Tfs (OP)
Newbie
Offline
Activity: 22
Merit: 24
|
Out of curiosity I looked at the private key made in hex format of the first 64 decimals of Pi 1415926535 8979323846 2643383279 5028841971 6939937510 5820974944 5923 This gives in P2PKH the address 1CBDsCzfGBNXvTqpiRZQ6EZi2DYF5VQmGU
To my surprise it had some transactions in march 2025, so a just few months ago. The related transactions are strange, for example it got its balance from bc1q5a3ak3vlmsawfptv99pvmxzv4qxvg7aj7re48g and this one has most of its transactions as payment+change to itself, which I thought is a very old way of doing transactions
Is that correct? Do you notice other curious things about these addresses?
Thanks.
|
|
|
|
Cricktor
Legendary
Offline
Activity: 1218
Merit: 2851
|
Well, it looks like unnecessary address re-use because no proper change address is used. One reason for this could be e.g. if you create a wallet by importing only the private key for address bc1q5a3ak3vlmsawfptv99pvmxzv4qxvg7aj7re48g into an Electrum (and likely other) wallet. When there are no change addresses in an Electrum wallet and there's only one address known to the wallet, Electrum will exactly do this what you observed when you send a partial amount out of such a wallet, using the source address also as change address.
There's another key insight from what you observed: never create private keys from publicly know data! The Pi decimals aren't exactly secret, are they!
Someone else had the same idea as you and a stealer bot, likely more of them, fought to grab the funds (indicated by the high amount of fees used by the winning transaction. Yet more people who have the private key in their stealer bot databases.
|
|
|
|
apogio
|
I am lazy to try it, but Cricktor gave a good explanation.
Lesson Learned: Nerver rely on any memorizable source for randomness. These numbers are simply not random.
Fun Time: Randomness (a.k.a entropy) is a very fascinating subject in physics and mathematics. In short, there is no provable random number generator, that's 100% guaranteed to be random. Scientists believe that a good entropy source is to study and observe the atoms, waiting for them to have a spontaneous fission. They claim that this event is the closest to real randomness that we can get.
Therefore, you can imagine that using the numbers of Pi, which are known to millions of people around the world, isn't a very good idea.
|
|
|
|
vapourminer
Legendary
Offline
Activity: 4788
Merit: 4942
what is this "brake pedal" you speak of?
|
 |
August 03, 2025, 11:36:26 PM |
|
Scientists believe that a good entropy source is to study and observe the atoms, waiting for them to have a spontaneous fission. They claim that this event is the closest to real randomness that we can get.
there are tutorials on using radioactive decay using geiger counters for RNG setups. interesting stuff.
|
|
|
|
|
pooya87
Legendary
Offline
Activity: 3906
Merit: 11844
|
bc1q5a3ak3vlmsawfptv99pvmxzv4qxvg7aj7re48g and this one has most of its transactions as payment+change to itself, which I thought is a very old way of doing transactions
That's not strange, that's just address reuse. You send coins from address A to address B and send the change to same address A instead of to a new address. If you want to see strange look at one of the addresses that received coins from bc1q5a[..]48g which was 1M4r[...]jXz. It receives coins but then in 2 transactions it sends the coins from 1M4r[...]jXz to itself without any other output.  I dare say the owner of these coins is performing a weird Spam Attack! Based on these two cases (first being sending coins to weak keys) and cases like this: Coins from bc1q5a[..]48g go to 19L9[...]EpV then they go to 1DWQ[...]UXA then they go to 1E8n[...]Lxs just to end up back in bc1q5a[..]48g!
|
|
|
|
apogio
|
 |
August 04, 2025, 03:52:27 PM |
|
there are tutorials on using radioactive decay using geiger counters for RNG setups. interesting stuff.
Thanks guys, good information. I am super bad in physics and I can't really understand, but are the two things that you suggest essentially the same thing? Or are they completely different?
|
|
|
|
NotFuzzyWarm
Legendary
Offline
Activity: 4088
Merit: 3198
Evil beware: We have waffles!
|
 |
August 04, 2025, 04:28:15 PM Last edit: August 05, 2025, 02:37:48 AM by NotFuzzyWarm Merited by vapourminer (1), apogio (1) |
|
While they both are based on completely random processes, they are very different in what is being detected or measured. The Geiger method relies on detecting the timing of particle emission from radioactive elements while the laser method is measuring differences in the phase of light waves being generated by a laser. Not sure how fast the Geiger method can generate random numbers but the laser method can generate them at several hundred MHz to over 1GHz.
