Bitcoin Forum
May 03, 2024, 06:40:14 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 [2]  All
  Print  
Author Topic: Private key hack new method  (Read 982 times)
BitcoinFX
Legendary
*
Offline Offline

Activity: 2646
Merit: 1720


https://youtu.be/DsAVx0u9Cw4 ... Dr. WHO < KLF


View Profile WWW
August 17, 2020, 03:39:18 PM
 #21

lolz ... close, but no cigar ... now go here OP ...  Cheesy

How hard would it be to brute force an address. (Numerically)
- https://bitcointalk.org/index.php?topic=5267859.0

"Bitcoin OG" 1JXFXUBGs2ZtEDAQMdZ3tkCKo38nT2XSEp | Bitcoin logo™ Enforcer? | Bitcoin is BTC | CSW is NOT Satoshi Nakamoto | I Mine BTC, LTC, ZEC, XMR and GAP | BTC on Tor addnodes Project | Media enquiries : Wu Ming | Enjoy The Money Machine | "You cannot compete with Open Source" and "Cryptography != Banana" | BSV and BCH are COUNTERFEIT.
1714761614
Hero Member
*
Offline Offline

Posts: 1714761614

View Profile Personal Message (Offline)

Ignore
1714761614
Reply with quote  #2

1714761614
Report to moderator
1714761614
Hero Member
*
Offline Offline

Posts: 1714761614

View Profile Personal Message (Offline)

Ignore
1714761614
Reply with quote  #2

1714761614
Report to moderator
"Governments are good at cutting off the heads of a centrally controlled networks like Napster, but pure P2P networks like Gnutella and Tor seem to be holding their own." -- Satoshi
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
mamuu
Member
**
Offline Offline

Activity: 71
Merit: 19


View Profile
August 17, 2020, 07:44:56 PM
 #22

I know a method how to find a private key for any publick key, but with modified base point(false BP).

If someone making a code for calculating a private key for real base point, I will share code for find a private key for false base point and REAL publick key.

This is a examles:

Code:
Real BTC Basepoint (55066263022277343669578718895168534326250603453777594175500187360389116729240 : 32670510020758816978083085130507043184471273380659243275938904335757337482424 : 1)


False BTC Base Point [u](52426333756564302526085053269432084545410002202648992412042160756077650870390 : 79709923240617764371931483354308897031409999608033097982950682278401348639896 : 1)[/u]

[b]REAL Public key[/b] Q(41092972045662183626692698115026263699106807529773860274318687111639116151521, 25612602434799576731996141476317124058234433726241370033130536741579356668244)

[b]Public key generated[/b] Q1 (41092972045662183626692698115026263699106807529773860274318687111639116151521, 25612602434799576731996141476317124058234433726241370033130536741579356668244)

[b]Q1==Q True[/b]




[b]Private key [/b]87954421572711191797409873682088439575132560617980964771068188888320747613432 !!!




Any help are welcome !!!

Huh


hi
where is the method ?  did you read new model POW attack ?

1DWA3Sa8i6eHVWV4AG4UP2SBhYB2XrfiHW
COBRAS (OP)
Member
**
Offline Offline

Activity: 846
Merit: 22

$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk


View Profile
August 17, 2020, 09:26:00 PM
 #23

I know a method how to find a private key for any publick key, but with modified base point(false BP).

If someone making a code for calculating a private key for real base point, I will share code for find a private key for false base point and REAL publick key.

This is a examles:

Code:
Real BTC Basepoint (55066263022277343669578718895168534326250603453777594175500187360389116729240 : 32670510020758816978083085130507043184471273380659243275938904335757337482424 : 1)


False BTC Base Point [u](52426333756564302526085053269432084545410002202648992412042160756077650870390 : 79709923240617764371931483354308897031409999608033097982950682278401348639896 : 1)[/u]

[b]REAL Public key[/b] Q(41092972045662183626692698115026263699106807529773860274318687111639116151521, 25612602434799576731996141476317124058234433726241370033130536741579356668244)

[b]Public key generated[/b] Q1 (41092972045662183626692698115026263699106807529773860274318687111639116151521, 25612602434799576731996141476317124058234433726241370033130536741579356668244)

[b]Q1==Q True[/b]




[b]Private key [/b]87954421572711191797409873682088439575132560617980964771068188888320747613432 !!!




