Bitcoin Forum
April 27, 2024, 10:18:30 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 [14] 15 »  All
  Print  
Author Topic: Collection of 18.509 found and used Brainwallets  (Read 30947 times)
ABCbits
Legendary
*
Offline Offline

Activity: 2856
Merit: 7407


Crypto Swap Exchange


View Profile
August 08, 2022, 11:46:11 AM
Merited by pooya87 (2)
 #261

These two are not comparable though and BIP39 wasn't a replacement.
It wasn't a replacement, but an even better proposal. Yes, you don't memorize seed phrases, but write them down. But: If you told me to choose between brain wallets and securing a wallet.dat file, which is how things worked before BIP39, I'd go with the former.

Since you mention wallet.dat which usually associated with Bitcoin Core, i'd like to mention Bitcoin Core doesn't use BIP39. You still have to backup your wallet.dat or alternatively master private key from dumpwallet command/output descriptor.

... Then it doesn't make much sense to me to memorize it anymore and I could skip the whole brainwallet thing alltogether.

For most cases, i would agree. But i'd like to quote a page from Bitcoin Wiki.

Brainwallets are not recommended to be used in general because of fallible human memory. But in special situations they could be very useful, for example when fleeing a country as a refugee with only the clothes on your back.

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
1714256310
Hero Member
*
Offline Offline

Posts: 1714256310

View Profile Personal Message (Offline)

Ignore
1714256310
Reply with quote  #2

1714256310
Report to moderator
1714256310
Hero Member
*
Offline Offline

Posts: 1714256310

View Profile Personal Message (Offline)

Ignore
1714256310
Reply with quote  #2

1714256310
Report to moderator
1714256310
Hero Member
*
Offline Offline

Posts: 1714256310

View Profile Personal Message (Offline)

Ignore
1714256310
Reply with quote  #2

1714256310
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714256310
Hero Member
*
Offline Offline

Posts: 1714256310

View Profile Personal Message (Offline)

Ignore
1714256310
Reply with quote  #2

1714256310
Report to moderator
d3bt3
Jr. Member
*
Offline Offline

Activity: 51
Merit: 20


View Profile WWW
August 08, 2022, 01:06:01 PM
 #262

For most cases, i would agree. But i'd like to quote a page from Bitcoin Wiki.

Brainwallets are not recommended to be used in general because of fallible human memory. But in special situations they could be very useful, for example when fleeing a country as a refugee with only the clothes on your back.
So for such case use https://brainwalletx.github.io/ ?

https://altquick.com/exchange/market/BitcoinTestnet
itod
Legendary
*
Offline Offline

Activity: 1974
Merit: 1076


^ Will code for Bitcoins


View Profile
August 08, 2022, 01:25:44 PM
 #263

These two are not comparable though and BIP39 wasn't a replacement.
It wasn't a replacement, but an even better proposal. Yes, you don't memorize seed phrases, but write them down. But: If you told me to choose between brain wallets and securing a wallet.dat file, which is how things worked before BIP39, I'd go with the former.

Since you mention wallet.dat which usually associated with Bitcoin Core, i'd like to mention Bitcoin Core doesn't use BIP39. You still have to backup your wallet.dat or alternatively master private key from dumpwallet command/output descriptor.


Backing up wallet.dat that is encrypted with decent passphrase is not a big issue, attacker first has to hack you to access your backup, and then has to attack the file's encryption passhprase. This is so complicated attack vector that all attackers rather choose to attack idiotic brainwallets.
ABCbits
Legendary
*
Offline Offline

Activity: 2856
Merit: 7407


Crypto Swap Exchange


View Profile
August 09, 2022, 09:14:32 AM
Merited by vapourminer (2)
 #264

For most cases, i would agree. But i'd like to quote a page from Bitcoin Wiki.

Brainwallets are not recommended to be used in general because of fallible human memory. But in special situations they could be very useful, for example when fleeing a country as a refugee with only the clothes on your back.
So for such case use https://brainwalletx.github.io/ ?

Tool you mentioned only use single SHA-256. Use WarpWallet[1] or rehashaddress (part of ecctools[2]) instead, which harder to brute force.

