almightyruler (OP)
Legendary
Offline
Activity: 2268
Merit: 1092
|
https://www.blockchain.com/btc/tx/1053fc6eaa6d9fce1b2084069ebb7ae08bcca0c96193ee7067f39df8fa0145b1?show_adv=falseAll outputs except one (change?) are the same 5480 satoshi amount. Some of the addresses have interesting looking patterns or sequences when viewed in hex format: 0001050101010101010000000000000000010203 0101010101010100000000000001020304050607 03050504040000017d0102030004110512213141 2e6a70677c303030303030303030303030303030 303030303030303030303036365c623339613566 3838393263353561326633666631383638303231 3e3030303030303030303030303030303035343a 5349472a303030303038382f494e497775756f48 5da8ffecc8ecffffffffffffffffffffffffffff 6465666768696a737475767778797a8283848586 85868788898a92939495969798999aa2a3a4a5a6 a7a8a9aab2b3b4b5b6b7b8b9bac2c3c4c5c6c7c8 f4f5f6f7f8f9faffda000c03010002110311003f ffe4f3fff6c4c8ffffffffffffffffffddffffff ffffffffffffffffdb0043013d4040564b56a85d ffffffffffffffffffffffffffffffffffc00011 ffffffffffffffffffffffffffffffffffffffff
This is just a quick visual browse of a few hundred hex values, so there's probably several I've missed. Viewing in binary or other formats may also reveal something. To 'solve' patterns like this - matching a specific RIPEMD-160 hash - would effectively require brute forcing the private key space, right? So then, it's more like a canary: if the funds assigned to any of these non-random patterns ever moved, it would be a very unlikely coincidence, or an indication that something is very wrong. Comments?
|
|
|
|
|
|
"I'm sure that in 20 years there will either be very large transaction volume or no volume." -- Satoshi
|
|
|
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
|
|
Coding Enthusiast
Legendary
Offline
Activity: 1039
Merit: 2783
Bitcoin and C♯ Enthusiast
|
|
September 29, 2018, 04:33:19 AM |
|
To 'solve' patterns like this - matching a specific RIPEMD-160 hash - would effectively require brute forcing the private key space, right?
You can't go in reverse. There are first two hashing algorithms that you have to reverse in order to find the public key: RIPEMD160 then SHA256 which is obviously impossible to reverse one, let alone two! Even having the public key you still have to reverse the Elliptic Curve calculations to get to the private key. Which is again obviously impossible. So then, it's more like a canary: if the funds assigned to any of these non-random patterns ever moved, it would be a very unlikely coincidence, or an indication that something is very wrong.
Not necessarily. All you can say is that it is impossible to find the private key by having the address. But what you don't know is that someone might have gotten lucky and actually created one of those addresses from a private key so they can spend the funds belonging to that key.
|
|
|
|
nc50lc
Legendary
Offline
Activity: 2408
Merit: 5588
Self-proclaimed Genius
|
|
September 29, 2018, 05:03:01 AM |
|
I think that this is some kind of a test, the sender must have tried to see if there is someone out there who's bruteforcing simple formats. And now currently monitoring these addresses.
There's one thing for sure. No one will actually solve them for a small change (584sat/address).
|
. .HUGE. | | | | | | █▀▀▀▀ █ █ █ █ █ █ █ █ █ █ █ █▄▄▄▄ | ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ . CASINO & SPORTSBOOK ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ | ▀▀▀▀█ █ █ █ █ █ █ █ █ █ █ █ ▄▄▄▄█ | | |
|
|
|
almightyruler (OP)
Legendary
Offline
Activity: 2268
Merit: 1092
|
|
September 29, 2018, 06:21:10 AM |
|
To 'solve' patterns like this - matching a specific RIPEMD-160 hash - would effectively require brute forcing the private key space, right?
You can't go in reverse. There are first two hashing algorithms that you have to reverse in order to find the public key: RIPEMD160 then SHA256 which is obviously impossible to reverse one, let alone two! Even having the public key you still have to reverse the Elliptic Curve calculations to get to the private key. Which is again obviously impossible. That was exactly my point: trying to find matches for these 'special' addresses is as statistically improbable as finding a brute force match for any address. So this wouldn't be a solvable puzzle. So then, it's more like a canary: if the funds assigned to any of these non-random patterns ever moved, it would be a very unlikely coincidence, or an indication that something is very wrong.
