dtbtc
Newbie
Offline
Activity: 1
Merit: 0
|
 |
June 18, 2024, 11:29:17 PM |
|
Hi Guys Im playing around with bitcoin puzzles , currently with VanBitCrackenRandom2 by scanning ranges and I think there is something not right or im missing something.... I need a tool which allows me to scan full ranges from my database. With above software there is no indication when / if range has been completely scanned . Even if I use small range which can be fully searched in seconds program is still looking for new keys good know where.
Can someone recommend any software ( gpu ) where I can specify in cmd start of the range and end of the range where I can get indication that range scan has been completed.
Currently Im using command:
VBCr -t 1 -gpu -gpuId 0 -g 2046,512 -bits 66 -dis 1 -begr 2000000000000000 -endr 3FFFFFFFFFFFFFFFF -r 210000 -o 66BitChallengeKey.txt 13zb1hQbWVsc2S7ZTZnP2G4undNNpdh5so
And I dont even think command is right as when switching to micro ranges its doing constant scan even if test keys are fund....
When I run this for:
VBCr -t 20 -dis 1 -begr 3FFFFFFFFFFFFFEFF -endr 3FFFFFFFFFFFFFFFF -r 1 -o aaa.txt 1Eo3WvHuWKcjcuA6R8KAPFWkNwMEa2WRvT where 1Eo3WvHuWKcjcuA6R8KAPFWkNwMEa2WRvT has a PK WIF of KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qaCyWMw1qH2rzy6joVM6 from 3FFFFFFFFFFFFFFFF its running all the time after the key is found regardless if I use -r flag or not... Thanks in advance...
|
|
|
|
|
benjaniah
Jr. Member
Offline
Activity: 54
Merit: 3
|
 |
July 14, 2024, 02:55:16 AM |
|
So, has anyone figured out a bulletproof way to spend puzzle 66's inputs, once the key is found, without the internet-of-bots stealing the prize? Other than trying to find a big enough mining pool that will mine your transaction into a block and not expose the transaction to the mempool? Could any mining pool even be trusted to that extent?
|
|
|
|
|
|
pbies
|
 |
July 14, 2024, 08:36:45 PM |
|
So, has anyone figured out a bulletproof way to spend puzzle 66's inputs, once the key is found, without the internet-of-bots stealing the prize? Other than trying to find a big enough mining pool that will mine your transaction into a block and not expose the transaction to the mempool? Could any mining pool even be trusted to that extent?
If knowing that pubkey of puzzle 66 would work like that, then any address and transaction is in danger. Stop beliving in bs.
|
BTC: bc1qmrexlspd24kevspp42uvjg7sjwm8xcf9w86h5k
|
|
|
WanderingPhilospher
Sr. Member
  
Offline
Activity: 1498
Merit: 286
Shooters Shoot...
|
 |
July 14, 2024, 09:24:26 PM |
|
So, has anyone figured out a bulletproof way to spend puzzle 66's inputs, once the key is found, without the internet-of-bots stealing the prize? Other than trying to find a big enough mining pool that will mine your transaction into a block and not expose the transaction to the mempool? Could any mining pool even be trusted to that extent?
If knowing that pubkey of puzzle 66 would work like that, then any address and transaction is in danger. Stop beliving in bs. Post a random 66 bit public key here and I will show you how easy it is to find. Might wanna read up on a few things.
|
|
|
|
|
WanderingPhilospher
Sr. Member
  
Offline
Activity: 1498
Merit: 286
Shooters Shoot...
|
 |
July 14, 2024, 09:29:54 PM |
|
Hi Guys Im playing around with bitcoin puzzles , currently with VanBitCrackenRandom2 by scanning ranges and I think there is something not right or im missing something.... I need a tool which allows me to scan full ranges from my database. With above software there is no indication when / if range has been completely scanned . Even if I use small range which can be fully searched in seconds program is still looking for new keys good know where.
Can someone recommend any software ( gpu ) where I can specify in cmd start of the range and end of the range where I can get indication that range scan has been completed.
