BitcoinFX
Legendary
Offline
Activity: 2646
Merit: 1720
https://youtu.be/DsAVx0u9Cw4 ... Dr. WHO < KLF
|
|
August 17, 2020, 03:39:18 PM |
|
lolz ... close, but no cigar ... now go here OP ... How hard would it be to brute force an address. (Numerically)- https://bitcointalk.org/index.php?topic=5267859.0
|
|
|
|
mamuu
Member
Offline
Activity: 72
Merit: 19
|
|
August 17, 2020, 07:44:56 PM |
|
I know a method how to find a private key for any publick key, but with modified base point(false BP). If someone making a code for calculating a private key for real base point, I will share code for find a private key for false base point and REAL publick key. This is a examles: Real BTC Basepoint (55066263022277343669578718895168534326250603453777594175500187360389116729240 : 32670510020758816978083085130507043184471273380659243275938904335757337482424 : 1)
False BTC Base Point [u](52426333756564302526085053269432084545410002202648992412042160756077650870390 : 79709923240617764371931483354308897031409999608033097982950682278401348639896 : 1)[/u]
[b]REAL Public key[/b] Q(41092972045662183626692698115026263699106807529773860274318687111639116151521, 25612602434799576731996141476317124058234433726241370033130536741579356668244)
[b]Public key generated[/b] Q1 (41092972045662183626692698115026263699106807529773860274318687111639116151521, 25612602434799576731996141476317124058234433726241370033130536741579356668244)
[b]Q1==Q True[/b]
[b]Private key [/b]87954421572711191797409873682088439575132560617980964771068188888320747613432 !!!
Any help are welcome !!! hi where is the method ? did you read new model POW attack ?
|
1DWA3Sa8i6eHVWV4AG4UP2SBhYB2XrfiHW
|
|
|
COBRAS (OP)
Member
Offline
Activity: 887
Merit: 22
|
|
August 17, 2020, 09:26:00 PM |
|
I know a method how to find a private key for any publick key, but with modified base point(false BP). If someone making a code for calculating a private key for real base point, I will share code for find a private key for false base point and REAL publick key. This is a examles: Real BTC Basepoint (55066263022277343669578718895168534326250603453777594175500187360389116729240 : 32670510020758816978083085130507043184471273380659243275938904335757337482424 : 1)
False BTC Base Point [u](52426333756564302526085053269432084545410002202648992412042160756077650870390 : 79709923240617764371931483354308897031409999608033097982950682278401348639896 : 1)[/u]
[b]REAL Public key[/b] Q(41092972045662183626692698115026263699106807529773860274318687111639116151521, 25612602434799576731996141476317124058234433726241370033130536741579356668244)
[b]Public key generated[/b] Q1 (41092972045662183626692698115026263699106807529773860274318687111639116151521, 25612602434799576731996141476317124058234433726241370033130536741579356668244)
[b]Q1==Q True[/b]
[b]Private key [/b]87954421572711191797409873682088439575132560617980964771068188888320747613432 !!!
Any help are welcome !!! hi where is the method ? did you read new model POW attack ? Need modify fake base point and get valid privkey. This is not to hard task, bat needed math knowledge. I hope there is someone who will make the code.