Not necessarily. All you can say is that it is impossible to find the private key by having the address. But what you don't know is that someone might have gotten lucky and actually created one of those addresses from a private key so they can spend the funds belonging to that key. Okay then, modify "any" to "more than a couple" Another unusual thing about this transaction: most of the addresses seem to have no apparent pattern (when viewed in hex, anyway). I can think of two potential reasons off the top of my head: 1. The private keys are randomly generated and are used as extra markers to reinforce proof of indiscriminate and broad key cracking. (Canary) 2. The private keys themselves have some kind of pattern, which is obfuscated by hashing to generate the address. (Puzzle) Or perhaps the sender just did some random crap in the hope that someone would notice and start a thread asking about it
|
|
|
|
simplexum
Newbie
Offline
Activity: 14
Merit: 10
|
|
September 29, 2018, 06:52:27 PM |
|
maybe someone just wanted to encode something and put it into blockchain, but for some reason decided to not use op_return approach, and encoded it in this strange manner?
|
|
|
|
HeRetiK
Legendary
Offline
Activity: 2926
Merit: 2091
Cashback 15%
|
maybe someone just wanted to encode something and put it into blockchain, but for some reason decided to not use op_return approach, and encoded it in this strange manner?
Seems like it. There's a couple of human-readable strings in there when converted to ASCII: Attempting to recreate #Foucault #Gyroscope <3 #embiiLNK Some of which seem to be part of an encoded jpg file: 2nd Foucault Attempt.jpg [...] JFIF [...] ExifMM [...] paint.net 4.0.9 And then there are these bits... &'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz &'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz ...which turn up in a couple of posts related to steganography CTF challenges so maybe there's some data hidden inside the encoded image? I'm drawing a blank on the rest though. Here's the full hex for anyone feeling like giving it a go: 5349472a303030303038382f494e497775756f48 364242452b66636f566c656b573667334b4e5556 516d76345751312f355273634d2f72654b537067 6331587447786b37616635497a5853734b634338 524f4c4c716b39582b3174364d4d49337130633d 3e3030303030303030303030303030303035343a 417474656d7074696e6720746f20726563726561 74652023466f756361756c7420234779726f7363 6f70650d0a3c332023656d6269694c4e4b3c3030 303030303030303030303036365c623339613566 3838393263353561326633666631383638303231 6438613366333961393538333666333965626236 3836623332613963656131646566333166360d0a 326e6420466f756361756c7420417474656d7074 2e6a70677c303030303030303030303030303030 323439353422ffd8ffe000104a46494600010101 00c000c00000ffe100aa4578696600004d4d002a 000000080009011a0005000000010000007a011b 0005000000010000008201280003000000010002 000001310002000000100000008a030100050000 00010000009a0303000100000001000000005110 0001000000010100000051110004000000010000 0000511200040000000100000000000000000000 00c000000001000000c0000000017061696e742e 6e657420342e302e3900000186a00000b18fffdb 00430039272b322b2439322e32403d3944568f5d 564f4f56af7d84688fcfb6dad6cbb6c8c4e4ffff ffe4f3fff6c4c8ffffffffffffffffffddffffff ffffffffffffffffdb0043013d4040564b56a85d 5da8ffecc8ecffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffc00011 