Currently Im using command:
VBCr -t 1 -gpu -gpuId 0 -g 2046,512 -bits 66 -dis 1 -begr 2000000000000000 -endr 3FFFFFFFFFFFFFFFF -r 210000 -o 66BitChallengeKey.txt 13zb1hQbWVsc2S7ZTZnP2G4undNNpdh5so
And I dont even think command is right as when switching to micro ranges its doing constant scan even if test keys are fund....
When I run this for:
VBCr -t 20 -dis 1 -begr 3FFFFFFFFFFFFFEFF -endr 3FFFFFFFFFFFFFFFF -r 1 -o aaa.txt 1Eo3WvHuWKcjcuA6R8KAPFWkNwMEa2WRvT where 1Eo3WvHuWKcjcuA6R8KAPFWkNwMEa2WRvT has a PK WIF of KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qaCyWMw1qH2rzy6joVM6 from 3FFFFFFFFFFFFFFFF its running all the time after the key is found regardless if I use -r flag or not... Thanks in advance...
Hi, I modded VBCr, it is as its name states, random. It will not progress through a range. Also, you have a very low rekey rate in your second command line. This will cause the program to basically always rekey to new random points. There are plenty of programs out there that will do what you are wanting to do, especially if you are searching for a full length address. https://github.com/WanderingPhilosopher/VanBitCrakcenShttps://github.com/WanderingPhilosopher/KeyHuntCudaClientor any other Keyhunt-Cuda program on GitHub, or Rotor-Cuda or an oldie but goodie https://github.com/Telariust/VanitySearch-bitcrack/releasesHope that helps...
|
|
|
|
|
sdhgfdsjfgsiujdgf
Newbie
Offline
Activity: 11
Merit: 0
|
 |
July 14, 2024, 09:32:46 PM |
|
So, has anyone figured out a bulletproof way to spend puzzle 66's inputs, once the key is found, without the internet-of-bots stealing the prize? Other than trying to find a big enough mining pool that will mine your transaction into a block and not expose the transaction to the mempool? Could any mining pool even be trusted to that extent?
I cant belive that I read this BS again on this forum. Are you out of your mind? Why the hell do you need a mining pool?   I have read a similar BS from another user in another topic, that is talking about miners. You dont need any miners to get the money, when you got the privatekey, you can immediately take control of the bitcoins. Do you really dont know how?
|
|
|
|
|
|
nomachine
|
 |
July 15, 2024, 03:41:23 PM Last edit: July 15, 2024, 04:24:46 PM by nomachine |
|
So, has anyone figured out a bulletproof way to spend puzzle 66's inputs, once the key is found, without the internet-of-bots stealing the prize? Other than trying to find a big enough mining pool that will mine your transaction into a block and not expose the transaction to the mempool? Could any mining pool even be trusted to that extent?
I cant belive that I read this BS again on this forum. Are you out of your mind? Why the hell do you need a mining pool?   I have read a similar BS from another user in another topic, that is talking about miners. You dont need any miners to get the money, when you got the privatekey, you can immediately take control of the bitcoins. Do you really dont know how? It's a blast to solve Puzzle 65, 66, 67, 68. It takes about 60 seconds once we identify the public key from the blockchain. Here i tested my toddler bot script on Puzzle 65 = address -> 18ZMbwUFLMHoZBbfpCjUJQTCMCbktshgpe root@puzzle ~/Test # time python3 toddler_puzzle_bot.py Version 0.2.230519 Satoshi Quest, developed by AlbertoBSD Endomorphism enabled Threads : 12 Search compress only Quiet thread output K factor 4096 Mode BSGS sequential Opening file 65.txt Added 1 points from file Bit Range 65 -- from : 0x10000000000000000 -- to : 0x20000000000000000 N = 0x100000000000 Bloom filter for 17179869184 elements : 58890.60 MB Bloom filter for 536870912 elements : 1840.33 MB Bloom filter for 16777216 elements : 57.51 MB Allocating 256.00 MB for 16777216 bP Points Reading bloom filter from file keyhunt_bsgs_4_17179869184.blm .... Done! Reading bloom filter from file keyhunt_bsgs_6_536870912.blm .... Done! Reading bP Table from file keyhunt_bsgs_2_16777216.tbl .... Done! Reading bloom filter from file keyhunt_bsgs_7_16777216.blm .... Done! Thread Key found privkey 1a838b13505b26867 Publickey 0230210c23b1a047bc9bdbb13448e67deddc108946de6de639bcc75d47c0216b1b All