Bitcoin Forum
August 15, 2024, 07:17:05 AM *
News: Latest Bitcoin Core release: 27.1 [Torrent]
 
   Home   Help Search Login Register More  
Warning: One or more bitcointalk.org users have reported that they believe that the creator of this topic displays some red flags which make them high-risk. (Login to see the detailed trust ratings.) While the bitcointalk.org administration does not verify such claims, you should proceed with extreme caution.
Pages: « 1 [2]  All
  Print  
Author Topic: [DELETED]  (Read 981 times)
COBRAS
Member
**
Offline Offline

Activity: 895
Merit: 22


View Profile
December 08, 2021, 06:42:17 PM
Last edit: December 08, 2021, 07:02:36 PM by mprep
 #21

could you share this script ? I would like to compare

https://asecuritysite.com/signatures/ecd6



If somone thant see some successful or partially successfully proofs, run this scrypt https://transfer.sh/HU4ooa/gen.py and send me a link to generated file.

Scrypt generates 255-256 privkey with 250 nonce, and will show you a privkey 255-256 !





[moderator's note: consecutive posts merged]

[
COBRAS
Member
**
Offline Offline

Activity: 895
Merit: 22


View Profile
December 08, 2021, 07:01:17 PM
 #22



no this algo works only and only then two publickeys as x1 and x2 has transactions with the same r.



This is a newest shit about crack teme. Can you crack my file ? You can crack  yourslelf, of i can crack your file with rsz from my generator ?

[
COBRAS
Member
**
Offline Offline

Activity: 895
Merit: 22


View Profile
December 08, 2021, 07:13:29 PM
Last edit: December 09, 2021, 10:39:00 PM by Mr. Big
 #23

I do not understand COBRAS , you have script designed for HNP solve problem
if your script works what are you doing on forum, go ahed and be billionaire

Why you are "inform" whole world that you can show proofs?  Less people know your intention, that BTC has still Value.

and of course - REMEMBER -> Please donate me -> 20 BTC ok?

Im in progress, i not any other. If someone needs motivation of his research run this file https://transfer.sh/HU4ooa/gen.py seng mevgenerated file, i will tell you 255-256 bit privkey.



Vide about this crypt, I dont know fake this or, but, data of rsz of thet adress was provided by me to author of video  !!!


https://vimeo.com/649216292
  

[
COBRAS
Member
**
Offline Offline

Activity: 895
Merit: 22


View Profile
December 16, 2021, 08:26:20 AM
 #24

Scrypt work, but with modification

[
mausuv
Jr. Member
*
Offline Offline

Activity: 70
Merit: 1


View Profile
December 21, 2021, 06:39:51 AM
 #25

Scrypt work, but with modification
iknow r s1s2  value
i need z1z2 how to calculate
i read this post explain testnet ,i am not understad https://bitcointalk.org/index.php?topic=5327054.msg56686056#msg56686056
https://bitcointalk.org/index.php?topic=977070.msg10669517#msg10669517 #read 1,3page

please explain stepy by step calulate z1z2  from bitcoin mainet or write code #mybadenglish

run this script https://github.com/FoxxD3V/btc-rsz/blob/master/RawTX_RSZ.py
output : show r s1s2 z1,z2
but i got error what my mistake

https://tbtc.bitaps.com/raw/transaction/ff948290ff332aed8f0e5d767118a02e8671578c6775a333bb4ee4d6ccfcf639
i am enter raw tx i got error https://github.com/FoxxD3V/btc-rsz/blob/master/RawTX_RSZ.py
Code:
Traceback (most recent call last):
File "RawTX_RSZ.py", line 13, in
s = keyUtils.derSigToHexSig(m[1][:-2])
File "/home/runner/btc-rsz/keyUtils.py", line 32, in derSigToHexSig
x, s = ecdsa.der.remove_integer(s)
File "/usr/local/lib/python2.7/dist-packages/ecdsa/der.py", line 218, in remove_integer
raise UnexpectedDER("Negative integers are not supported")
ecdsa.der.UnexpectedDER: Negative integers are not supported
i know r s1s2
i need z1z2 value please how to get z1z2 #mybadenglish
Pages: « 1 [2]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!