08023c040003012200021101031101ffc4001f00 0001050101010101010000000000000000010203 0405060708090a0bffc400b51000020103030204 03050504040000017d0102030004110512213141 0613516107227114328191a1082342b1c11552d1 f02433627282090a161718191a25262728292a34 35363738393a434445464748494a535455565758 595a636465666768696a737475767778797a8384 85868788898a92939495969798999aa2a3a4a5a6 a7a8a9aab2b3b4b5b6b7b8b9bac2c3c4c5c6c7c8 c9cad2d3d4d5d6d7d8d9dae1e2e3e4e5e6e7e8e9 eaf1f2f3f4f5f6f7f8f9faffc4001f0100030101 0101010101010100000000000001020304050607 08090a0bffc400b5110002010204040304070504 0400010277000102031104052131061241510761 711322328108144291a1b1c109233352f0156272 d10a162434e125f11718191a262728292a353637 38393a434445464748494a535455565758595a63 6465666768696a737475767778797a8283848586 8788898a92939495969798999aa2a3a4a5a6a7a8 a9aab2b3b4b5b6b7b8b9bac2c3c4c5c6c7c8c9ca d2d3d4d5d6d7d8d9dae2e3e4e5e6e7e8e9eaf2f3 f4f5f6f7f8f9faffda000c03010002110311003f 00185331c5494d350323c521a76690d3013bd2e3 3494a38a005a4a527d29322800a434bd4d271408 5078a4cd18a28010f5a72d34d19340127149c7ad 33ea6940c5031723b53d64e69a149e95204c5002 8638a29281400b9a5cd26290d003b34a2994f140 0b49d2863e94dcf1cd00293c52034941a007668e 949486800ce69c29a29d400bc519a4a514005262 968a004a2969ac6800a33450a3078a005a2814b4 00da314ea314009da9052e29714009452d250000 d141a38a60252f7a294520131cd2e28a5a00052d 145001499a3345001466909005464e68024dc293 34d1ef4b400bc1e3148d46690d0002973494bda8 0109a09e2928ce28014f4a06290b6681c73400ec d266937734673400b9e69c0f14ca3771400fa426 99d6971ef400bba8ddc53692801f91de9ea7240a 88529ca91401216e68dc299d69075a00949a3b7b d33764d28eb400ea4268279a4a00438a3381c521 fd69541a00334bf5a5c0a43400b91403c5252806 800a2969401d6801334b47d282280141a33da81c 520eb40052fe341a43400d24d19a38a2800cd2d2 62918903819a005a3028e4814b83400de2970297 14607ad0034a9a4e69d9a4278a006e4d19c9a28c 50019a5079e690d250049d68a60269dbb8a005a3 3480d2d001477a4cd19a005a2928a0028cd2e690 0a04028a338a28187d682690d06800a677a7d34f 5a4030f5a4cd38f5a69a621a4d28e9494bf5a005 a43451400514514000f7a3b7bd145030340a4a07 26810629e06691464d482818a07147340a750037 0734b4b8a5a0420a08a70a438c5031a2968a0d00 213480d07914500068cd14da007e3341a40dc504 93400a0538f4a60268cd003a9c2994aadc73400e a4a414b400869b4f34d22800c528c5340a5fa500 380a3140ce39a5a0028a296801b4b41a4cd00145 14500068c529a4a004c51d294d34d003b8a38f5a 4e28a00507de824520a0d0019a292968018dd680 294f5a003400a4e4d141e94dcd001d69693bd1de 80168a2918d00141a4f7a750020a0f028e94c272 78a601de9f4ca51cd20168c528a434c038a3349d f14a47ad00252f6a0518a4002827279a70148073 4c039a052e0d2814806814efa51834b8a004a28d a68c1a002969306971c5002d21a3069306801453 b34dc518a005cd286c669b8a31400ecf146ea6e2 8c50029340269314b8a00526939a28a004a29693 9a0028cd146680004d2e69283400134537bd3ba5 001452668cd001494a4d203400514668c8a004a5 cd145001403494a6801d494da5068016969b4a28 00ef4b4d3d68a005341e94946280173499a4a70a 00319a42280723341348061eb484539a99400868 a28cd3101a296928185148696801334b4945020a 7014c1cd483a5031dd69714da78a0428a5149d29 722818668cd349a4cd003f3499a0514006696929 45002628c53a8ed400dc5267d69dde908cd00251 4b8a314008294518a28003494a68a0001a5cfa52 51400b9a339a4a280148a318a4a37500381a5a68 3ed466801d4a318a8f34a2801d4868cfad266801 706909c0a5c9a3ad001da9334bf4a6f7a0076062 9b4a0d1d450025145183eb400a3af3487ad03347 3400014e1494b8a0008a4a5c1a00a004c53714fe 6820d00379a46a7e0d211914011d29a3bd266800 