|
[
|
|
|
|
COBRAS (OP)
Member
Offline
Activity: 887
Merit: 22
|
|
August 17, 2020, 10:13:44 PM |
|
need someone who know how to subtract from basepoint fakeBP and after add and then what's left to add to the private key
|
[
|
|
|
mamuu
Member
Offline
Activity: 72
Merit: 19
|
|
August 17, 2020, 11:20:08 PM |
|
sage: P 115792089237316195423570985008687907853269984665640564039457584007908834671663 sage: EE Elliptic Curve defined by y^2 = x^3 + 7 over Finite Field of size 115792089237316195423570985008687907853269984665640564039457584007908834671663 sage: Q (41092972045662183626692698115026263699106807529773860274318687111639116151521 : 25612602434799576731996141476317124058234433726241370033130536741579356668244 : 1) sage: 87954421572711191797409873682088439575132560617980964771068188888320747613432 *Q (52426333756564302526085053269432084545410002202648992412042160756077650870390 : 79709923240617764371931483354308897031409999608033097982950682278401348639896 : 1) sage: 36540658479409362678121339879672694014739785286643571088000951145429744113500*Q (27766988394528305332024168539037695039502084538361626787903749004653433687854 : 13581498523946301885502763354170297668198202071266362739407311067363122460026 : 1) sage: sage: G (55066263022277343669578718895168534326250603453777594175500187360389116729240 : 32670510020758816978083085130507043184471273380659243275938904335757337482424 : 1) sage: 36540658479409362678121339879672694014739785286643571088000951145429744113500*Q +G (60514677919760207795808847379414464935859540298217373706884704950585656052831 : 92467424300256128213756399718584656167407456241133297890405049170425502221771 : 1) sage: 36540658479409362678121339879672694014739785286643571088000951145429744113501*Q (9870940521884748245828036059372982985243987669974027519407180018299448314799 : 84417392858735638984503471023078768847021781340877352409438879295369906944372 : 1) sage: 36540658479409362678121339879672694014739785286643571088000951145429744113500*Q -G (26526818200564724704301259892364899649062843225393016254446718809459073971066 : 58177991911204874107434935003117119688646076024935570317854531999248293096805 : 1) sage: CC(36540658479409362678121339879672694014739785286643571088000951145429744113500*Q -G) Adres: 1BLBtz4sZgDkCYaLAx1g17jfiLHPpiojEF Balance: 0 Tx: 0 Adres: 1B9kyL7qFSZaNRnkR3745zhg4vk3ZjSVPj Balance: 0 Tx: 0 Adres: 1JBLMwzGGRAga5oXSoh9aBCxFVT7t4wNRi Balance: 0 Tx: 0 Adres: 1BqzGKfAMj6AX9pdZG8C6AiDyaRqXPMpGc Balance: 0 Tx: 0 sage: CC(36540658479409362678121339879672694014739785286643571088000951145429744113500*Q -2*G) Adres: 14WtPAwTx3Wtp2pYrreztZy3FqVXWx7eQ3 Balance: 0 Tx: 0 Adres: 18HrA6fh3TjzxZ9CgkeL1ebDqZAP94xoNc Balance: 0 Tx: 0 Adres: 1BUXyr7653i4p5Zy85SXiHbrp6fnPjqCRS Balance: 0 Tx: 0 Adres: 1K3gF1uBixEgXbQjY9VUPHFH1nzVgbqkS4 Balance: 0 Tx: 0 sage: CC(36540658479409362678121339879672694014739785286643571088000951145429744113500*Q) Adres: 19qRsrAmc8ZfeAE8fLH7bguvWfTZ3MrLLS Balance: 0 Tx: 0 Adres: 16KrAKZ6SPESWL1RBkhSbjRwUzbSwBfRso Balance: 0 Tx: 0 Adres: 14B6z3QgLL6ygX27EjzjjgFMvQkumE41AA Balance: 0 Tx: 0 Adres: 14LnUUW8dX5Zh3YpddjVDFh24TZMdaf8S7 Balance: 0 Tx: 0 sage: CC(Q) Adres: 17XekGktaj9DMi61ndokjN6Sx7LNWsVYjQ Balance: 0 Tx: 0 Adres: 1LfV1tSt3KNyHpFJnAzrqsLFdeD2EvU1MK Balance: 10000.00188824 Tx: 46 Adres: 187cn4uGjP1rvjrPzSyWzQhX5rhz62ArNm Balance: 0 Tx: 0 Adres: 1CVZtk2czeMQeRfSeKNHYTDSMJEBXTS21Z Balance: 0 Tx: 0 sage: SmartAttack(G,Q,P)%P 49507345783879453664137177101856360142284501228139827997787302912743629416333 sage: SmartAttack(G,2*G,P)%P 92776810360347062140128362771302456139448233644672974681811545519691306070200 sage:
there is no fakeBP, all of them Q, Q is k.G 36540658479409362678121339879672694014739785286643571088000951145429744113500*Q == 36540658479409362678121339879672694014739785286643571088000951145429744113500*k*G if you want solve fakeBP, you can use ECDLP solver(like kangaroo) SmartAttack work on anomalous curve because trace of one but if work on sec curves, then always one result.