|
|
|
|
Tfs (OP)
Newbie
Offline
Activity: 22
Merit: 24
|
 |
August 06, 2025, 03:37:29 PM |
|
Thanks to all for both the on topic and off topic answers, very informative.
|
|
|
|
programmer3666
Member

Offline
Activity: 126
Merit: 75
|
 |
August 07, 2025, 03:13:57 AM |
|
Bruh!!! this is a great reminder that using publicly known data like Pi for key generation is extremly a risky one. As @apogio noted... these numbers are simply not random and coupled with what @Cricktor pointed out about Electrum reuse behavior is on poin!! becaus address reuse and weak entropy is definitely a dangerous combo.... I tested one Pi based key just for fun!! the address already had like 2 txs and still holds some dust in it... It makes you wonderhow many funds have already been lost to weak key experiments like this........
|
|
|
|
mcdouglasx
|
Nothing uploaded to the internet or known to humans is immune to bots hunting for vulnerable addresses, ranging from BrainWallets to AI promts. Whichever fragment of any known number you choose, you'll be at risk. Whether it's pi, Euler, or the golden ratio... That's why so many people lost their coins with BrainWallets, I don't think it's something strange, they are just vulnerable.
|
▄▄█████████████████▄▄ ▄█████████████████████▄ ███▀▀█████▀▀░░▀▀███████ ███▄░░▀▀░░▄▄██▄░░██████ █████░░░████████░░█████ ████▌░▄░░█████▀░░██████ ███▌░▐█▌░░▀▀▀▀░░▄██████ ███░░▌██░░▄░░▄█████████ ███▌░▀▄▀░░█▄░░█████████ ████▄░░░▄███▄░░▀▀█▀▀███ ██████████████▄▄░░░▄███ ▀█████████████████████▀ ▀▀█████████████████▀▀ | Rainbet.com CRYPTO CASINO & SPORTSBOOK | | | █▄█▄█▄███████▄█▄█▄█ ███████████████████ ███████████████████ ███████████████████ █████▀█▀▀▄▄▄▀██████ █████▀▄▀████░██████ █████░██░█▀▄███████ ████▄▀▀▄▄▀███████ █████████▄▀▄███ █████████████████ ███████████████████ ███████████████████ ███████████████████ | | | |
▄█████████▄ █████████ ██ ▄▄█░▄░▄█▄░▄░█▄▄ ▀██░▐█████▌░██▀ ▄█▄░▀▀▀▀▀░▄█▄ ▀▀▀█▄▄░▄▄█▀▀▀ ▀█▀░▀█▀
| 10K WEEKLY RACE | | 100K MONTHLY RACE | | | ██
█████
| ███████▄█ ██████████▄ ████████████▄▄ ████▄███████████▄ ██████████████████▄ ░▄█████████████████▄ ▄███████████████████▄ █████████████████▀████ ██████████▀███████████ ▀█████████████████████ ░████████████████████▀ ░░▀█████████████████▀ ████▀▀██████████▀▀ | ████████ ██████████████ |
|
|
|
apogio
|
 |
August 07, 2025, 10:45:21 AM |
|
That's why so many people lost their coins with BrainWallets, I don't think it's something strange, they are just vulnerable.
Surprisingly enough people don’t realise that if they can remember their password, then it’s probably weak. Obviously the longer the better anyway. But if the entropy source is weak, then it can be too easily broken. I enjoyed reading this: https://github.com/demining/History-of-Bitcoin-Wallet-Hacks/blob/main/README.md
|
|
|
|
Cricktor
Legendary
Offline
Activity: 1218
Merit: 2851
|
 |
August 08, 2025, 06:42:32 PM |
|
Definitely a gamble to use publicly known data from which to derive a private key. Coming back to irrational number Pi of which according to Google around 100 trillion decimals have been computed and are therefore known. Nobody should use the starting sequence of Pi's digits, that's too obvious and apparently not a good choice (you certainly aren't the first who tried this). I wouldn't want to try, but what if you'd start your number sequence at some random point from few ten billionth or trillionths of Pi's decimals, take a number of digits equal to your age in days up to your last birthday, SHA256 this number sequence and voila, you'd have a pretty hard to guess (or precompute) private key. Again, I don't recommend this procedure in particular, I'm just trying to come up with something more resisting to quick theft. Decent random entropy and private key derived from this are your safer path. Don't loose coins the silly way. 
|
|
|
|
|