27d68e9d6918d193400add2983934ac69b9a603b 34a3a53734a0d201475c52914831d68a005cd281 9a403269c68000052f14da5a0070a01e69b46281 8fcd19a4c52e2800a5cd2628a6019a334628c520 0cd14628a0028a31494c05e28a4a2900b4949450 02d149473400b499a4a39a005cd19e6939a39cd0 21d9a29b9a280179a334506800079a2928cd0014 6693346680168a33466800a4a3229734009475a5 a280128cd0693a50029c5266909a4cd003f20502 a3c9cd483a500068069334b40031a01a42695680 179c51d4519a280128141a074a00891f1529236d 57a5c9ef4089473c534f7a8c31073520f987bd00 1494a68238cd0021a28347340c3345251d281051 c63145276a00728cd48169a9d69f9a0621152423 73f3d05308cd4d00f918f7a004331c9f9568f3b9 fb8b51e28a0073beee3681f414dc52668a0070a3 34da2801726941a6d1400ecd00d25250029a338a 4a31400ece68cfbd2628a005c9f5a334518a0033 466814628000734518c514000eb451450014868a 09e680147d2945203de8fa5002d18a4a4ef400ec 5253875a43d6801334a39a6138a5068014d34e47 34b9f4a37678340082941a6938e0d00e2801f4b4 dce7ad1c7ad0317a9a7014ccfbd296a0090629dc 541ba97750226c8a322a0dc68cd032523de8c545 9a334012f5a69a6eea3750202bc5447ad4bbe987 e9400829070714ec6290fa8a0008cfd690a61694 1a70a008b91453df18f7a68a6003eb4e19a3af4a 50290000452e0d2d140c4c1a5c528068c5002814 52629462800a294d25020a5a3145030a33462931 400668a5c62928105145028185253a8e2810c269 7341a4a062d19a4e28a0419a28a2801334b494b4 000a28a4cd002e48a3752668a005dd4525140051 c5145001451499c5001de8c52734a050028a5349 9e68cd00140c77a3349400845371eb4fa4205000 a17b53f14c51834ea0031eb4628cd277a40068a5 c52631400b413c52507a50007ad2f6a414134011 a2e7ad4850119a6af6a79384a622023140a33c51 400eddc52eee38a6f6a2801dc52537345003b1ef 498a4a51400bc521eb466818a0072f5a78eb4cc8 14e07340c776a9adfa1aae0d4f077a006989fb0a 6152a7069cd33863f31c5319cb726800a95d0051 b6a2cd4d11cf068023452c70053e5555c01d6a50 02026a063939a00154b9c0a71450464d3a3fb8d5 1d0038c785c839a8fbd4c33e5535542aee61f4a0 08e81d7dea55642795146c024e3a500376301922 9a6a5dc431e739a0a06191d68023e2945388f940 1da9b8a005a295572093d29b8a002968652bd68a 00314d35322820934d2ebdd68021271467bd3a4d bc6def4dc500381e28ce29b40a0076ea3ad2528a 063860734d3ed4bda9281098cd21183cd3a9a4d0 037a519a76722928018d49ba9cde94cc5003c371 4a4d340f5a08a0604d00d21a5404903d680168c9 ab4b0a46bba4e6957ca938029058a80d59110007 cb9c8eb9a8e78b6371d0d47b8e31934c074bb55c 853c0a66e34d3d68a005dc68c9c52514085de697 7d339a298126ecd2d454e56f5a403a9cbc8e6987 9e94f1c5002b018a8f18a973c534e0d031b4a0d1 b68da45021c0d2d37a5140c703466931462801c0 d275a314b4000e29734945002e4d2669296800cd 00f34518a00292968a0028a3345001494bda9280 03451486800a2928e68105145253016814949cd2 01d49494bce6800a2901a01cd031dcd2519a39a0 42d14521a0028c5251400b452734a05001452e29 314005028c51400fe314d00500539452011064d3 8ae3a5229eb47340001eb4a45273475a005c0a42 0114983eb4b400a141eb4d70074a5c521a006914 114ea38c500420d39cfeeea3a731f945310ca28a 3b5002f6a01a4cf1476a005a4a3345300a5cd373 45003b341e9480d19a402834a0f3cd3734668024 ddc558b738463e95547b54f14c11301724f5cd00 47cb1e053bcb6c7dd34ef3dba0007d2813383d68 18d02a4881dd9a7acaae3e6519a4475562680249 46578cd57a99650ec413c1a8a4528ded401243de 8f31413f20a6c046ea6cbc4873400f04c8c01e9e 948c433609c014c46c367b53a446ce4720fa5002 8655e9cfd6950e5f3eb4d589cf6c52e363804d00 4a0003a73ef4c66607078a59b82290307186ea28 000320fb5369d1f0c476a6918931db34012a1000 5f5a685c3127a0a6c8d890e3b7a534c85860d004 b27cea1aa314f8f9461518f4a00940250e2a328d dc539988e076a689185003718a4c52b1cd03a500 1da92a548f8c9a8d87cc6801281d8518f5a785e3 