Any help are welcome !!!

Huh


hi
where is the method ?  did you read new model POW attack ?

Need modify fake base point and get valid privkey. This is not to hard task, bat needed math knowledge.

I hope there is someone who will make the code.

$$$ P2P NETWORK FOR BTC WALLET.DAT BRUTE F ORCE .JOIN NOW=GET MANY COINS NOW !!!
https://github.com/phrutis/LostWallet  https://t.me/+2niP9bQ8uu43MDg6
dextronomous
Full Member
***
Offline Offline

Activity: 428
Merit: 105


View Profile
August 17, 2020, 09:48:57 PM
 #24

hi there,
you could checkout https://pypi.org/project/eciespy/
i guess some of the things you need.
COBRAS (OP)
Member
**
Offline Offline

Activity: 846
Merit: 22

$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk


View Profile
August 17, 2020, 10:13:44 PM
 #25

hi there,
you could checkout https://pypi.org/project/eciespy/
i guess some of the things you need.


need someone who know how to subtract from basepoint fakeBP and after add and then what's left to add to the private key

$$$ P2P NETWORK FOR BTC WALLET.DAT BRUTE F ORCE .JOIN NOW=GET MANY COINS NOW !!!
https://github.com/phrutis/LostWallet  https://t.me/+2niP9bQ8uu43MDg6
mamuu
Member
**
Offline Offline

Activity: 71
Merit: 19


View Profile
August 17, 2020, 11:20:08 PM
 #26

Code:
sage: P
115792089237316195423570985008687907853269984665640564039457584007908834671663
sage: EE
Elliptic Curve defined by y^2 = x^3 + 7 over Finite Field of size 115792089237316195423570985008687907853269984665640564039457584007908834671663
sage: Q
(41092972045662183626692698115026263699106807529773860274318687111639116151521 : 25612602434799576731996141476317124058234433726241370033130536741579356668244 : 1)
sage: 87954421572711191797409873682088439575132560617980964771068188888320747613432 *Q
(52426333756564302526085053269432084545410002202648992412042160756077650870390 : 79709923240617764371931483354308897031409999608033097982950682278401348639896 : 1)
sage: 36540658479409362678121339879672694014739785286643571088000951145429744113500*Q
(27766988394528305332024168539037695039502084538361626787903749004653433687854 : 13581498523946301885502763354170297668198202071266362739407311067363122460026 : 1)
sage:
sage: G
(55066263022277343669578718895168534326250603453777594175500187360389116729240 : 32670510020758816978083085130507043184471273380659243275938904335757337482424 : 1)