|
1DWA3Sa8i6eHVWV4AG4UP2SBhYB2XrfiHW
|
|
|
COBRAS (OP)
Member
Offline
Activity: 887
Merit: 22
|
|
August 17, 2020, 11:32:10 PM |
|
sage: P 115792089237316195423570985008687907853269984665640564039457584007908834671663 sage: EE Elliptic Curve defined by y^2 = x^3 + 7 over Finite Field of size 115792089237316195423570985008687907853269984665640564039457584007908834671663 sage: Q (41092972045662183626692698115026263699106807529773860274318687111639116151521 : 25612602434799576731996141476317124058234433726241370033130536741579356668244 : 1) sage: 87954421572711191797409873682088439575132560617980964771068188888320747613432 *Q (52426333756564302526085053269432084545410002202648992412042160756077650870390 : 79709923240617764371931483354308897031409999608033097982950682278401348639896 : 1) sage: 36540658479409362678121339879672694014739785286643571088000951145429744113500*Q (27766988394528305332024168539037695039502084538361626787903749004653433687854 : 13581498523946301885502763354170297668198202071266362739407311067363122460026 : 1) sage: sage: G (55066263022277343669578718895168534326250603453777594175500187360389116729240 : 32670510020758816978083085130507043184471273380659243275938904335757337482424 : 1) sage: 36540658479409362678121339879672694014739785286643571088000951145429744113500*Q +G (60514677919760207795808847379414464935859540298217373706884704950585656052831 : 92467424300256128213756399718584656167407456241133297890405049170425502221771 : 1) sage: 36540658479409362678121339879672694014739785286643571088000951145429744113501*Q (9870940521884748245828036059372982985243987669974027519407180018299448314799 : 84417392858735638984503471023078768847021781340877352409438879295369906944372 : 1) sage: 36540658479409362678121339879672694014739785286643571088000951145429744113500*Q -G (26526818200564724704301259892364899649062843225393016254446718809459073971066 : 58177991911204874107434935003117119688646076024935570317854531999248293096805 : 1) sage: CC(36540658479409362678121339879672694014739785286643571088000951145429744113500*Q -G) Adres: 1BLBtz4sZgDkCYaLAx1g17jfiLHPpiojEF Balance: 0 Tx: 0 Adres: 1B9kyL7qFSZaNRnkR3745zhg4vk3ZjSVPj Balance: 0 Tx: 0 Adres: 1JBLMwzGGRAga5oXSoh9aBCxFVT7t4wNRi Balance: 0 Tx: 0 Adres: 1BqzGKfAMj6AX9pdZG8C6AiDyaRqXPMpGc Balance: 0 Tx: 0 sage: CC(36540658479409362678121339879672694014739785286643571088000951145429744113500*Q -2*G) Adres: 14WtPAwTx3Wtp2pYrreztZy3FqVXWx7eQ3 Balance: 0 Tx: 0 Adres: 18HrA6fh3TjzxZ9CgkeL1ebDqZAP94xoNc Balance: 0 Tx: 0 Adres: 1BUXyr7653i4p5Zy85SXiHbrp6fnPjqCRS Balance: 0 Tx: 0 Adres: 1K3gF1uBixEgXbQjY9VUPHFH1nzVgbqkS4 Balance: 0 Tx: 0 sage: CC(36540658479409362678121339879672694014739785286643571088000951145429744113500*Q) Adres: 19qRsrAmc8ZfeAE8fLH7bguvWfTZ3MrLLS Balance: 0 Tx: 0 Adres: 16KrAKZ6SPESWL1RBkhSbjRwUzbSwBfRso Balance: 0 Tx: 0 Adres: 14B6z3QgLL6ygX27EjzjjgFMvQkumE41AA Balance: 0 Tx: 0 Adres: 14LnUUW8dX5Zh3YpddjVDFh24TZMdaf8S7 Balance: 0 Tx: 0 sage: CC(Q) Adres: 17XekGktaj9DMi61ndokjN6Sx7LNWsVYjQ Balance: 0 Tx: 0 Adres: 1LfV1tSt3KNyHpFJnAzrqsLFdeD2EvU1MK Balance: 10000.00188824 Tx: 46 Adres: 187cn4uGjP1rvjrPzSyWzQhX5rhz62ArNm Balance: 0 Tx: 0 Adres: 1CVZtk2czeMQeRfSeKNHYTDSMJEBXTS21Z Balance: 0 Tx: 0 sage: SmartAttack(G,Q,P)%P 49507345783879453664137177101856360142284501228139827997787302912743629416333 sage: SmartAttack(G,2*G,P)%P 92776810360347062140128362771302456139448233644672974681811545519691306070200 sage:
there is no fakeBP, all of them Q, Q is k.G 36540658479409362678121339879672694014739785286643571088000951145429744113500*Q == 36540658479409362678121339879672694014739785286643571088000951145429744113500*k*G if you want solve fakeBP, you can use ECDLP solver(like kangaroo) SmartAttack work on anomalous curve because trace of one but if work on sec curves, then always one result. if conwert curve equation, the trase will be not one. A forget form what without this bag(I mean secure and trace one, not secure - no bug) CC(36540658479409362678121339879672694014739785286643571088000951145429744113500*Q) what is it ? so you find private key for 10k btc ? Or this is a privkey * to Q ? and what is this - "sage: CC(Q)"?
|
[
|
|
|
mamuu
Member
Offline
Activity: 72
Merit: 19
|
|
August 17, 2020, 11:53:21 PM |
|
sage: P 115792089237316195423570985008687907853269984665640564039457584007908834671663 sage: EE Elliptic Curve defined by y^2 = x^3 + 7 over Finite Field of size 115792089237316195423570985008687907853269984665640564039457584007908834671663 sage: Q (41092972045662183626692698115026263699106807529773860274318687111639116151521 : 25612602434799576731996141476317124058234433726241370033130536741579356668244 : 1) sage: 87954421572711191797409873682088439575132560617980964771068188888320747613432 *Q (52426333756564302526085053269432084545410002202648992412042160756077650870390 : 79709923240617764371931483354308897031409999608033097982950682278401348639896 : 1) sage: 36540658479409362678121339879672694014739785286643571088000951145429744113500*Q (27766988394528305332024168539037695039502084538361626787903749004653433687854 : 13581498523946301885502763354170297668198202071266362739407311067363122460026 : 1) sage: sage: G (55066263022277343669578718895168534326250603453777594175500187360389116729240 : 32670510020758816978083085130507043184471273380659243275938904335757337482424 : 1) sage: 36540658479409362678121339879672694014739785286643571088000951145429744113500*Q +G (60514677919760207795808847379414464935859540298217373706884704950585656052831 : 92467424300256128213756399718584656167407456241133297890405049170425502221771 : 1) sage: 36540658479409362678121339879672694014739785286643571088000951145429744113501*Q (9870940521884748245828036059372982985243987669974027519407180018299448314799 : 84417392858735638984503471023078768847021781340877352409438879295369906944372 : 1) sage: 36540658479409362678121339879672694014739785286643571088000951145429744113500*Q -G (26526818200564724704301259892364899649062843225393016254446718809459073971066 : 58177991911204874107434935003117119688646076024935570317854531999248293096805 : 1) sage: CC(36540658479409362678121339879672694014739785286643571088000951145429744113500*Q -G) Adres: 1BLBtz4sZgDkCYaLAx1g17jfiLHPpiojEF Balance: 0 Tx: 0 Adres: 1B9kyL7qFSZaNRnkR3745zhg4vk3ZjSVPj Balance: 0 Tx: 0 Adres: 1JBLMwzGGRAga5oXSoh9aBCxFVT7t4wNRi Balance: 0 Tx: 0 Adres: 1BqzGKfAMj6AX9pdZG8C6AiDyaRqXPMpGc Balance: 0 Tx: 0 sage: CC(36540658479409362678121339879672694014739785286643571088000951145429744113500*Q -2*G) Adres: 14WtPAwTx3Wtp2pYrreztZy3FqVXWx7eQ3 Balance: 0 Tx: 0 Adres: 18HrA6fh3TjzxZ9CgkeL1ebDqZAP94xoNc Balance: 0 Tx: 0 Adres: 1BUXyr7653i4p5Zy85SXiHbrp6fnPjqCRS Balance: 0 Tx: 0 Adres: 1K3gF1uBixEgXbQjY9VUPHFH1nzVgbqkS4 Balance: 0 Tx: 0 sage: CC(36540658479409362678121339879672694014739785286643571088000951145429744113500*Q) Adres: 19qRsrAmc8ZfeAE8fLH7bguvWfTZ3MrLLS Balance: 0 Tx: 0 Adres: 16KrAKZ6SPESWL1RBkhSbjRwUzbSwBfRso Balance: 0 Tx: 0 Adres: 14B6z3QgLL6ygX27EjzjjgFMvQkumE41AA Balance: 0 Tx: 0 Adres: 14LnUUW8dX5Zh3YpddjVDFh24TZMdaf8S7 Balance: 0 Tx: 0 sage: CC(Q) Adres: 17XekGktaj9DMi61ndokjN6Sx7LNWsVYjQ Balance: 0 Tx: 0 Adres: 1LfV1tSt3KNyHpFJnAzrqsLFdeD2EvU1MK Balance: 10000.00188824 Tx: 46 Adres: 187cn4uGjP1rvjrPzSyWzQhX5rhz62ArNm Balance: 0 Tx: 0 Adres: 1CVZtk2czeMQeRfSeKNHYTDSMJEBXTS21Z Balance: 0 Tx: 0 sage: SmartAttack(G,Q,P)%P 49507345783879453664137177101856360142284501228139827997787302912743629416333 sage: SmartAttack(G,2*G,P)%P 92776810360347062140128362771302456139448233644672974681811545519691306070200 sage:
there is no fakeBP, all of them Q, Q is k.G 36540658479409362678121339879672694014739785286643571088000951145429744113500*Q == 36540658479409362678121339879672694014739785286643571088000951145429744113500*k*G if you want solve fakeBP, you can use ECDLP solver(like kangaroo) SmartAttack work on anomalous curve because trace of one but if work on sec curves, then always one result. sage: Q (41092972045662183626692698115026263699106807529773860274318687111639116151521 : 25612602434799576731996141476317124058234433726241370033130536741579356668244 : 1)
sage: str('02')+hex(41092972045662183626692698115026263699106807529773860274318687111639116151521).lstrip("0x") '025ad9cc469e32ea3d294a152b78bfded6ad47cfb9d5d9e52e201cd93d0c05fae1'
sage : ku 025ad9cc469e32ea3d294a152b78bfded6ad47cfb9d5d9e52e201cd93d0c05fae1
input : 025ad9cc469e32ea3d294a152b78bfded6ad47cfb9d5d9e52e201cd93d0c05fae1 network : Bitcoin mainnet symbol : BTC public pair x : 41092972045662183626692698115026263699106807529773860274318687111639116151521 public pair y : 25612602434799576731996141476317124058234433726241370033130536741579356668244 x as hex : 5ad9cc469e32ea3d294a152b78bfded6ad47cfb9d5d9e52e201cd93d0c05fae1 y as hex : 38a03820dcda0c431bf15f4fe897d36c5053981610b20e1699853a00b3248154 y parity : even key pair as sec : 025ad9cc469e32ea3d294a152b78bfded6ad47cfb9d5d9e52e201cd93d0c05fae1 uncompressed : 045ad9cc469e32ea3d294a152b78bfded6ad47cfb9d5d9e52e201cd93d0c05fae1\ 38a03820dcda0c431bf15f4fe897d36c5053981610b20e1699853a00b3248154 hash160 : d7b1951a0da15bce93d296b386b4e473e8c00c65 uncompressed : 479cbe0cd292709e8595c541146cd6231add3eda Bitcoin address : 1LfV1tSt3KNyHpFJnAzrqsLFdeD2EvU1MK Bitcoin address uncompressed : 17XekGktaj9DMi61ndokjN6Sx7LNWsVYjQ Bitcoin segwit address : bc1q67ce2xsd59duay7jj6ecdd8yw05vqrr9yd638m p2sh segwit : 38Hhqsz98m8bjAJ9JhrN6RMx25Kz32UdS4 corresponding p2sh script : 0014d7b1951a0da15bce93d296b386b4e473e8c00c65