points were found Private Key: 1a838b13505b26867 WIF Key: KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZM21gaY8WN2CdwnTG57 Starting Electrum .... starting daemon (PID 41802) true Keypair imported: 18ZMbwUFLMHoZBbfpCjUJQTCMCbktshgpe Transaction IDs: [] Daemon stopped Electrum daemon stopped successfully. real 2m46.311s user 1m55.133s sys 0m59.598s and the time required to import the key into Electrum and start the redirection of transactions (if they exist ). The 10 minutes is the average time and this is a pretty stupid circumstance. At this stage, the transaction has entered the mempool and remains 'Pending,' waiting for confirmation. It only takes a matter of seconds (for such a small range) to obtain the private key from public key, after which you (or a thousand of them) can replace the still-unconfirmed transaction in the mempool. In other words, you need a very strong miner to speed up (prioritize) the transaction to go through the mempool in one (or less than) minute for puzzle 66, 67, 68, 69.
|
BTC: bc1qdwnxr7s08xwelpjy3cc52rrxg63xsmagv50fa8
|
|
|
sdhgfdsjfgsiujdgf
Newbie
Offline
Activity: 11
Merit: 0
|
 |
July 18, 2024, 03:36:14 AM |
|
So, has anyone figured out a bulletproof way to spend puzzle 66's inputs, once the key is found, without the internet-of-bots stealing the prize? Other than trying to find a big enough mining pool that will mine your transaction into a block and not expose the transaction to the mempool? Could any mining pool even be trusted to that extent?
I cant belive that I read this BS again on this forum. Are you out of your mind? Why the hell do you need a mining pool?   I have read a similar BS from another user in another topic, that is talking about miners. You dont need any miners to get the money, when you got the privatekey, you can immediately take control of the bitcoins. Do you really dont know how? It's a blast to solve Puzzle 65, 66, 67, 68. It takes about 60 seconds once we identify the public key from the blockchain. Here i tested my toddler bot script on Puzzle 65 = address -> 18ZMbwUFLMHoZBbfpCjUJQTCMCbktshgpe root@puzzle ~/Test # time python3 toddler_puzzle_bot.py Version 0.2.230519 Satoshi Quest, developed by AlbertoBSD Endomorphism enabled Threads : 12 Search compress only Quiet thread output K factor 4096 Mode BSGS sequential Opening file 65.txt Added 1 points from file Bit Range 65 -- from : 0x10000000000000000 -- to : 0x20000000000000000 N = 0x100000000000 Bloom filter for 17179869184 elements : 58890.60 MB Bloom filter for 536870912 elements : 1840.33 MB Bloom filter for 16777216 elements : 57.51 MB Allocating 256.00 MB for 16777216 bP Points Reading bloom filter from file keyhunt_bsgs_4_17179869184.blm .... Done! Reading bloom filter from file keyhunt_bsgs_6_536870912.blm .... Done! Reading bP Table from file keyhunt_bsgs_2_16777216.tbl .... Done! Reading bloom filter from file keyhunt_bsgs_7_16777216.blm .... Done! Thread Key found privkey 1a838b13505b26867 Publickey 0230210c23b1a047bc9bdbb13448e67deddc108946de6de639bcc75d47c0216b1b All points were found Private Key: 1a838b13505b26867 WIF Key: KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZM21gaY8WN2CdwnTG57 Starting Electrum .... starting daemon (PID 41802) true Keypair imported: 18ZMbwUFLMHoZBbfpCjUJQTCMCbktshgpe Transaction IDs: [] Daemon stopped Electrum daemon stopped successfully. real 2m46.311s user 1m55.133s sys 0m59.598s and the time required to import the key into Electrum and start the redirection of transactions (if they exist ). The 10 minutes is the average time and this is a pretty stupid circumstance. At this stage, the transaction has entered the mempool and remains 'Pending,' waiting for confirmation. It only takes a matter of seconds (for such a small range) to obtain the private key from public key, after which you (or a thousand of them) can replace the still-unconfirmed transaction in the mempool. In other words, you need a very strong miner to speed up (prioritize) the transaction to go through the mempool in one (or less than) minute for puzzle 66, 67, 68, 69. Are you replying to me, or just randomly hallucinating? What is the purpose of your writing?