sage: 36540658479409362678121339879672694014739785286643571088000951145429744113500*Q +G
(60514677919760207795808847379414464935859540298217373706884704950585656052831 : 92467424300256128213756399718584656167407456241133297890405049170425502221771 : 1)
sage: 36540658479409362678121339879672694014739785286643571088000951145429744113501*Q
(9870940521884748245828036059372982985243987669974027519407180018299448314799 : 84417392858735638984503471023078768847021781340877352409438879295369906944372 : 1)
sage: 36540658479409362678121339879672694014739785286643571088000951145429744113500*Q -G
(26526818200564724704301259892364899649062843225393016254446718809459073971066 : 58177991911204874107434935003117119688646076024935570317854531999248293096805 : 1)
sage: CC(36540658479409362678121339879672694014739785286643571088000951145429744113500*Q -G)
Adres:  1BLBtz4sZgDkCYaLAx1g17jfiLHPpiojEF  Balance:  0  Tx:  0
Adres:  1B9kyL7qFSZaNRnkR3745zhg4vk3ZjSVPj  Balance:  0  Tx:  0
Adres:  1JBLMwzGGRAga5oXSoh9aBCxFVT7t4wNRi  Balance:  0  Tx:  0
Adres:  1BqzGKfAMj6AX9pdZG8C6AiDyaRqXPMpGc  Balance:  0  Tx:  0
sage: CC(36540658479409362678121339879672694014739785286643571088000951145429744113500*Q -2*G)
Adres:  14WtPAwTx3Wtp2pYrreztZy3FqVXWx7eQ3  Balance:  0  Tx:  0
Adres:  18HrA6fh3TjzxZ9CgkeL1ebDqZAP94xoNc  Balance:  0  Tx:  0
Adres:  1BUXyr7653i4p5Zy85SXiHbrp6fnPjqCRS  Balance:  0  Tx:  0
Adres:  1K3gF1uBixEgXbQjY9VUPHFH1nzVgbqkS4  Balance:  0  Tx:  0
sage: CC(36540658479409362678121339879672694014739785286643571088000951145429744113500*Q)
Adres:  19qRsrAmc8ZfeAE8fLH7bguvWfTZ3MrLLS  Balance:  0  Tx:  0
Adres:  16KrAKZ6SPESWL1RBkhSbjRwUzbSwBfRso  Balance:  0  Tx:  0
Adres:  14B6z3QgLL6ygX27EjzjjgFMvQkumE41AA  Balance:  0  Tx:  0
Adres:  14LnUUW8dX5Zh3YpddjVDFh24TZMdaf8S7  Balance:  0  Tx:  0
sage: CC(Q)
Adres:  17XekGktaj9DMi61ndokjN6Sx7LNWsVYjQ  Balance:  0  Tx:  0
Adres:  1LfV1tSt3KNyHpFJnAzrqsLFdeD2EvU1MK  Balance:  10000.00188824  Tx:  46
Adres:  187cn4uGjP1rvjrPzSyWzQhX5rhz62ArNm  Balance:  0  Tx:  0
Adres:  1CVZtk2czeMQeRfSeKNHYTDSMJEBXTS21Z  Balance:  0  Tx:  0
sage: SmartAttack(G,Q,P)%P
49507345783879453664137177101856360142284501228139827997787302912743629416333
sage: SmartAttack(G,2*G,P)%P
92776810360347062140128362771302456139448233644672974681811545519691306070200
sage:


there is no fakeBP, all of them Q, Q is k.G

36540658479409362678121339879672694014739785286643571088000951145429744113500*Q == 36540658479409362678121339879672694014739785286643571088000951145429744113500*k*G

if you want solve fakeBP, you can use ECDLP solver(like kangaroo)

SmartAttack work on anomalous curve because trace of one

but if work on sec curves, then  always one result.

1DWA3Sa8i6eHVWV4AG4UP2SBhYB2XrfiHW
COBRAS (OP)
Member
**
Offline Offline

Activity: 846
Merit: 22

$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk


View Profile
August 17, 2020, 11:32:10 PM
 #27

Code:
sage: P
115792089237316195423570985008687907853269984665640564039457584007908834671663
sage: EE
Elliptic Curve defined by y^2 = x^3 + 7 over Finite Field of size 115792089237316195423570985008687907853269984665640564039457584007908834671663
sage: Q
(41092972045662183626692698115026263699106807529773860274318687111639116151521 : 25612602434799576731996141476317124058234433726241370033130536741579356668244 : 1)
sage: 87954421572711191797409873682088439575132560617980964771068188888320747613432 *Q
(52426333756564302526085053269432084545410002202648992412042160756077650870390 : 79709923240617764371931483354308897031409999608033097982950682278401348639896 : 1)
sage: 36540658479409362678121339879672694014739785286643571088000951145429744113500*Q
(27766988394528305332024168539037695039502084538361626787903749004653433687854 : 13581498523946301885502763354170297668198202071266362739407311067363122460026 : 1)
sage:
sage: G
(55066263022277343669578718895168534326250603453777594175500187360389116729240 : 32670510020758816978083085130507043184471273380659243275938904335757337482424 : 1)
sage: 36540658479409362678121339879672694014739785286643571088000951145429744113500*Q +G
(60514677919760207795808847379414464935859540298217373706884704950585656052831 : 92467424300256128213756399718584656167407456241133297890405049170425502221771 : 1)
sage: 36540658479409362678121339879672694014739785286643571088000951145429744113501*Q
(9870940521884748245828036059372982985243987669974027519407180018299448314799 : 84417392858735638984503471023078768847021781340877352409438879295369906944372 : 1)
sage: 36540658479409362678121339879672694014739785286643571088000951145429744113500*Q -G
(26526818200564724704301259892364899649062843225393016254446718809459073971066 : 58177991911204874107434935003117119688646076024935570317854531999248293096805 : 1)
sage: CC(36540658479409362678121339879672694014739785286643571088000951145429744113500*Q -G)
Adres:  1BLBtz4sZgDkCYaLAx1g17jfiLHPpiojEF  Balance:  0  Tx:  0
Adres:  1B9kyL7qFSZaNRnkR3745zhg4vk3ZjSVPj  Balance:  0  Tx:  0
Adres:  1JBLMwzGGRAga5oXSoh9aBCxFVT7t4wNRi  Balance:  0  Tx:  0
Adres:  1BqzGKfAMj6AX9pdZG8C6AiDyaRqXPMpGc  Balance:  0  Tx:  0
sage: CC(36540658479409362678121339879672694014739785286643571088000951145429744113500*Q -2*G)
Adres:  14WtPAwTx3Wtp2pYrreztZy3FqVXWx7eQ3  Balance:  0  Tx:  0
Adres:  18HrA6fh3TjzxZ9CgkeL1ebDqZAP94xoNc  Balance:  0  Tx:  0
Adres:  1BUXyr7653i4p5Zy85SXiHbrp6fnPjqCRS  Balance:  0  Tx:  0
Adres:  1K3gF1uBixEgXbQjY9VUPHFH1nzVgbqkS4  Balance:  0  Tx:  0
sage: CC(36540658479409362678121339879672694014739785286643571088000951145429744113500*Q)
Adres:  19qRsrAmc8ZfeAE8fLH7bguvWfTZ3MrLLS  Balance:  0  Tx:  0
Adres:  16KrAKZ6SPESWL1RBkhSbjRwUzbSwBfRso  Balance:  0  Tx:  0
Adres:  14B6z3QgLL6ygX27EjzjjgFMvQkumE41AA  Balance:  0  Tx:  0
Adres:  14LnUUW8dX5Zh3YpddjVDFh24TZMdaf8S7  Balance:  0  Tx:  0
sage: CC(Q)
Adres:  17XekGktaj9DMi61ndokjN6Sx7LNWsVYjQ  Balance:  0  Tx:  0
Adres:  1LfV1tSt3KNyHpFJnAzrqsLFdeD2EvU1MK  Balance:  10000.00188824  Tx:  46
Adres:  187cn4uGjP1rvjrPzSyWzQhX5rhz62ArNm  Balance:  0  Tx:  0
Adres:  1CVZtk2czeMQeRfSeKNHYTDSMJEBXTS21Z  Balance:  0  Tx:  0
sage: SmartAttack(G,Q,P)%P
49507345783879453664137177101856360142284501228139827997787302912743629416333
sage: SmartAttack(G,2*G,P)%P
92776810360347062140128362771302456139448233644672974681811545519691306070200
sage:


there is no fakeBP, all of them Q, Q is k.G

36540658479409362678121339879672694014739785286643571088000951145429744113500*Q == 36540658479409362678121339879672694014739785286643571088000951145429744113500*k*G

if you want solve fakeBP, you can use ECDLP solver(like kangaroo)

SmartAttack work on anomalous curve because trace of one

but if work on sec curves, then  always one result.

if conwert curve equation, the trase will be not one. A forget form what without this bag(I mean secure and trace one, not secure - no bug)


CC(36540658479409362678121339879672694014739785286643571088000951145429744113500*Q)


what is it ? so you find private key for 10k btc ? Or this is a privkey * to Q ?

and what is this - "sage: CC(Q)"?