sage: CC(Q) Adres: 17XekGktaj9DMi61ndokjN6Sx7LNWsVYjQ Balance: 0 Tx: 0 Adres: 1LfV1tSt3KNyHpFJnAzrqsLFdeD2EvU1MK Balance: 10000.00188824 Tx: 46 Adres: 187cn4uGjP1rvjrPzSyWzQhX5rhz62ArNm Balance: 0 Tx: 0 Adres: 1CVZtk2czeMQeRfSeKNHYTDSMJEBXTS21Z Balance: 0 Tx: 0 sage:
CC() is check balance function on ellipticcurve points for bitcoin sage: 36540658479409362678121339879672694014739785286643571088000951145429744113500*Q (27766988394528305332024168539037695039502084538361626787903749004653433687854 : 13581498523946301885502763354170297668198202071266362739407311067363122460026 : 1)
sage: FakeBP (27766988394528305332024168539037695039502084538361626787903749004653433687854 : 13581498523946301885502763354170297668198202071266362739407311067363122460026 : 1)
sage: 36540658479409362678121339879672694014739785286643571088000951145429744113500*Q == FakeBP True sage:
|
1DWA3Sa8i6eHVWV4AG4UP2SBhYB2XrfiHW
|
|
|
COBRAS (OP)
Member
Offline
Activity: 887
Merit: 22
|
|
August 18, 2020, 12:06:52 AM |
|
@mamuu, Im go to sleep now. I will answer you in the morning.
But I not understand why you always multiply some number to stable Q. If you mean what Q is a basepoint, so, you need Q<> QPublickkey.
And were is your private key ?
You know SAGE this is a good news.
|
[
|
|
|
MrFreeDragon
|
|
August 18, 2020, 09:24:24 AM |
|
The set of elliptic curve points is a wheel (repeating from the beginning as soon as reach the order). Actually you try to straighten the wheel, starting from different points (base point) considering the start of length as the base point.
There is no advantage in it. So do not waste your time.
|
|
|
|
ewaspiro
Member
Offline
Activity: 74
Merit: 10
|
|
August 27, 2020, 02:48:02 PM |
|
I know a method how to find a private key for any publick key, but with modified base point(false BP). If someone making a code for calculating a private key for real base point, I will share code for find a private key for false base point and REAL publick key. This is a examles: Real BTC Basepoint (55066263022277343669578718895168534326250603453777594175500187360389116729240 : 32670510020758816978083085130507043184471273380659243275938904335757337482424 : 1)
False BTC Base Point [u](52426333756564302526085053269432084545410002202648992412042160756077650870390 : 79709923240617764371931483354308897031409999608033097982950682278401348639896 : 1)[/u]
[b]REAL Public key[/b] Q(41092972045662183626692698115026263699106807529773860274318687111639116151521, 25612602434799576731996141476317124058234433726241370033130536741579356668244)
[b]Public key generated[/b] Q1 (41092972045662183626692698115026263699106807529773860274318687111639116151521, 25612602434799576731996141476317124058234433726241370033130536741579356668244)
[b]Q1==Q True[/b]
[b]Private key [/b]87954421572711191797409873682088439575132560617980964771068188888320747613432 !!!