|
|
|
|
|
MrlostinBTC
Jr. Member
Offline
Activity: 51
Merit: 30
|
 |
July 18, 2024, 05:07:45 AM Last edit: July 18, 2024, 05:18:01 AM by MrlostinBTC |
|
So, has anyone figured out a bulletproof way to spend puzzle 66's inputs, once the key is found, without the internet-of-bots stealing the prize? Other than trying to find a big enough mining pool that will mine your transaction into a block and not expose the transaction to the mempool? Could any mining pool even be trusted to that extent?
I cant belive that I read this BS again on this forum. Are you out of your mind? Why the hell do you need a mining pool?   I have read a similar BS from another user in another topic, that is talking about miners. You dont need any miners to get the money, when you got the privatekey, you can immediately take control of the bitcoins. Do you really dont know how? Mining has nothing to do with obtaining the privkey, once its loaded and sent to a new address the next transaction in line will pick it up and you will obtain ownership. The alt coins however would be left intact and easily breakable for first come first serve. I know for a fact If I managed to break a puzzle I would not be worried about the small alt coin addresses, I am sure someone could sweep them all at once but I dont have time for that. Also a address without a outgoing TX does not have its public key exposed. Once coins are sent from a address the pubkey is leaked because the network needs it for verification to send the coins. The pubkey can easliy be cracked with tools listed here. So once someone sweeps BTC from say puzzle 66 the pubkey is now exposed. BSGS can now be used to crack the privkey in minutes or less. The reason puzzles 66 and up are still not broken is because the pubkey is not known. The creator knowningly sent small amounts of coins on other puzzles to expose some of the pubkeys. Puzzles 120, 125, 130, 135 ect. Maybe for fun who knows. Again, Miners have nothing to do with solving the puzzle. If 2 people were to try to send the coins at the same time for some reason on the same block, 1 transaction would reject depending on that tx in the mempool, and the exact time it was sent. The miner speed would be the same for both of them as the blocks get solved 1 at a time. The network will attemp a target time "usually a minute" for each block to get solved by adjusting difficuilty based on current net hash rate, its not perfect but a sudden ramp up in hash rate will only solve a few blocks before the difficuilty adjusts to correct the solving speed.
|
|
|
|
|
benjaniah
Jr. Member
Offline
Activity: 54
Merit: 3
|
 |
July 29, 2024, 05:36:35 AM |
|
So, has anyone figured out a bulletproof way to spend puzzle 66's inputs, once the key is found, without the internet-of-bots stealing the prize? Other than trying to find a big enough mining pool that will mine your transaction into a block and not expose the transaction to the mempool? Could any mining pool even be trusted to that extent?