[1] https://keybase.io/warp
[2] https://github.com/albertobsd/ecctools#rehashaddress

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
fxsniper
Member
**
Offline Offline

Activity: 406
Merit: 45


View Profile
August 15, 2022, 09:47:18 AM
 #265


rehashaddress it work by using privatekey to hash with sha-256 and use it again for next privatekey and loop right?
fxsniper
Member
**
Offline Offline

Activity: 406
Merit: 45


View Profile
August 15, 2022, 11:40:12 AM
 #266


No, rehashaddress use user-chosen password/passphrase. It'll hash at least one time and perform additional rehash based on m parameter value. Here's snippet from the source code comment.


Thank you. I got it.
PrimeNumber7
Copper Member
Legendary
*
Offline Offline

Activity: 1610
Merit: 1899

Amazon Prime Member #7


View Profile
August 21, 2022, 09:48:56 PM
 #267

How is someone supposed to remember the exact number of hashing rounds? I think in both the WarpWallet and your proposed ~1.2 million rounds of hashing implementations, you will need to either document the rounds of hashing,  or rely on a third party to help calculate the private key, and I don't think this meets the definition of a brain wallet.
With WarpWallet you can (and should!) keep your own offline copy.
If you're going for a "weird" number of hashing rounds, I can think of many ways to remember the number. It could be your phone number or full date of birth. Or just something you remember. Worst-case, if you forget the exact number, you can still brute-force it yourself given that you know the pass phrase.
You can keep your own copy of the software used to generate the private key, but if you are relying on a specific, non-standardized software implementation, you must have access to a copy of that software implementation to access your coin. This creates another layer of risk because now, without the software, you will not have access to your money.
phrutis
Newbie
*
Offline Offline

Activity: 8
Merit: 0


View Profile
August 21, 2022, 10:55:17 PM
 #268

https://en.bitcoin.it/wiki/Mini_private_key_format

I came across my simple mini key generator tonight, and I'm having another play with it.

Here you have another toy to play with :

https://github.com/phrutis/MiniKeys2

This is the fastest public program to find old Serie1 minikeys (22 characters) in the world.
almightyruler
Legendary
*
Offline Offline

Activity: 2268
Merit: 1092


View Profile
September 18, 2022, 11:19:16 PM
 #269

Here you have another toy to play with :

https://github.com/phrutis/MiniKeys2

This is the fastest public program to find old Serie1 minikeys (22 characters) in the world.


Link 404?

Other repositories under that account seem to be cracking based, with executables only... so yeah, nah.
n0nce
Hero Member
*****
Offline Offline

Activity: 882
Merit: 5814


not your keys, not your coins!


View Profile WWW
September 18, 2022, 11:24:43 PM
 #270

Here you have another toy to play with :

https://github.com/phrutis/MiniKeys2

This is the fastest public program to find old Serie1 minikeys (22 characters) in the world.


Link 404?

Other repositories under that account seem to be cracking based, with executables only... so yeah, nah.
No vouch or idea whether legit or not, but there is one result on GitHub:

https://github.com/Yanmailde/Phrutis_MiniKeys2

No source code either, just binaries; so proceed with extreme caution. Maybe it's possible to contact the repo's owner to clarify.

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
ABCbits
Legendary
*
Offline Offline

Activity: 2856
Merit: 7407


Crypto Swap Exchange


View Profile
September 19, 2022, 12:30:20 PM
Merited by vapourminer (1), n0nce (1)
 #271

--snip--
No vouch or idea whether legit or not, but there is one result on GitHub:

https://github.com/Yanmailde/Phrutis_MiniKeys2

No source code either, just binaries; so proceed with extreme caution. Maybe it's possible to contact the repo's owner to clarify.

After reading one of the FAQ and knowing the owner delete original repository, you could wasting your time.

If I find the private key can I take all the coins for myself?

No, you will find the encrypted key.
Only the organizers can decrypt this key and pay you a 50%.

I'd recommend people to use different tool such as https://github.com/Coding-Enthusiast/FinderOuter to brute force mini private key.