$$$ P2P NETWORK FOR BTC WALLET.DAT BRUTE F ORCE .JOIN NOW=GET MANY COINS NOW !!!
https://github.com/phrutis/LostWallet  https://t.me/+2niP9bQ8uu43MDg6
mamuu
Member
**
Offline Offline

Activity: 71
Merit: 19


View Profile
August 17, 2020, 11:53:21 PM
 #28

Code:
sage: P
115792089237316195423570985008687907853269984665640564039457584007908834671663
sage: EE
Elliptic Curve defined by y^2 = x^3 + 7 over Finite Field of size 115792089237316195423570985008687907853269984665640564039457584007908834671663
sage: Q
(41092972045662183626692698115026263699106807529773860274318687111639116151521 : 25612602434799576731996141476317124058234433726241370033130536741579356668244 : 1)
sage: 87954421572711191797409873682088439575132560617980964771068188888320747613432 *Q
(52426333756564302526085053269432084545410002202648992412042160756077650870390 : 79709923240617764371931483354308897031409999608033097982950682278401348639896 : 1)
sage: 36540658479409362678121339879672694014739785286643571088000951145429744113500*Q
(27766988394528305332024168539037695039502084538361626787903749004653433687854 : 13581498523946301885502763354170297668198202071266362739407311067363122460026 : 1)
sage:
sage: G
(55066263022277343669578718895168534326250603453777594175500187360389116729240 : 32670510020758816978083085130507043184471273380659243275938904335757337482424 : 1)
sage: 36540658479409362678121339879672694014739785286643571088000951145429744113500*Q +G
(60514677919760207795808847379414464935859540298217373706884704950585656052831 : 92467424300256128213756399718584656167407456241133297890405049170425502221771 : 1)
sage: 36540658479409362678121339879672694014739785286643571088000951145429744113501*Q
(9870940521884748245828036059372982985243987669974027519407180018299448314799 : 84417392858735638984503471023078768847021781340877352409438879295369906944372 : 1)
sage: 36540658479409362678121339879672694014739785286643571088000951145429744113500*Q -G
(26526818200564724704301259892364899649062843225393016254446718809459073971066 : 58177991911204874107434935003117119688646076024935570317854531999248293096805 : 1)
sage: CC(36540658479409362678121339879672694014739785286643571088000951145429744113500*Q -G)
Adres:  1BLBtz4sZgDkCYaLAx1g17jfiLHPpiojEF  Balance:  0  Tx:  0
Adres:  1B9kyL7qFSZaNRnkR3745zhg4vk3ZjSVPj  Balance:  0  Tx:  0
Adres:  1JBLMwzGGRAga5oXSoh9aBCxFVT7t4wNRi  Balance:  0  Tx:  0
Adres:  1BqzGKfAMj6AX9pdZG8C6AiDyaRqXPMpGc  Balance:  0  Tx:  0
sage: CC(36540658479409362678121339879672694014739785286643571088000951145429744113500*Q -2*G)
Adres:  14WtPAwTx3Wtp2pYrreztZy3FqVXWx7eQ3  Balance:  0  Tx:  0
Adres:  18HrA6fh3TjzxZ9CgkeL1ebDqZAP94xoNc  Balance:  0  Tx:  0
Adres:  1BUXyr7653i4p5Zy85SXiHbrp6fnPjqCRS  Balance:  0  Tx:  0
Adres:  1K3gF1uBixEgXbQjY9VUPHFH1nzVgbqkS4  Balance:  0  Tx:  0
sage: CC(36540658479409362678121339879672694014739785286643571088000951145429744113500*Q)
Adres:  19qRsrAmc8ZfeAE8fLH7bguvWfTZ3MrLLS  Balance:  0  Tx:  0
Adres:  16KrAKZ6SPESWL1RBkhSbjRwUzbSwBfRso  Balance:  0  Tx:  0
Adres:  14B6z3QgLL6ygX27EjzjjgFMvQkumE41AA  Balance:  0  Tx:  0
Adres:  14LnUUW8dX5Zh3YpddjVDFh24TZMdaf8S7  Balance:  0  Tx:  0
sage: CC(Q)
Adres:  17XekGktaj9DMi61ndokjN6Sx7LNWsVYjQ  Balance:  0  Tx:  0
Adres:  1LfV1tSt3KNyHpFJnAzrqsLFdeD2EvU1MK  Balance:  10000.00188824  Tx:  46
Adres:  187cn4uGjP1rvjrPzSyWzQhX5rhz62ArNm  Balance:  0  Tx:  0
Adres:  1CVZtk2czeMQeRfSeKNHYTDSMJEBXTS21Z  Balance:  0  Tx:  0
sage: SmartAttack(G,Q,P)%P
49507345783879453664137177101856360142284501228139827997787302912743629416333
sage: SmartAttack(G,2*G,P)%P
92776810360347062140128362771302456139448233644672974681811545519691306070200
sage:


there is no fakeBP, all of them Q, Q is k.G

36540658479409362678121339879672694014739785286643571088000951145429744113500*Q == 36540658479409362678121339879672694014739785286643571088000951145429744113500*k*G

if you want solve fakeBP, you can use ECDLP solver(like kangaroo)

SmartAttack work on anomalous curve because trace of one

but if work on sec curves, then  always one result.

Code:
sage: Q
(41092972045662183626692698115026263699106807529773860274318687111639116151521 : 25612602434799576731996141476317124058234433726241370033130536741579356668244 : 1)

sage: str('02')+hex(41092972045662183626692698115026263699106807529773860274318687111639116151521).lstrip("0x")
'025ad9cc469e32ea3d294a152b78bfded6ad47cfb9d5d9e52e201cd93d0c05fae1'

sage : ku 025ad9cc469e32ea3d294a152b78bfded6ad47cfb9d5d9e52e201cd93d0c05fae1

input                        : 025ad9cc469e32ea3d294a152b78bfded6ad47cfb9d5d9e52e201cd93d0c05fae1
network                      : Bitcoin mainnet
symbol                       : BTC
public pair x                : 41092972045662183626692698115026263699106807529773860274318687111639116151521
public pair y                : 25612602434799576731996141476317124058234433726241370033130536741579356668244
 x as hex                    : 5ad9cc469e32ea3d294a152b78bfded6ad47cfb9d5d9e52e201cd93d0c05fae1
 y as hex                    : 38a03820dcda0c431bf15f4fe897d36c5053981610b20e1699853a00b3248154
y parity                     : even
key pair as sec              : 025ad9cc469e32ea3d294a152b78bfded6ad47cfb9d5d9e52e201cd93d0c05fae1
 uncompressed                : 045ad9cc469e32ea3d294a152b78bfded6ad47cfb9d5d9e52e201cd93d0c05fae1\
                                 38a03820dcda0c431bf15f4fe897d36c5053981610b20e1699853a00b3248154
hash160                      : d7b1951a0da15bce93d296b386b4e473e8c00c65
 uncompressed                : 479cbe0cd292709e8595c541146cd6231add3eda
Bitcoin address              : 1LfV1tSt3KNyHpFJnAzrqsLFdeD2EvU1MK
Bitcoin address uncompressed : 17XekGktaj9DMi61ndokjN6Sx7LNWsVYjQ
Bitcoin segwit address       : bc1q67ce2xsd59duay7jj6ecdd8yw05vqrr9yd638m
p2sh segwit                  : 38Hhqsz98m8bjAJ9JhrN6RMx25Kz32UdS4
 corresponding p2sh script   : 0014d7b1951a0da15bce93d296b386b4e473e8c00c65

sage: CC(Q)
Adres:  17XekGktaj9DMi61ndokjN6Sx7LNWsVYjQ  Balance:  0  Tx:  0
Adres:  1LfV1tSt3KNyHpFJnAzrqsLFdeD2EvU1MK  Balance:  10000.00188824  Tx:  46
Adres:  187cn4uGjP1rvjrPzSyWzQhX5rhz62ArNm  Balance:  0  Tx:  0
Adres:  1CVZtk2czeMQeRfSeKNHYTDSMJEBXTS21Z  Balance:  0  Tx:  0
sage:


CC() is check balance function on ellipticcurve points for bitcoin

Code:
sage: 36540658479409362678121339879672694014739785286643571088000951145429744113500*Q
(27766988394528305332024168539037695039502084538361626787903749004653433687854 : 13581498523946301885502763354170297668198202071266362739407311067363122460026 : 1)

sage: FakeBP
(27766988394528305332024168539037695039502084538361626787903749004653433687854 : 13581498523946301885502763354170297668198202071266362739407311067363122460026 : 1)

sage: 36540658479409362678121339879672694014739785286643571088000951145429744113500*Q == FakeBP
True
sage:


1DWA3Sa8i6eHVWV4AG4UP2SBhYB2XrfiHW
COBRAS (OP)
Member
**
Offline Offline

Activity: 846
Merit: 22

$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk


View Profile
August 18, 2020, 12:06:52 AM
 #29

@mamuu, Im go to sleep now. I will answer you in the morning.

But I not understand why you always multiply some number to stable Q. If you mean what Q is a basepoint, so, you need Q<> QPublickkey.

And were is your private key ?

You know SAGE this is a good news.

$$$ P2P NETWORK FOR BTC WALLET.DAT BRUTE F ORCE .JOIN NOW=GET MANY COINS NOW !!!
https://github.com/phrutis/LostWallet  https://t.me/+2niP9bQ8uu43MDg6
MrFreeDragon
Sr. Member
****
Offline Offline

Activity: 443
Merit: 350


View Profile
August 18, 2020, 09:24:24 AM
 #30

The set of elliptic curve points is a wheel (repeating from the beginning as soon as reach the order). Actually you try to straighten the wheel, starting from different points (base point) considering the start of length as the base point.

There is no advantage in it. So do not waste your time.

ewaspiro
Member
**
Offline Offline

Activity: 74
Merit: 10


View Profile
August 27, 2020, 02:48:02 PM
 #31

I know a method how to find a private key for any publick key, but with modified base point(false BP).

If someone making a code for calculating a private key for real base point, I will share code for find a private key for false base point and REAL publick key.

This is a examles:

Code:
Real BTC Basepoint (55066263022277343669578718895168534326250603453777594175500187360389116729240 : 32670510020758816978083085130507043184471273380659243275938904335757337482424 : 1)


False BTC Base Point [u](52426333756564302526085053269432084545410002202648992412042160756077650870390 : 79709923240617764371931483354308897031409999608033097982950682278401348639896 : 1)[/u]

[b]REAL Public key[/b] Q(41092972045662183626692698115026263699106807529773860274318687111639116151521, 25612602434799576731996141476317124058234433726241370033130536741579356668244)

[b]Public key generated[/b] Q1 (41092972045662183626692698115026263699106807529773860274318687111639116151521, 25612602434799576731996141476317124058234433726241370033130536741579356668244)

[b]Q1==Q True[/b]

[b]Private key [/b]87954421572711191797409873682088439575132560617980964771068188888320747613432 !!!




Any help are welcome !!!

Huh

Well, why dont you use Pollard on any public key exposed before 2015 with a balance. Much easier than what you are trying to do. Or even throw ina few custom spartan 6 to spin off that private key recovery.

If I dont reply to your PM means I dont want to have you send me more PMs
bigvito19
Full Member
***
Offline Offline

Activity: 706
Merit: 111


View Profile
August 27, 2020, 03:43:10 PM
Last edit: August 27, 2020, 07:32:56 PM by bigvito19
 #32

I know a method how to find a private key for any publick key, but with modified base point(false BP).

If someone making a code for calculating a private key for real base point, I will share code for find a private key for false base point and REAL publick key.