I cant belive that I read this BS again on this forum. Are you out of your mind? Why the hell do you need a mining pool?   I have read a similar BS from another user in another topic, that is talking about miners. You dont need any miners to get the money, when you got the privatekey, you can immediately take control of the bitcoins. Do you really dont know how? It's a blast to solve Puzzle 65, 66, 67, 68. It takes about 60 seconds once we identify the public key from the blockchain. Here i tested my toddler bot script on Puzzle 65 = address -> 18ZMbwUFLMHoZBbfpCjUJQTCMCbktshgpe root@puzzle ~/Test # time python3 toddler_puzzle_bot.py Version 0.2.230519 Satoshi Quest, developed by AlbertoBSD Endomorphism enabled Threads : 12 Search compress only Quiet thread output K factor 4096 Mode BSGS sequential Opening file 65.txt Added 1 points from file Bit Range 65 -- from : 0x10000000000000000 -- to : 0x20000000000000000 N = 0x100000000000 Bloom filter for 17179869184 elements : 58890.60 MB Bloom filter for 536870912 elements : 1840.33 MB Bloom filter for 16777216 elements : 57.51 MB Allocating 256.00 MB for 16777216 bP Points Reading bloom filter from file keyhunt_bsgs_4_17179869184.blm .... Done! Reading bloom filter from file keyhunt_bsgs_6_536870912.blm .... Done! Reading bP Table from file keyhunt_bsgs_2_16777216.tbl .... Done! Reading bloom filter from file keyhunt_bsgs_7_16777216.blm .... Done! Thread Key found privkey 1a838b13505b26867 Publickey 0230210c23b1a047bc9bdbb13448e67deddc108946de6de639bcc75d47c0216b1b All points were found Private Key: 1a838b13505b26867 WIF Key: KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZM21gaY8WN2CdwnTG57 Starting Electrum .... starting daemon (PID 41802) true Keypair imported: 18ZMbwUFLMHoZBbfpCjUJQTCMCbktshgpe Transaction IDs: [] Daemon stopped Electrum daemon stopped successfully. real 2m46.311s user 1m55.133s sys 0m59.598s and the time required to import the key into Electrum and start the redirection of transactions (if they exist ). The 10 minutes is the average time and this is a pretty stupid circumstance. At this stage, the transaction has entered the mempool and remains 'Pending,' waiting for confirmation. It only takes a matter of seconds (for such a small range) to obtain the private key from public key, after which you (or a thousand of them) can replace the still-unconfirmed transaction in the mempool. In other words, you need a very strong miner to speed up (prioritize) the transaction to go through the mempool in one (or less than) minute for puzzle 66, 67, 68, 69. Are you replying to me, or just randomly hallucinating? What is the purpose of your writing? If (hypothetically) you found the private key for puzzle 66, and simply tried to spend puzzle 66's BTC balance to another wallet that you control, you better hope that that transaction gets mined into the next block within a few seconds, or it will be stolen with 100% certainty. This is also the case for the next few puzzles, 67,68,69...
|
|
|
|
|
1princess4
Newbie
Offline
Activity: 1
Merit: 0
|
 |
July 29, 2024, 07:24:37 PM |
|
If (hypothetically) you found the private key for puzzle 66, and simply tried to spend puzzle 66's BTC balance to another wallet that you control, you better hope that that transaction gets mined into the next block within a few seconds, or it will be stolen with 100% certainty. This is also the case for the next few puzzles, 67,68,69...
Hey, hypothetically i find the key, submit tx transaction with 0.1BTC going to my address and pay fee of 6.5 BTC. How do you steal my transaction ? Thank you!
|
|
|
|
|
|
albert0bsd
|
 |
July 29, 2024, 08:19:57 PM |
|
Hey,
hypothetically i find the key, submit tx transaction with 0.1BTC going to my address and pay fee of 6.5 BTC. How do you steal my transaction ?
Thank you!
It is a lose-lose example in my case the bot will keep increment 1sat/vB more than your or anyone else TX. In the final round in case to reach the limit of the input balance it will append an extra input to the TX and send 100% of the puzzle address as fee.
|
|
|
|
|
MrlostinBTC
Jr. Member
Offline
Activity: 51
Merit: 30
|
 |
July 30, 2024, 02:57:39 AM |
|
Hey,
hypothetically i find the key, submit tx transaction with 0.1BTC going to my address and pay fee of 6.5 BTC. How do you steal my transaction ?
Thank you!
It is a lose-lose example in my case the bot will keep increment 1sat/vB more than your or anyone else TX. In the final round in case to reach the limit of the input balance it will append an extra input to the TX and send 100% of the puzzle address as fee. Better to stick to the higher range keys then. 130 and up.
|
|
|
|
|
holy_ship
Jr. Member
Offline
Activity: 117
Merit: 1
|
 |
August 03, 2024, 06:03:33 PM |
|
Better to stick to the higher range keys then. 130 and up.