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
PlutonowyPokrzycz
Newbie
*
Offline Offline

Activity: 16
Merit: 8


View Profile
September 23, 2022, 04:11:19 PM
Merited by vapourminer (2)
 #272

Interesting update...
Address 1HZwkjkeaoZfTSaJxDw6aKkxp45agDiEzN is derived from hashed empty string "". Two moths ago (!) someone sent almost 1BTC to this address. I guess by mistake. It took as mush as 10 minutes to drain this address.

https://www.blockchain.com/btc/tx/37e166a1e52e96bcfe535738082e328ef8db56aafd6945d9cad6f2afdb34b4a4
casinotester0001
Member
**
Offline Offline

Activity: 194
Merit: 67

'Bitcoin signature chain' & '1 pixel inscriptions'


View Profile
September 23, 2022, 06:01:23 PM
 #273

Interesting update...
Address 1HZwkjkeaoZfTSaJxDw6aKkxp45agDiEzN is derived from hashed empty string "". Two moths ago (!) someone sent almost 1BTC to this address. I guess by mistake. It took as mush as 10 minutes to drain this address.

https://www.blockchain.com/btc/tx/37e166a1e52e96bcfe535738082e328ef8db56aafd6945d9cad6f2afdb34b4a4

Maybe the miner inserted both transactions into the block and we never saw them in the mempool before being in the block.
COBRAS
Member
**
Offline Offline

Activity: 844
Merit: 20

$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk


View Profile
September 25, 2022, 06:27:55 PM
 #274

Interesting update...
Address 1HZwkjkeaoZfTSaJxDw6aKkxp45agDiEzN is derived from hashed empty string "". Two moths ago (!) someone sent almost 1BTC to this address. I guess by mistake. It took as mush as 10 minutes to drain this address.

https://www.blockchain.com/btc/tx/37e166a1e52e96bcfe535738082e328ef8db56aafd6945d9cad6f2afdb34b4a4

adres privkey https://privatekeys.pw/address/bitcoin/1HZwkjkeaoZfTSaJxDw6aKkxp45agDiEzN

$$$ P2P NETWORK FOR BTC WALLET.DAT BRUTE F ORCE .JOIN NOW=GET MANY COINS NOW !!!
https://github.com/phrutis/LostWallet  https://t.me/+2niP9bQ8uu43MDg6
larry_vw_1955
Sr. Member
****
Offline Offline

Activity: 1036
Merit: 351


View Profile
October 12, 2022, 11:18:27 PM
 #275


Interesting update...
Address 1HZwkjkeaoZfTSaJxDw6aKkxp45agDiEzN is derived from hashed empty string "". Two moths ago (!) someone sent almost 1BTC to this address. I guess by mistake. It took as mush as 10 minutes to drain this address.

https://www.blockchain.com/btc/tx/37e166a1e52e96bcfe535738082e328ef8db56aafd6945d9cad6f2afdb34b4a4

how would someone make a mistake like that? it doesn't seem probable.
n0nce
Hero Member
*****
Offline Offline

Activity: 882
Merit: 5814


not your keys, not your coins!


View Profile WWW
October 13, 2022, 11:57:25 PM
 #276

Interesting update...
Address 1HZwkjkeaoZfTSaJxDw6aKkxp45agDiEzN is derived from hashed empty string "". Two moths ago (!) someone sent almost 1BTC to this address. I guess by mistake. It took as mush as 10 minutes to drain this address.

https://www.blockchain.com/btc/tx/37e166a1e52e96bcfe535738082e328ef8db56aafd6945d9cad6f2afdb34b4a4

how would someone make a mistake like that? it doesn't seem probable.
I guess it's always possible to use something like this for money laundering.
I.e.: (1) Send 1BTC to address whose private key is publicly known.
(2) Sweep the funds a few minutes later (depending on the amount of plausible deniability vs. risk you're willing to take).
(3) Claim you mistakenly sent the funds and that they're gone, since it's an address whose private key is known.

Then mix and be happy. Just an idea.