26818bb0e29aca40cd26e233834e0cc572464502 23cf34879ef52f0c39a63019e280101a0918a3a0 a6120d0021e6928cd266801c28a40682c6800245 58b5504963daaa93535b4bb1f07a1a18d135c3f2 17f1a89325863ad4f24424c153834e8e2541927f 1a431b7270801eb554d4972fba538edc5439a620 a5a6e6941a042d068cd19a062628eb4b9a3bd021 28a5a280014b939a4a33400eeb49466933ed40c7 03818a787a8a8a00943034b9150e694134012e79 a322a2dc6943669812e4519151e6933480978a0e 2a2c9a37500487eb47e35164d1b8d0226a33516e 346ea06499a3351e68cd00499a3351eea5cd003b 3453334b9a00766834dcd19f5a0075252668cf34 080e73464d19a5c81400dc1f4a0668dd4a09a005 c1a3a13cd2e6855dee17d680230719a70c114920 0ae40e80d00d00380f6a76da4018aee038f5a4cf a9a0077141e948bc9c0ea69cd1381ebf4a006034 77a69c8eb4a1598671400b472281c75a33400507 8ef4b82dd01a4c50313f1a00a5fa0a07148419c5 19c0a18f02985bd2802407834669abd314ec5002 83cd21a2973c50019a5cd373499a00777e29334d 2d8a15b3f5a005cd2d26290500434add053694f2 94c4368a296980034514500141a296900da2968c 5300a434b8a4a0031494b450028a783c5329c3ee d218138a507b534d14087a9c1a7039a8853c1e28 18b9c1c8ed4e672e735193c500d004d136d7069d 3e37e45400e297713c9a00766944ae9f74f14ca5 c668024f3d8d349279279a60e28a00937e4519c0 a8d7ad29a00706e694139ce69a169d8a00297149 9a334012236da4ce1b22999a33cd004aebbb0477 a66d23b5343107834e12b7ad002118eb4e8d7730 a63396eb4f470a84f19a00717064c0e838a6bfdf a6e79cd49856e49c500354773d291db3d3a52b30 2703a5271400d039a9b0a9163b9a674a1d815eb8 3400c27de9334da5a0018d4669e4530f5a006d25 2d2530168cd252e68003494b49400edec4632714 649ee6a7b5895c31619c7415011c9a43128ef452 d310628e94a2971486368cd3b1462801b9a33ed4 a54514084cd0185183462801776694673d29391d 29793df140c9015f4a70dbe82a3031d6978a007f cbed46d5a60c52f1400a557b526c07bd1f8528c0 eb40842949b4538b0e949ce7a503131498a780de 868c1fee9a0433069181a791ec697140c8464515 2edf6a694a043052d2ec3460fa50312973cd2514 00b4629334b9a0028268cf34fe0a9f5a008f3c51 9a39a314085068cd2702909f4a603a8e698589a3 34807e477a33ef518eb4b40128e6a483fd70a801 c0a9adbfd664fa5004527df6fad20a7b236f3c1e b4805032c6ef2e34c0e0f5a8e65dad91d0f34e72 a36ab0e83b52b1df1023b52023878719a47cee27 38a4cd48253d08068111e09ea6a5cf9718c1e49a 4900c290304f6a7394c2e549a0061932304034cc f34a40cf030284197140121243851938ed44a300 12304d2eec4a7de992ab03c9c8ec680199a33938 c51da91797e2802594aa1da1338f534d8d83b6d3 1a818ea29f2940c49049a88ca4fcaa0283e94000 3834bbe9cc4440003e6f53492f4538c645002e78 e69bbb8a4da76eeea3a53e38f2858fa71400dc83 4f89033e08c8a8c2e13735588654660a1307d680 2bb29ec0d34706ac999470ab55dce49340c507bd b3bebfda4189aac0adc7b4805ba414839a3058a5 380cd463a548a3348456a77f0d329e3ee9aa10ca 5a4ef4ea00414528eb477a6014514b9e29009466 9692818bf5a69f5a776a4a042514668a602f6a50 7e5c503a520eb40c5ef41e38a075a0f5a401f514 6690d2a6dcfcf9c7b50019c51daa5cc0070ac7eb 4be7463ee47f9d0045838cd28538e869fe793c05 03f0a9237770c78e0500461188e8697ca7c7dd34 9e7c9ea3f2a53349eb400794fe94be53d287768d 8e471c934c123ff7a801e227f4a0c6c072281237 ad29909183400da524d26696801314629d8e2928 01a066908c53877a69a00334d0dcd1da900cd002 b1f5a4cd2b74a6e71401229e297351834abc9a00 928cd2734e1d281884fad3694f3499a0421a28ef 4d268017348dd2939eb4841a004348052e28c530 129c07ad000a780290c6e334629dd0537bd005ab 5e11bf9d5661f31ab56a311938e7a5567ff58de9 9a48040280b4528a60382d2ecc537752eea005db 4d20fa5383d26f3400ddb4605481fda94b8f4140 11518a712a7b527d2801bd28c9a711405e280101 34649a762971400807a9a5c0f5a314b40843f2d3 