130+ with public tools is ridiculously unefficient.
|
|
|
|
|
sdhgfdsjfgsiujdgf
Newbie
Offline
Activity: 11
Merit: 0
|
 |
August 03, 2024, 09:48:58 PM |
|
If (hypothetically) you found the private key for puzzle 66, and simply tried to spend puzzle 66's BTC balance to another wallet that you control, you better hope that that transaction gets mined into the next block within a few seconds, or it will be stolen with 100% certainty. This is also the case for the next few puzzles, 67,68,69...
You mean that the Public Key will become visible to everyone BEFORE the bitcoins have moved to the new bitcoin address? Is this what you are saying? Will someone be able to beat my transaction and have his trasaction go thru before mine?
|
|
|
|
|
Akito S. M. Hosana
Jr. Member
Offline
Activity: 420
Merit: 8
|
 |
August 04, 2024, 07:52:31 AM Last edit: August 04, 2024, 08:05:40 AM by Akito S. M. Hosana |
|
So, has anyone figured out a bulletproof way to spend puzzle 66's inputs, once the key is found, without the internet-of-bots stealing the prize? Other than trying to find a big enough mining pool that will mine your transaction into a block and not expose the transaction to the mempool? Could any mining pool even be trusted to that extent?
I cant belive that I read this BS again on this forum. Are you out of your mind? Why the hell do you need a mining pool?   I have read a similar BS from another user in another topic, that is talking about miners. You dont need any miners to get the money, when you got the privatekey, you can immediately take control of the bitcoins. Do you really dont know how? It's a blast to solve Puzzle 65, 66, 67, 68. It takes about 60 seconds once we identify the public key from the blockchain. Here i tested my toddler bot script on Puzzle 65 = address -> 18ZMbwUFLMHoZBbfpCjUJQTCMCbktshgpe root@puzzle ~/Test # time python3 toddler_puzzle_bot.py Version 0.2.230519 Satoshi Quest, developed by AlbertoBSD Endomorphism enabled Threads : 12 Search compress only Quiet thread output K factor 4096 Mode BSGS sequential Opening file 65.txt Added 1 points from file Bit Range 65 -- from : 0x10000000000000000 -- to : 0x20000000000000000 N = 0x100000000000 Bloom filter for 17179869184 elements : 58890.60 MB Bloom filter for 536870912 elements : 1840.33 MB Bloom filter for 16777216 elements : 57.51 MB Allocating 256.00 MB for 16777216 bP Points Reading bloom filter from file keyhunt_bsgs_4_17179869184.blm .... Done! Reading bloom filter from file keyhunt_bsgs_6_536870912.blm .... Done! Reading bP Table from file keyhunt_bsgs_2_16777216.tbl .... Done! Reading bloom filter from file keyhunt_bsgs_7_16777216.blm .... Done! Thread Key found privkey 1a838b13505b26867 Publickey 0230210c23b1a047bc9bdbb13448e67deddc108946de6de639bcc75d47c0216b1b All points were found Private Key: 1a838b13505b26867 WIF Key: KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZM21gaY8WN2CdwnTG57 Starting Electrum .... starting daemon (PID 41802) true Keypair imported: 18ZMbwUFLMHoZBbfpCjUJQTCMCbktshgpe Transaction IDs: [] Daemon stopped Electrum daemon stopped successfully. real 2m46.311s user 1m55.133s sys 0m59.598s and the time required to import the key into Electrum and start the redirection of transactions (if they exist ). The 10 minutes is the average time and this is a pretty stupid circumstance. At this stage, the transaction has entered the mempool and remains 'Pending,' waiting for confirmation. It only takes a matter of seconds (for such a small range) to obtain the private key from public key, after which you (or a thousand of them) can replace the still-unconfirmed transaction in the mempool. In other words, you need a very strong miner to speed up (prioritize) the transaction to go through the mempool in one (or less than) minute for puzzle 66, 67, 68, 69. Are you replying to me, or just randomly hallucinating? What is the purpose of your writing? If (hypothetically) you found the private key for puzzle 66, and simply tried to spend puzzle 66's BTC balance to another wallet that you control, you better hope that that transaction gets mined into the next block within a few seconds, or it will be stolen with 100% certainty. This is also the case for the next few puzzles, 67,68,69... The only way to do that is by using the MARA Pool Slipstream. The transaction will be mined before the public key enters the mempool. It won't actually be seen at all through the mempool. 