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
PrivatePerson
Member
**
Offline Offline

Activity: 173
Merit: 12


View Profile
October 14, 2022, 03:12:15 AM
Merited by LoyceV (4), ABCbits (1)
 #277

I guess it's always possible to use something like this for money laundering.
I.e.: (1) Send 1BTC to address whose private key is publicly known.
(2) See how your BTC was collected by someone else's bot.
(3) Cry because you are a loser  Grin
LoyceV
Legendary
*
Offline Offline

Activity: 3290
Merit: 16558


Thick-Skinned Gang Leader and Golden Feather 2021


View Profile WWW
October 14, 2022, 09:28:05 AM
 #278

I guess it's always possible to use something like this for money laundering.
~
(3) Claim you mistakenly sent the funds and that they're gone, since it's an address whose private key is known.
That's not money laundering. It sounds more like a "boating accident".

Quote
Then mix and be happy. Just an idea.
Now you have money you don't officially have, and can't officially spend. Great for buying drugs, terrible for buying a car.

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
n0nce
Hero Member
*****
Offline Offline

Activity: 882
Merit: 5814


not your keys, not your coins!


View Profile WWW
October 14, 2022, 10:43:03 PM
Last edit: October 14, 2022, 10:57:27 PM by n0nce
 #279

I guess it's always possible to use something like this for money laundering.
I.e.: (1) Send 1BTC to address whose private key is publicly known.
(2) See how your BTC was collected by someone else's bot.
(3) Cry because you are a loser  Grin
I actually addressed your criticism: 'a few minutes later (depending on the amount of plausible deniability vs. risk you're willing to take)'.
Never claimed that this was a risk-free method. Wink As we saw above, it took a whole 10 minutes for (maybe) a bot to sweep the funds.

I guess it's always possible to use something like this for money laundering.
I.e.: (1) Send 1BTC to address whose private key is publicly known.
(2) Sweep the funds a few minutes later (depending on the amount of plausible deniability vs. risk you're willing to take).
(3) Claim you mistakenly sent the funds and that they're gone, since it's an address whose private key is known.

Alternatively, generate private key with relative weak (but not publicly known) string before executing your idea. After some time you could make an account on social media/forum and claim you found another weak Brainwallets which already emptied.

P.S. This is informative post, i'm not taking any responsibility if you weaken your privacy or lose your money Tongue.
That's much better actually! Cheesy All hypothetical of course. Wink

I guess it's always possible to use something like this for money laundering.
~
(3) Claim you mistakenly sent the funds and that they're gone, since it's an address whose private key is known.
That's not money laundering. It sounds more like a "boating accident".

Quote
Then mix and be happy. Just an idea.
Now you have money you don't officially have, and can't officially spend. Great for buying drugs, terrible for buying a car.
Very true. Similar to mixing and buying on decentralized exchange, I guess. Except you can keep / export Bisq trade records and mixing receipts. Would you recommend this?

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
LoyceV
Legendary
*
Offline Offline

Activity: 3290
Merit: 16558


Thick-Skinned Gang Leader and Golden Feather 2021


View Profile WWW
October 15, 2022, 09:12:41 AM
Merited by n0nce (1)
 #280

I actually addressed your criticism: 'a few minutes later (depending on the amount of plausible deniability vs. risk you're willing to take)'.
Never claimed that this was a risk-free method. Wink As we saw above, it took a whole 10 minutes for (maybe) a bot to sweep the funds.
It's rare, but I think you missed the point completely. It doesn't take 10 minutes to sweep the funds (and you shouldn't trust Blockchain.com on this). This is what Blockchair.com shows:
Image loading...
I give it half a second between the moment you broadcast the transaction, and the moment you see it disappear from the compromised address. Many bots are competing to steel those funds, and the fastest wins. You won't have minutes, you won't have seconds. Your money is instantly gone.

Quote
Now you have money you don't officially have, and can't officially spend. Great for buying drugs, terrible for buying a car.
Very true. Similar to mixing and buying on decentralized exchange, I guess. Except you can keep / export Bisq trade records and mixing receipts. Would you recommend this?
It depends: your drug dealer won't care about receipts, your tax man will.

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 [14] 15 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!