Today, when all the rewards were received by participants i can post the right solution:
1. Achiving first 7.77 KMD was very easy. Look at the screen -
https://deckersu.github.io/images/decker_quest_01.jpg . We see LaMetric Time clock on the table, displaying current time. It's
20:22, entering "20:22" as passphrase in Agama or BarterdDEX will get access to
REFhpPU7B75ADNEyjbLGAHf3DWz6XSggXX address. First reward was taken - eea7e7ca9051b8702abaf593f5fab3bf4a812f03bdc228379e4b80dcad6e559f .
2. Second part is a little bit harder. Private key for reward's address contained in the image in IPTC info field "Special instructions". There is a two ways how to get it. Easiest, is to download image on PC:
wget https://github.com/DeckerSU/deckersu.github.io/raw/master/images/decker_quest_01.jpg
and just open it in a hex editor:
See the phrase "YourPrizeIsRightHereOneStep2Win!" ? This is privkey. There is also other way to get it:
exiv2 -pi decker_quest_01.jpg
Here is the output:
Iptc.Envelope.CharacterSet String 3
Iptc.Envelope.ModelVersion Short 1 4
Iptc.Application2.SpecialInstructions String 32 YourPrizeIsRightHereOneStep2Win!
Iptc.Application2.BylineTitle String 6 Decker
After we get SpecialInstructions, let's convert ASCII phrase to hex to get 32-bytes privkey:
YourPrizeIsRightHereOneStep2Win! = 596f75725072697a6549735269676874486572654f6e65537465703257696e21
Now we should get uncompressed address and WIF for it. Let's use this
http://gobittest.appspot.com/Address service to get it. Enter 32 bytes above in "0 - Private ECDSA Key" field and click send. After this go to "4 - Adding network bytes to 3" field and change first byte to 0x3C (Komodo Network) and click Send once more. We get address: RPLuaFx1bafJGJtaV3u724k3ZyrD9h5aVZ .
Check it via explorer
https://kmd.explorer.supernet.org/address/RPLuaFx1bafJGJtaV3u724k3ZyrD9h5aVZ and will see 7.77 KMD on it. Bingo.
Now let's generate WIF for it via "Private key to wallet import format" on
http://gobittest.appspot.com/PrivateKey . But unfortunatelly there is a one problem here. Service generates WIF only for Bitcoin network
Step "2 - Add 0x80 byte to the front" is only for BTC main network. For KMD we should add 0xBC (188) instead of 0x80 on this step. We can write a simple script for calc:
#!/bin/bash
export PRIV_KEY=596f75725072697a6549735269676874486572654f6e65537465703257696e21
export VER=bc
echo ${VER}${PRIV_KEY}
# Compute checksum (Double SHA256)
echo ${VER}${PRIV_KEY} -n | xxd -r -p | openssl dgst -sha256 -binary | openssl dgst -sha256
# Take the first 4 bytes of the double SHA256 hash (403f84da)
export CHECKSUM=403f84da
# Append checksum
echo ${VER}${PRIV_KEY}${CHECKSUM}
Result:
bc596f75725072697a6549735269676874486572654f6e65537465703257696e21403f84da
Now we should convert it to base58:
7K8LfzaZj6yoTM2PJhn8Cb4SQ3M7dkxCL47p2DDa5uMrLNRtqrh
Let's import this privkey in komodod or Agama and take win 7.77 KMD.
Somebody was succeded with this:
https://kmd.explorer.supernet.org/tx/f33c2a55b4865b09d7a5f3a9d882d36c5f5e39db903d7c62e7a0dcb7ab3e5ccf Congratulations to the winners!p.s. NN 2018 elections upcoming, you can find my proposal here -
https://deckersu.github.io/ .