stanner.austin
Member
Offline
Activity: 68
Merit: 53
|
|
May 11, 2022, 07:54:06 AM |
|
@fxsniper Hello You won't notice much speed difference on this case. Only thing pubkey bruteforce fastest is BSGS, because it's come after only 1 step(value*G). no need double SHA2,RIPEMD160,BASE8 address or RIPEMD160 won't make much noticeable difference in bruteforce.
|
|
|
|
fxsniper
Member
Offline
Activity: 406
Merit: 47
|
|
May 11, 2022, 08:06:25 AM |
|
@fxsniper Hello You won't notice much speed difference on this case. Only thing pubkey bruteforce fastest is BSGS, because it's come after only 1 step(value*G). no need double SHA2,RIPEMD160,BASE8 address or RIPEMD160 won't make much noticeable difference in bruteforce.
OK, I just think simple maybe calculate SHA-256 and RIPEMD160 it is maybe fast that Elliptic curve point calculate I think with 1 step(value*G). it is calculated 256 times (loop) for each bit maybe make full key brute-force slow
|
|
|
|
bigvito19
|
|
May 11, 2022, 06:37:31 PM |
|
@fxsniper Hello You won't notice much speed difference on this case. Only thing pubkey bruteforce fastest is BSGS, because it's come after only 1 step(value*G). no need double SHA2,RIPEMD160,BASE8 address or RIPEMD160 won't make much noticeable difference in bruteforce.
OK, I just think simple maybe calculate SHA-256 and RIPEMD160 it is maybe fast that Elliptic curve point calculate I think with 1 step(value*G). it is calculated 256 times (loop) for each bit maybe make full key brute-force slow You can use this too for Hash160 https://github.com/phrutis/Rotor-Cuda you can use a GPU with this.
|
|
|
|
math09183
Member
Offline
Activity: 170
Merit: 58
|
|
May 12, 2022, 10:36:55 AM Last edit: May 12, 2022, 12:16:33 PM by math09183 |
|
@fxsniper Hello You won't notice much speed difference on this case. Only thing pubkey bruteforce fastest is BSGS, because it's come after only 1 step(value*G). no need double SHA2,RIPEMD160,BASE8 address or RIPEMD160 won't make much noticeable difference in bruteforce.
OK, I just think simple maybe calculate SHA-256 and RIPEMD160 it is maybe fast that Elliptic curve point calculate I think with 1 step(value*G). it is calculated 256 times (loop) for each bit maybe make full key brute-force slow You can use this too for Hash160 https://github.com/phrutis/Rotor-Cuda you can use a GPU with this. Use whatever you want, just not from that russian thief. All he does is copy/paste from other repos (not fork), he changes name and says like it belongs to him.
|
|
|
|
bigvito19
|
|
May 12, 2022, 01:50:38 PM |
|
Use whatever you want, just not from that russian thief. All he does is copy/paste from other repos (not fork), he changes name and says like it belongs to him. I also cannot recommend his tools, especially when he ran shady brute-force challenge[1]. But i'm not sure he can be called thief when AFAIK he don't violate original repository license. Although i can understand uneasiness that he don't use GitHub fork feature when the original source code also hosted on GitHub. [1] https://bitcointalk.org/index.php?topic=5394745.0If his tools work, they work. If the challenge is fake or if you think its fake just don't participate in it.
|
|
|
|
math09183
Member
Offline
Activity: 170
Merit: 58
|
|
May 12, 2022, 02:17:30 PM |
|
If his tools work, they work. If the challenge is fake or if you think its fake just don't participate in it.
There is no single tool which he is the author. There is no one single program written by him. If you want reliability - go and find the original version, from the tool's author, not from that xero guy. Maybe he has small dick or other complexes and that's why he is not using "fork" option on source repos, he wants projects to look like they were made by him? I respect him for amount of time he must spend to monitor source repos and copy/paste diffs So guys, you do not need to worry about virus or other bug hidden in his closed wif500 program, he is not able to do something like that.
|
|
|
|
WanderingPhilospher
Full Member
Offline
Activity: 1148
Merit: 237
Shooters Shoot...
|
|
May 12, 2022, 04:02:12 PM |
|
If his tools work, they work. If the challenge is fake or if you think its fake just don't participate in it.
There is no single tool which he is the author. There is no one single program written by him. If you want reliability - go and find the original version, from the tool's author, not from that xero guy. Maybe he has small dick or other complexes and that's why he is not using "fork" option on source repos, he wants projects to look like they were made by him? I respect him for amount of time he must spend to monitor source repos and copy/paste diffs So guys, you do not need to worry about virus or other bug hidden in his closed wif500 program, he is not able to do something like that. I've looked at two of his repos; they are different than the originals and he gave credit to original programmer. If you take an existing program and change it to different things, is that a fork or a new master? I do not know...I imagine you could fork and make changes. It will be interesting to see/read about the wif500 and if they solve it.
|
|
|
|
CryptoSh1va
Jr. Member
Offline
Activity: 33
Merit: 7
|
|
May 12, 2022, 06:35:16 PM |
|
It will be interesting to see/read about the wif500 and if they solve it.
I think it's just a clever scam. The author claims that the photo is from a burnt diary in 2017, but the Ethereum address in the same photo was used in 2021, and just one day. Why write this address and key in a diary if there was no balance on it at the time? And even more so to use it after so many years.. 0x428d88b326748ebd55c4a7f89fd3bc08378dc0d2
|
|
|
|
WanderingPhilospher
Full Member
Offline
Activity: 1148
Merit: 237
Shooters Shoot...
|
|
May 13, 2022, 01:26:53 AM |
|
It will be interesting to see/read about the wif500 and if they solve it.