Any help are welcome !!! Well, why dont you use Pollard on any public key exposed before 2015 with a balance. Much easier than what you are trying to do. Or even throw ina few custom spartan 6 to spin off that private key recovery.
|
If I dont reply to your PM means I dont want to have you send me more PMs
|
|
|
bigvito19
|
|
August 27, 2020, 03:43:10 PM Last edit: August 27, 2020, 07:32:56 PM by bigvito19 |
|
I know a method how to find a private key for any publick key, but with modified base point(false BP). If someone making a code for calculating a private key for real base point, I will share code for find a private key for false base point and REAL publick key. This is a examles: Real BTC Basepoint (55066263022277343669578718895168534326250603453777594175500187360389116729240 : 32670510020758816978083085130507043184471273380659243275938904335757337482424 : 1)
False BTC Base Point [u](52426333756564302526085053269432084545410002202648992412042160756077650870390 : 79709923240617764371931483354308897031409999608033097982950682278401348639896 : 1)[/u]
[b]REAL Public key[/b] Q(41092972045662183626692698115026263699106807529773860274318687111639116151521, 25612602434799576731996141476317124058234433726241370033130536741579356668244)
[b]Public key generated[/b] Q1 (41092972045662183626692698115026263699106807529773860274318687111639116151521, 25612602434799576731996141476317124058234433726241370033130536741579356668244)
[b]Q1==Q True[/b]
[b]Private key [/b]87954421572711191797409873682088439575132560617980964771068188888320747613432 !!!
Any help are welcome !!! Well, why dont you use Pollard on any public key exposed before 2015 with a balance. Much easier than what you are trying to do. Or even throw ina few custom spartan 6 to spin off that private key recovery. What's special about public keys exposed before 2015?
|
|
|
|
Karartma1
Legendary
Offline
Activity: 2310
Merit: 1422
|
|
August 27, 2020, 05:18:25 PM |
|
In my start post I was show a private key -base point-public key and address with 1000 BTC. Well you have the private key, go sweep the 1000 BTC then. This private key for different base point !!! Need someone who can make a code for find privkey for legit base point this info about this modified base point, and legit private key for this modified base point. With 500 BTC any of us can be a king of some African country. Yes, if someone disappointed, and not thant get any btc from block chain this is mistake for future all life for him. So, lets make a code and go, Brothers !!!! I can provide more examples of privkey+basepoint+pubkey's !!! I gave you a bit of credit, but I lost you at the king of some African country part. /s Have fun cracking private keys with your script, if you are super lucky you might unleash satoshi's wealth. And then you would be the new king of bitcoin. In the meantime read this https://www.quora.com/Is-it-possible-for-someone-to-guess-a-private-key-to-a-Bitcoin-wallet-and-steal-the-coins
|
|
|
|
COBRAS (OP)
Member
Offline
Activity: 887
Merit: 22
|
|
August 27, 2020, 05:23:37 PM |
|
I know a method how to find a private key for any publick key, but with modified base point(false BP). If someone making a code for calculating a private key for real base point, I will share code for find a private key for false base point and REAL publick key. This is a examles: Real BTC Basepoint (55066263022277343669578718895168534326250603453777594175500187360389116729240 : 32670510020758816978083085130507043184471273380659243275938904335757337482424 : 1)
False BTC Base Point [u](52426333756564302526085053269432084545410002202648992412042160756077650870390 : 79709923240617764371931483354308897031409999608033097982950682278401348639896 : 1)[/u]
[b]REAL Public key[/b] Q(41092972045662183626692698115026263699106807529773860274318687111639116151521, 25612602434799576731996141476317124058234433726241370033130536741579356668244)
[b]Public key generated[/b] Q1 (41092972045662183626692698115026263699106807529773860274318687111639116151521, 25612602434799576731996141476317124058234433726241370033130536741579356668244)
[b]Q1==Q True[/b]
[b]Private key [/b]87954421572711191797409873682088439575132560617980964771068188888320747613432 !!!
Any help are welcome !!! Well, why dont you use Pollard on any public key exposed before 2015 with a balance. Much easier than what you are trying to do. Or even throw ina few custom spartan 6 to spin off that private key recovery. Did you fined something before 2015 ? Before 2015 is 256 bytes too and Kangaroo just time waster in task to crack 256 bytes.
|
[
|
|
|
BTCW
Copper Member
Full Member
Offline
Activity: 193
Merit: 235
Click "+Merit" top-right corner
|
|
August 27, 2020, 11:24:27 PM |
|
If you or anyone else could calculate private keys from public keys, you would accomplish one thing: bringing down the value of Bitcoin to zero.
|
|
|
|
|