463a934e2462a2e68025dcb81eb4061daa30b4f0 28192063eb4bbcfad30628c8a043f7d1be9bc519 1400edc29370a63b7cbf2d30127b50049bc76a09 f6a68a70228189f851b7da94b519a004d949b295 9f14c6909e9c0a0429503a9a4dc074e6984d2500 38b1f5a4cd251400b45252d300a297eb45002514 0a2900e51eb52038e41e6a31d28cd0049e73839d c691a42fc9c67da99464e6801c5b3c934e562380 78a6014a462801d914ff003147441510e6978140 0acdb8e4d2ab29187cf1d314cc8a4cfb520262eb 8c2afe34c56dac09a6eef6a42c6801e4e493eb52 21cc6558d400f146ea00711489f7c7d69a58d2af 27e940124df78d419e6a4739a8bbd00582c9260b 1da69b23863c741c0a8a8a603fcc3b36f6ce69e2 6e140edd6a1cd0185202595d5b1807814eb63894 67bd45c50188391d68007f95d803c668c9ef4879 34940126735328c0a8946715350052e869cbc834 d2734aa69884c52d145030a28a0f140051451408 2973499a5a06069a69690d00145145310ab4a077 a6679a7678a00701cd211cd2afbd2b75a4318452 77a711484500145140a00502ac419daea06722a1 02a7b7eac3da80210b4ec5068a007c63f74e3d69 8054d10f91aa16245003a93eb480d04d0004d19a 074a4a00764d2678a5069c2818d5e7b539978a50 314b4088b1460e6a438a438a0061514d2a2a4a42 0500340a5e00a5c52104d003850ded480529a006 d0452e297140c611494e348462801a70293af4a0 8cf34a280258a356db9e726a4fb3c6cc71b8516d 8c37ad4a9903140c8fec89ea68fb30fef1a9e968 02b7d9873cd37eca7b30ab545003224d91ed26a1 6818b1395ab38e28da3d290154dbb76229a6de4f 41573681da8c5302898641da9a6365ea08ad0c53 40249cf23d280286314b9a92750b270319a8e810 678a294500fb5002528141614d327a0a007938a0 1cd444966e29c0e0e05301fcd148a49a5348051d 39a4278a421b149822980a39e4d388cd340a7d20 0da68da69696801318a46dbde948cd2703ad0030 b1ec28f988a9001dc52e2811110077a0538a60d3 945031b8a29f8a8dd82f4e4d0029e298cfd85318 9279a4a005a2814e0339a006e28a5c518a004a31 477a3140052d18a280128a290d002d0319a6d3d4 7340870a02ee6c0a78c7a5491e0a10080c68023f 294757fc8534ae09c1e3d69e5181c1149ed4860e a15c81d2a363534c3f79f85458cb6050020ce28c d4cb100b827e6a8483bb1de9884cd28058e05010 eedb8e6a4847ef467b500458a9a350f1b83d4720 d46c72c7d33535b8c2b11d7148657a290e727345 310a6963e5b1eb4869f6ff00eb07e7400494dd9f bbdfef8a9a5fde28603d8d3829da232474ce2901 5692a48943312fd17934a1637070486f4a2e0426 8a9447fba2f9e871491c61d492718a60460d2d2e dc9c0e6a6f9225c632f48086814b48680264a909 c0a8d3a5389a4055a51c74a280455084a2834500 28a5ed494500145149400a48069734cef4b4c009
|
. .HUGE. | | | | | | █▀▀▀▀ █ █ █ █ █ █ █ █ █ █ █ █▄▄▄▄ | ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ . CASINO & SPORTSBOOK ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ | ▀▀▀▀█ █ █ █ █ █ █ █ █ █ █ █ ▄▄▄▄█ | | |
|
|
|
TheArchaeologist
|
|
October 01, 2018, 06:30:56 AM |
|
Just adding my 2 cents:
It sure looks like this is a transaction for storing data in the blockchain using "Pay 2 Fake Key". The RIPEMD-160 is made based upon a message that was needed to encode. Based on BASE-58 encoding this was turned into an address. This means the private key for the address is unknown. The fact none of the inputs has been spent afterwards also points out to Pay 2 Fake Key addresses being used. So I agree this doesn't seem at all like a puzzle transaction aimed at cracking the private keys.
|
Sooner or later you're going to realize, just as I did, that there's a difference between knowing the path and walking the path
|
|
|
TheArchaeologist
|
|
October 01, 2018, 06:39:07 AM |
|
Even having the public key you still have to reverse the Elliptic Curve calculations to get to the private key. Which is again obviously impossible.
