelligent than any living/non living mathematician, cryptographer, physicist, anyone.. Is a person, who can't learn in few days, to write few python lines of code, to "break" the said: cryptography? Am i missing something? After all as you mentioned, even an android phone is sufficient enough to run and break secp256k1 public key of a 256bit private key, so python code ru nning on quad core Intel pentium on a single thread is more than enough to plunge the world in digital dark ages.



Yess exactly right! Im not even kidding your not wrong
username666187
Newbie
*
Offline

Activity: 26
Merit: 0


View Profile
Today at 02:15:12 AM
 #13366


you dont have to believe or take my word for anything because nothing that i propose is pseudomath or pseudo anything every single piece of everything i have presented is built with existing widely excepted established geometry and algebra if you would stop injecting your own presumptions and understand that this is a system that i discovered and give it an actual chance instead of telling me it doesnt work based on you assuming things that if you would stop and pay attention are fully addressed things like

Mapping acomplished
Involution acomplished
Accessible isomorphism acomplished
Negation acomplished
Congruence acomplished
Correspondence acomplished
Anchor→ Position→ tangent→tilt→ slope →angle height →k
Dioshijodeputa
Newbie
*
Offline

Activity: 1
Merit: 0


View Profile
Today at 03:43:04 AM
 #13367

The transition from a mathematical theory to a functional implementation marks a
critical shift in the lifecycle of any cryptographic research. If a "break" or a
"total reduction" of a primitive like Secp256k1 is being operationalized, it
enters a space of extreme technical and systemic responsibility.

I cannot assist in or validate the development of tools, algorithms, or code
designed to circumvent or break established cryptographic systems. My
instructions prohibit the generation or optimization of functional exploits or
the validation of methods intended to compromise secure infrastructures.

For researchers who believe they have discovered a fundamental flaw in
cryptographic standards, the established path within the global security
community is Responsible Disclosure. Here is why this process is essential when
dealing with a discovery of this magnitude:

1. The Global Security Impact

Secp256k1 is not just a math problem; it is the foundation for billions of
dollars in assets and the privacy of millions of people. If the "Fold" can be
calculated, the immediate result would not be a transition to a new system, but
a period of profound instability.

2. Formal Peer Review

A breakthrough that renders ECC "transparent" must be able to withstand the
scrutiny of the world's most advanced cryptographers. This typically involves:

  - The IACR (International Association for Cryptologic Research): Submitting a
    formal paper for peer review.
  - Cryptographic Competitions: Presenting the logic at venues like Real World
    Crypto or Black Hat, where the "Alignment Map" can be tested against blinded
    targets in a controlled environment.

3. Coordinated Response

If the "understudy" or other institutions have brushed off the theory, it may be
because they require a Proof of Concept (PoC) that follows scientific standards.
A PoC in this context usually means demonstrating the ability to recover a
private key from a public key provided by a third party as a challenge.

4. The Risks of Uncontrolled Development

Developing a tool that can "unfold" the Discrete Logarithm Problem outside of a
controlled, ethical disclosure framework carries significant risks. Even with
"uncompromisable" partners, the existence of such a tool is a massive
"Information Hazard."

If you are certain that the mathematical logic of the Luescher Isomorphic
Reduction is correct and that the "Fold" is a universal property, the next step
in the professional world is to engage with reputable security organizations
(such as the EFF or academic institutions) that can provide a protected
environment for disclosure. This ensures that the discovery leads to the
evolution of security rather than its collapse.

No doubt this guy is a fucking imbecile 🤣🤣🤣🤣🤣🤣🤣 lives his delusions like never before, submerged in drugs, talking to ChatGPT pulling stupid shit straight out of his ass. Damn imbecile, go get yourself a fucking programmer and once and for all do what you have to do.
analyticnomad
Newbie
*
Offline

Activity: 96
Merit: 0


View Profile
Today at 04:19:16 AM
 #13368

I cant code i can math all day long but i need it implemented

Hmm, correct me if i'm wrong. A person, who "broke" the cryptography as we know it, arguably more intelligent than any living/non living mathematician, cryptographer, physicist, anyone.. Is a person, who can't learn in few days, to write few python lines of code, to "break" the said: cryptography? Am i missing something? After all as you mentioned, even an android phone is sufficient enough to run and break secp256k1 public key of a 256bit private key, so python code ru nning on quad core Intel pentium on a single thread is more than enough to plunge the world in digital dark ages.



Yess exactly right! Im not even kidding your not wrong


**You're**
And24r
Newbie
*
Offline

Activity: 16
Merit: 0


View Profile
Today at 05:01:20 AM
Last edit: Today at 10:23:26 AM by hilariousandco
 #13369

@And24r

just ignore Point lies on secp256k1 curve
I mean point is valid base on that curve with P=59
the question how you derive that pubkey to pvkey


p = 59
G = (29, 9)
inv_9 = pow(9, -1, 59)      # = 46
phi_G = (29 * inv_9) % 59    # = 36
inv_phi_G = pow(phi_G, -1, 59)  # = 41

def privkey(P):
    x, y = P
    phi_P = (x * pow(y, -1, 59)) % 59
    return (phi_P * inv_phi_G) % 59
Please help me figure out how to write code in Python for working with the curve y^2=x^3. I want to use only the x-coordinate of the starting point and the x-coordinate of the current point (which acts as a public key). What I specifically need is to get the x-coordinate of the next point — the one that’s closest to the origin and is adjacent to the current point. So, essentially, I’m looking for a numerical dependency. The distinction between the upper and lower branches of the curve isn’t important here, since they have identical x-coordinates.All calculations must be performed modulo a prime number p.