I think it's just a clever scam. The author claims that the photo is from a burnt diary in 2017, but the Ethereum address in the same photo was used in 2021, and just one day. Why write this address and key in a diary if there was no balance on it at the time? And even more so to use it after so many years.. 0x428d88b326748ebd55c4a7f89fd3bc08378dc0d2 Well, outside looking in, whoever's address, they could still use it because they had the full private key and normally you create a wallet before there is a balance on it, whereas the btc address in question is missing the first part of the wif private key. I dunno...it will be interesting to see if the coins move anytime soon. As well as #64 and #120
|
|
|
|
NotATether
Legendary
Offline
Activity: 1722
Merit: 7259
In memory of o_e_l_e_o
|
|
May 13, 2022, 09:30:14 AM |
|
There is no single tool which he is the author. There is no one single program written by him. If you want reliability - go and find the original version, from the tool's author, not from that xero guy. Maybe he has small dick or other complexes and that's why he is not using "fork" option on source repos, he wants projects to look like they were made by him? I respect him for amount of time he must spend to monitor source repos and copy/paste diffs So guys, you do not need to worry about virus or other bug hidden in his closed wif500 program, he is not able to do something like that. I didn't check the repos (Github is a PITA to browse through lynx) but I can conclude two things from this: a - if the programs are open-source, then he just coppied the Git tree - anyone can do that. The commits still appear (unless you destroy the tree and create a new one - in which case nobody would really think you wrote the whole thing in 1 commit anyway) if you do a git log, so it's just a nuisance. b - the programs are all closed source like that sp-mod guy. In which case the most risk that would come from using it would be the code sending the rewards to some baked address inside the code (or if he is sufficiently insane, maybe he includes a piece of malware like the node-ipc maintainer).
|
|
|
|
fxsniper
Member
Offline
Activity: 406
Merit: 47
|
|
May 14, 2022, 11:38:41 AM |
|
Why do all programs/tools about bitcoin all-time download chrome browser warning to download and recommend deleting a file? What algorithms or some code makes the browser check it and think can be harm the computer. it happens with tools download from Github and open source code, bitcrack, kangaroo all get warning all-time download it.
|
|
|
|
albert0bsd
|
|
May 16, 2022, 04:30:27 PM |
|
Never run exe files of untrusted sources, if there are source available is better to compile it by yourself
|
|
|
|
COBRAS
Member
Offline
Activity: 930
Merit: 22
|
|
May 16, 2022, 06:12:44 PM |
|
Why do all programs/tools about bitcoin all-time download chrome browser warning to download and recommend deleting a file? What algorithms or some code makes the browser check it and think can be harm the computer. it happens with tools download from Github and open source code, bitcrack, kangaroo all get warning all-time download it.
Because they have your BTC stealer inside...
|
[
|
|
|
zahid888
Member
Offline
Activity: 272
Merit: 20
the right steps towerds the goal
|
|
May 19, 2022, 08:43:36 AM |
|
|
1BGvwggxfCaHGykKrVXX7fk8GYaLQpeixA
|
|
|
NotATether
Legendary
Offline
Activity: 1722
Merit: 7259
In memory of o_e_l_e_o
|
|
May 20, 2022, 07:08:43 AM |
|
Why do all programs/tools about bitcoin all-time download chrome browser warning to download and recommend deleting a file? What algorithms or some code makes the browser check it and think can be harm the computer. it happens with tools download from Github and open source code, bitcrack, kangaroo all get warning all-time download it.
Whenever you download a file, Google check its hash against a bunch of signatures that are known to belong to malware - the database is stored on Google's servers - and then presents a warning if it matches a hash of malware (whether it's EXE, ZIP or whatever). Firefox would actually block you from downloading the file in such a case, and delete it instead.
|
|
|
|
bigvito19
|
|
May 21, 2022, 10:47:47 PM |
|
They both work, it just depends on what key you are looking for.
|
|
|
|
WanderingPhilospher
Full Member
Offline
Activity: 1148
Merit: 237
Shooters Shoot...
|
|
May 22, 2022, 01:14:34 AM |
|
Yeah keyhunt-cuda definitely works. What key were you looking for and what were your settings?
|
|
|
|
kknd
Jr. Member
Offline
Activity: 32
Merit: 11
|
|
May 22, 2022, 12:23:38 PM Last edit: May 22, 2022, 04:33:05 PM by kknd |
|
The solution :
1º python addresses_to_hash160.py addresses.txt hax160.bin or b58dec.exe addresses.txt hax160.bin
2º BinSort.exe 20 hax160.bin hax160sorted.bin
|
|
|
|
fxsniper
Member
Offline
Activity: 406
Merit: 47
|
|
May 27, 2022, 11:53:30 AM |
|
Did BitCrack need fast speed for GPU with PCI-E 3.0 (x16)? I would like to use with mainboard PCI-E 2.0 So, does it is effective to speed GPU or not?
|
|
|
|
PawGo
Legendary
Offline
Activity: 952
Merit: 1373
|
|
May 27, 2022, 12:44:53 PM |
|
Did BitCrack need fast speed for GPU with PCI-E 3.0 (x16)? I would like to use with mainboard PCI-E 2.0 So, does it is effective to speed GPU or not?
I think it has impact on data transfer host<->device, so in my opinion you cannot expect any significant improvement, as GPU memory is not much used nor heavily loaded from the host. It would make a difference in GPU would processing a big amounts of data coming from the host for each launch of kernel.
|
|
|
|
|