Well that depends. Based on the "32 BTC Puzzle transaction" thread it was made clear you can get the private key from a public key if you know already that the private key lies in a very limited range using a technique called "Baby Step - Giant Step". Borrowed from said thread: Getting the private key from a public key is known as "the elliptic curve discrete logarithm problem". There are several algorithms to solve this problem: 1) brute force attack (roughly p steps) 2) Pollard Rho (roughly sqrt(p) steps, based on birthday paradox) 3) Baby Step - Giant Step ( roughly sqrt(p) steps if you have enough memory space to store sqrt(p) points) (p = number of points = number of private keys ) Take a look at: http://andrea.corbellini.name/2015/06/08/elliptic-curve-cryptography-breaking-security-and-a-comparison-with-rsa/http://www.cs.umd.edu/~gasarch/COURSES/198/Su14/baby.pdf
|
Sooner or later you're going to realize, just as I did, that there's a difference between knowing the path and walking the path
|
|
|
Thirdspace
|
|
October 01, 2018, 11:32:07 PM |
|
All outputs except one (change?) are the same 5480 satoshi amount.
would be interesting to also include this in private keys brute force efforts too bad they all in the amount of 5480 satoshi, though I notice a few with double or higher amount I traversed the chain back and forward and the txid you posted isn't the start point, there are more similar txs and at one point there are a few same addresses used in those txs which later he consolidated and then distributed again... still can't figure out what exactly the true intention or meaning of all those txs
|
|
|
|
almightyruler (OP)
Legendary
Offline
Activity: 2268
Merit: 1092
|
|
October 02, 2018, 03:16:01 AM |
|
All outputs except one (change?) are the same 5480 satoshi amount.
would be interesting to also include this in private keys brute force efforts too bad they all in the amount of 5480 satoshi, though I notice a few with double or higher amount I traversed the chain back and forward and the txid you posted isn't the start point, there are more similar txs and at one point there are a few same addresses used in those txs which later he consolidated and then distributed again... still can't figure out what exactly the true intention or meaning of all those txs As suggested above, perhaps another way to embed data in the blockchain. I'm currently working through the list of used addresses (in hex format) and storing any lines which match at least 4 characters of a dictionary word. Much of it is coincidentally matching junk but there's plenty that look like they were deliberate: 0000000000000000000000000041706f6c6c6f5f .............Apollo_ 0000000000000000000048656c6c6f576f726c64 ..........HelloWorld 00000000554e49434f444500002affe20bf84943 ....UNICODE..*....IC 000000015061696e742e4e45542076332e352e31 ....Paint.NET v3.5.1 00000186a00000b18e50686f746f73686f702049 .........Photoshop I 0000040054657374696e672e2e2e206f6e652c20 ....Testing... one, 0000526573656172636820496e204d6f74696f6e ..Research In Motion 003650686f746f73686f7020332e30003842494d .6Photoshop 3.0.8BIM 00436f7079726967687420286329203139393820 .Copyright (c) 1998 00d320766f6963656420746865697220636f1dd4 .. voiced their co.. 01000000c6000002b64d6f746f726f6c61000044 .........Motorola..D 0321617320616e206578616d706c65206f661587 .!as an example of..
The run is barely 1% completed yet. Not really much point to this, since you'd find the same text by extracting strings from the blk*.dat files, but I'll publish the output once it's done. Possibly related, I've also seen transactions with multiple 546 satoshi unspent outputs: https://www.blockchain.com/btc/tx/cc9c0b95ac772515235147d8354ec8b8b0763bf842ad16b8b23f855c3dc6a57eI'm not very good at tracing transactions so there's probably a lot more weird stuff like this floating around, especially from the earlier days when the cost to send to an unspendable output was small.
|
|
|
|
almightyruler (OP)
Legendary
Offline
Activity: 2268
Merit: 1092
|
|
October 02, 2018, 03:29:27 AM |
|
I wonder if anyone has used arbitrary 20 byte data in outputs for timestamping purposes?
Instead of sending to hash160(pubkey(sha256("string"))), you could simply use hash160("string")
For explorers which display the hex value of the address hash (such as blockchain.com) you could encode numerical data directly, eg 0000000000000000000000000000000008675309
The catch is that the outputs will be (effectively) unspendable, which will pollute the UTXO space.