|
|
|
|
|
|
nomachine
|
 |
August 04, 2024, 08:16:22 AM |
|
The only way to do that is by using the MARA Pool Slipstream. The transaction will be mined before the public key enters the mempool. It won't actually be seen at all through the mempool.  Yes. And they tell me that I am hallucinating that this is possible... 
|
BTC: bc1qdwnxr7s08xwelpjy3cc52rrxg63xsmagv50fa8
|
|
|
Cricktor
Legendary
Offline
Activity: 1470
Merit: 3900
|
 |
August 04, 2024, 09:49:04 AM |
|
If (hypothetically) you found the private key for puzzle 66, and simply tried to spend puzzle 66's BTC balance to another wallet that you control, you better hope that that transaction gets mined into the next block within a few seconds, or it will be stolen with 100% certainty. This is also the case for the next few puzzles, 67,68,69...
The only way to do that is by using the MARA Pool Slipstream. The transaction will be mined before the public key enters the mempool. It won't actually be seen at all through the mempool.  Interesting, as I'm not in the key hunting business, I didn't know about https://slipstream.mara.com/ yet. Thanks for pointing me to it. They seem to charge about double the current fee level (as of writing this post mempool.space indicated 5 sat/vB and Slipstream asks for a minimum fee of 10 sat/vB; I expected worse). I've read their ToS briefly and it seems at first glance that indeed they claim your submitted transaction remains "confidential" until mined into a block by their own pool. One can only hope that slipstream.mara.com are really honest and do not exploit the internal disclosure of the public key themselves. I heard that mara.com does attract some critisism, at minimum as far as I recognized for censoring certain transactions which got tagged as "not appropriate". Can't say anything how reliable they are when at minimum 6.6 BTC are at stake.
|
|
|
|
debiterik
Newbie
Offline
Activity: 1
Merit: 0
|
 |
August 09, 2024, 06:35:40 PM |
|
It is a lose-lose example in my case the bot will keep increment 1sat/vB more than your or anyone else TX.
In the final round in case to reach the limit of the input balance it will append an extra input to the TX and send 100% of the puzzle address as fee.
There are so many bots set up running hunting for the public key of 66. Wouldn't it already be the case where each of the bot will keep appending an extra input to the TX till it reaches 100% of the reward as a fee? The only way to do that is by using the MARA Pool Slipstream. The transaction will be mined before the public key enters the mempool.
It won't actually be seen at all through the mempool.
Do you know how the previous solver of puzzle 64 claimed his reward with just transaction fee of BTC 0.00063 while MARA isn't available yet and there also exists of bots out there back then?
|
|
|
|
|
|
kTimesG
|
 |
August 11, 2024, 08:11:02 PM |
|
Do you know how the previous solver of puzzle 64 claimed his reward with just transaction fee of BTC 0.00063 while MARA isn't available yet and there also exists of bots out there back then?
Because most likely it wasn't worth it to set up bots since the reward was relatively small, so no one really cared. Puzzle 66 can be cracked in less than 0.5 seconds (500 milliseconds) once the pubkey is revealed. One only needs a modest setup for that as well: a database of precomputed Tame DPs (less than a couple of GB, can be preloaded in RAM) and a low-budget GPU with a fast-returning execution kernel to find a couple of Wild DPs. Match with a Tame DP is basically instant. I don't understand people that setup multi-tens of GB stuff via BSGS to crack it in minutes, it makes no sense. Keep it simple.
|
Off the grid, training pigeons to broadcast signed messages.
|
|
|
|