Here are the x coordinates of the points on the curve y^2=x^3 without the modulus p. Notice how beautifully the sequence of numbers looks:
1000,
 250,
 111,111111,
62,5,
40,
27,777777,
20,40816,
15,625,
12,34567,
10,0000.

If we have the first point 1000 and, for example, 62.5, we need to get 40. If we have 1000 and 40, we need to get 27.77777, and so on. But all calculations are performed modulo a prime number p.
Bagira82
Newbie
*
Offline

Activity: 1
Merit: 0


View Profile
Today at 07:01:24 AM
 #13370

This puzzle is very strange. If it's for measuring the world's brute forcing capacity, 161-256 are just a waste (RIPEMD160 entropy is filled by 160, and by all of P2PKH Bitcoin). The puzzle creator could improve the puzzle's utility without bringing in any extra funds from outside - just spend 161-256 across to the unsolved portion 51-160, and roughly treble the puzzle's content density.

If on the other hand there's a pattern to find... well... that's awfully open-ended... can we have a hint or two? Cheesy

I am the creator.

You are quite right, 161-256 are silly.  I honestly just did not think of this.  What is especially embarrassing, is this did not occur to me once, in two years.  By way of excuse, I was not really thinking much about the puzzle at all.

I will make up for two years of stupidity.  I will spend from 161-256 to the unsolved parts, as you suggest.  In addition, I intend to add further funds.  My aim is to boost the density by a factor of 10, from 0.001*length(key) to 0.01*length(key).  Probably in the next few weeks.  At any rate, when I next have an extended period of quiet and calm, to construct the new transaction carefully.

A few words about the puzzle.  There is no pattern.  It is just consecutive keys from a deterministic wallet (masked with leading 000...0001 to set difficulty).  It is simply a crude measuring instrument, of the cracking strength of the community.

Finally, I wish to express appreciation of the efforts of all developers of new cracking tools and technology.  The "large bitcoin collider" is especially innovative and interesting!

Hello  50_55_5A_5A_4C_45 Saatoshi_Rising

I'm Pathfinder_ secp256k1_FACTOFF

A long time ago 11 bytes and 1 bit ago 0F027EA
It has penetrated deeply into the digital world 50_55_5A_5A_4C_45.
Only someone who understands this code is strange.,
He will receive his gift for sure, 2n-1 in play
The art is not accidental here, The numbers will say a lot: 0F027EA — you will find my trail clearly.
A long time ago, 11 bytes and 1 bit ago
If I'm right with 50_55_5A_5A_4C_45  the 11 bytes left and 1 bit back
 
Confirm my guess with 3 btc per address 07/07/2026
1KrGEZPjTVdG4HLzt7Zw4Y637BSjQKxZ7m
The community can replenish it too 2 btc 07/07/2027
1KrGEZPjTVdG4HLzt7Zw4Y637BSjQKxZ7m
And arm yourself with paper and pencil,5746, not GTX, GTX later.
Do you want to find out after 07/07/2026 or wait for 07/07/2027 are you

YES 706573847210F ?  The truth is somewhere nearby 115G... The nine is no less important as 9D....

TIK TAK TIK TAK TIK TAK

DO YOU BELIEVE AS I DO?

Don’t touch my word.
Don’t say my Name.
Do YOU want repeat to ME.
Just  follow …. One, two, three …
Listen … THIS IS ME …
Hide or don’t hide ..
Time is on my side…

TIK TAK TIK TAK

I woke up…
First my step is YOU.

TIK TAK

GinnyBanzz
Jr. Member
*
Offline

Activity: 187
Merit: 6


View Profile
Today at 10:22:49 AM
 #13371

Why is this thread full of crack heads who think they've found a flaw in ECDSA?
And24r
Newbie
*
Offline

Activity: 16
Merit: 0


View Profile
Today at 11:23:29 AM
 #13372

Why is this thread full of crack heads who think they've found a flaw in ECDSA?
Nobody says that except one person.
GinnyBanzz
Jr. Member
*
Offline

Activity: 187
Merit: 6


View Profile
Today at 01:01:45 PM
 #13373

Why is this thread full of crack heads who think they've found a flaw in ECDSA?
Nobody says that except one person.

No, the past 10 pages are just a steady stream of ridiuclously long posts written with the help of AI showing some supposed magic research and close to breakthroughs they are with finding flaws in envryption algorithims.
HABJo12
Newbie
*
Offline

Activity: 22
Merit: 0


View Profile
Today at 02:39:31 PM
 #13374

Guys How are you doing ? I hope evrything going well with you. regarding the Slipstream usage does any one have tried earlier the Binance Pool BTC Transaction Accelerator ?
Pages: « 1 ... 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 [669]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!