|
|
|
|
almightyruler (OP)
Legendary
Offline
Activity: 2268
Merit: 1092
|
|
October 02, 2018, 03:53:13 AM Last edit: October 02, 2018, 09:32:42 AM by almightyruler |
|
Just for fun I searched for some hex magic numbers: deadbeef: 1875a4b3640b3a6aa7b69ddeadbeef1274a32ab3 2cedeadbeefc782db0d9fdd1859403ba4fb6a306 429b24604593dbbe36376cd5deadbeef8d2ec7a9 52deadbeef97ba7a45941b4383ebc275429d7a8c 5425931b5b99c58b40bdce877ac13fb2deadbeef 5bd18b6a42b9247ef79214b7f87a2b53deadbeef d7de29af7c8deadbeef2b7c5fcedd1a63e61493e deadbeef00000000b00b1350000000000f00baba deadbeeff21e63bba92d19eee659ea6986583358 f9d6e2a2dca59ab6bf2bab6072a04deadbeef86e
badf00d: 6be68581c7c55b30ac7d7dfbaadf00dd162aa236 73e77c2f47963e30e794916c45baadf00da2bfe9 86baadf00d9abbe2dc3c6b6648352ae40cc3c05c 8d2f1da3a404cb53a146fbce1b3abaadf00d85d6 9d2f11e50997b7b360d58a13baadf00d8ad177b9
facebooc: 1dc16d838049ba8b38581483840d9fbcfaceb00c a57ac2b22eb4d19623a195faceb00cc4611e7828 ca2189268c19faceb00c98765266d23d134eae7b
I checked several of these addresses and the funds have been spent, which means the match is likely to be coincidental. This one is an exception: https://www.blockchain.com/btc/address/deadbeef00000000b00b1350000000000f00baba(I guess you could generate usable vanity MD160 addresses, too. Maybe that's what deadbeeff21e63bba92d19eee659ea6986583358 is?) Edit: I created a crude vanity generator for MD160 values. After 300 million random keys there are three generated addresses that are one hex digit off a 'deadbeef' prefix. So it's certainly possible. deadbeeaa5eedf9508a895e25a65e1ddd71cbd75 1MJR9evt3JZF15yUQ7WBzYXEx36qWBshvR deadbee292b0ed1c329c084b6a0cd19938a875da 1MJR9eS5daeCLSoAtemFuMZvDQkvYEdM4m deadbee8a83a5832898e40f0afaebbcfe7fd3c0d 1MJR9eonBNVDiwzmS4BQNWwWTJVPHsHi6s Edit again: after 600m keys I found me some md160 deadbeef! CPU time well spent (not!) deadbeef9bf4d14b53cd7f0331ab82e186600250 https://www.blockchain.com/btc/address/1MJR9fEaGS4Qkf78FFdEVgTYqaBzvABpHm
|
|
|
|
apxu
Member
Offline
Activity: 229
Merit: 13
|
|
October 02, 2018, 11:20:17 AM |
|
|
|
|
|
HeRetiK
Legendary
Offline
Activity: 2926
Merit: 2091
Cashback 15%
|
|
October 02, 2018, 12:42:33 PM |
|
Fun project, but different blockchain (ie. the page above is exploring the Bitcoin Cash blockchain, not the Bitcoin blockchain).
|
. .HUGE. | | | | | | █▀▀▀▀ █ █ █ █ █ █ █ █ █ █ █ █▄▄▄▄ | ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ . CASINO & SPORTSBOOK ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ | ▀▀▀▀█ █ █ █ █ █ █ █ █ █ █ █ ▄▄▄▄█ | | |
|
|
|
almightyruler (OP)
Legendary
Offline
Activity: 2268
Merit: 1092
|
|
October 02, 2018, 01:12:47 PM |
|
So all this was generated by user entered text on a website? Game over, then. That's no fun. ----- Something else related to address-as-data that I noticed: if you map the distribution of the first couple of bytes of all addresses (in raw/hex format), it's not as even as you would expect for a few hundred million cryptographic hashes. The following prefixes are over-represented: 0x0000 count 10049 0x04dd count 23896 0x0691 count 18798 0x69f3 count 34940 0x6aa3 count 12060 The average count, if evenly distributed, should be around 6800. Why does the 0x69f3 slot have nearly 6 times more addresses than the average? Drilling down further into that prefix: 3 bytes (only outliers shown) 0x69f373 count 2955 0x69f374 count 7744 0x69f375 count 7636 0x69f376 count 7669 0x69f377 count 2302 Things get more murky when I expand that to 4 and 5 bytes. I guess it may be several sets of embedded data which have many instances of the string 69 f3 7x in them.
|
|
|
|
apxu
Member
Offline
Activity: 229
Merit: 13
|
|
October 04, 2018, 11:51:06 AM |
|
Fun project, but different blockchain (ie. the page above is exploring the Bitcoin Cash blockchain, not the Bitcoin blockchain). That project was on Bitcoin blockchain in past. And there was not BitcoinCash in 2016
|
|
|
|
|