Can you share the public key and then the characters of your WIF which you have?
DO NOT share such information with anyone here or in your personal message.
- Jay -
Are you talking to me or advising others against me? Lol, even if OP shared both public key and the remaining of the WIF characters, nobody could solve the key in a few thousand years, a 256 bit private key is not something we could simply brute force.
I don't know if there is a public key, but this seems more like a sold wallet case where the buyer thinks he can get help from here to find his fortune. No public key/ address, means there is something wrong with this case.
i have shared examples of the public key and the remaining WIF Characters , not the real one , i am aware that this sensitive information can't be shared with anyone .
well , it's not a sold fake hex edited wallet or something like this , it's my own wallet from 2011 / 2012
nothing wrong with the case , i have been reading through Secp256k1 in the past few years and i know that it's impossible to bruteforce a 256bit private key , but in my case i have some bits missing from the end of the wif , it's not easy as i know because the checksum is missing too , so i was thinking that i can try ( even if it's not possible ) to do it through the same entropy that was core using in 2011 / 2012 .
at least i know the start range of my old private key .
i have tried to write some simple python codes that using the random module , but the problem is the random here is repeated and i need something to be done that makes the code saves the work from the last point and start from it , i guess diving in the ocean through public keys will not lead me to anything .
i think that the randomness logic that bitcoin core was using can be found in the Key.cpp in the core source code , but i don't have such knowledge to implement it through python .
so i need a little helping hand to arrange things together , maybe i know something but it's scrambled in my head so i don't know the right ordering of it .