This is a examles:

Code:
Real BTC Basepoint (55066263022277343669578718895168534326250603453777594175500187360389116729240 : 32670510020758816978083085130507043184471273380659243275938904335757337482424 : 1)


False BTC Base Point [u](52426333756564302526085053269432084545410002202648992412042160756077650870390 : 79709923240617764371931483354308897031409999608033097982950682278401348639896 : 1)[/u]

[b]REAL Public key[/b] Q(41092972045662183626692698115026263699106807529773860274318687111639116151521, 25612602434799576731996141476317124058234433726241370033130536741579356668244)

[b]Public key generated[/b] Q1 (41092972045662183626692698115026263699106807529773860274318687111639116151521, 25612602434799576731996141476317124058234433726241370033130536741579356668244)

[b]Q1==Q True[/b]

[b]Private key [/b]87954421572711191797409873682088439575132560617980964771068188888320747613432 !!!




Any help are welcome !!!

Huh

Well, why dont you use Pollard on any public key exposed before 2015 with a balance. Much easier than what you are trying to do. Or even throw ina few custom spartan 6 to spin off that private key recovery.



What's special about public keys exposed before 2015?

Karartma1
Legendary
*
Offline Offline

Activity: 2310
Merit: 1422



View Profile
August 27, 2020, 05:18:25 PM
 #33

In my start post I was show a private key -base point-public key and address with 1000 BTC. Shocked
Well you have the private key, go sweep the 1000 BTC then.

This private key for different base point !!! Need someone who can make a code for find privkey for legit base point this info about this modified base point, and legit private key for this modified base point.

With 500 BTC any of us can be a king of some African country. Yes, if someone disappointed, and not thant get any btc from block chain this is mistake for future all life for him. So, lets make a code and go, Brothers !!!!  I can provide more examples of privkey+basepoint+pubkey's !!!

I gave you a bit of credit, but I lost you at the king of some African country part. /s
Have fun cracking private keys with your script, if you are super lucky you might unleash satoshi's wealth. And then you would be the new king of bitcoin.
In the meantime read this https://www.quora.com/Is-it-possible-for-someone-to-guess-a-private-key-to-a-Bitcoin-wallet-and-steal-the-coins
COBRAS (OP)
Member
**
Offline Offline

Activity: 846
Merit: 22

$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk


View Profile
August 27, 2020, 05:23:37 PM
 #34

I know a method how to find a private key for any publick key, but with modified base point(false BP).

If someone making a code for calculating a private key for real base point, I will share code for find a private key for false base point and REAL publick key.

This is a examles:

Code:
Real BTC Basepoint (55066263022277343669578718895168534326250603453777594175500187360389116729240 : 32670510020758816978083085130507043184471273380659243275938904335757337482424 : 1)


False BTC Base Point [u](52426333756564302526085053269432084545410002202648992412042160756077650870390 : 79709923240617764371931483354308897031409999608033097982950682278401348639896 : 1)[/u]

[b]REAL Public key[/b] Q(41092972045662183626692698115026263699106807529773860274318687111639116151521, 25612602434799576731996141476317124058234433726241370033130536741579356668244)

[b]Public key generated[/b] Q1 (41092972045662183626692698115026263699106807529773860274318687111639116151521, 25612602434799576731996141476317124058234433726241370033130536741579356668244)

[b]Q1==Q True[/b]

[b]Private key [/b]87954421572711191797409873682088439575132560617980964771068188888320747613432 !!!




Any help are welcome !!!

Huh

Well, why dont you use Pollard on any public key exposed before 2015 with a balance. Much easier than what you are trying to do. Or even throw ina few custom spartan 6 to spin off that private key recovery.

Did you fined something before 2015 ? Before 2015 is 256 bytes too and Kangaroo just time waster in task to crack 256 bytes.

$$$ P2P NETWORK FOR BTC WALLET.DAT BRUTE F ORCE .JOIN NOW=GET MANY COINS NOW !!!
https://github.com/phrutis/LostWallet  https://t.me/+2niP9bQ8uu43MDg6
BTCW
Copper Member
Full Member
***
Offline Offline

Activity: 193
Merit: 235

Click "+Merit" top-right corner


View Profile
August 27, 2020, 11:24:27 PM
 #35

If you or anyone else could calculate private keys from public keys, you would accomplish one thing: bringing down the value of Bitcoin to zero.

SendBTC.me <<< amazing imitative
Pages: « 1 [2]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!