Bitcoin Forum
August 12, 2025, 02:58:20 AM *
News: Latest Bitcoin Core release: 29.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: The Pi address and related txts  (Read 285 times)
Tfs (OP)
Newbie
*
Offline Offline

Activity: 22
Merit: 24


View Profile
July 21, 2025, 01:25:44 PM
Merited by vapourminer (1)
 #1


Out of curiosity I looked at the private key made in hex format of the first 64 decimals of Pi
1415926535 8979323846 2643383279 5028841971 6939937510 5820974944 5923
This gives in P2PKH the address 1CBDsCzfGBNXvTqpiRZQ6EZi2DYF5VQmGU

To my surprise it had some transactions in march 2025, so a just few months ago. The related transactions are strange, for example it got its balance from bc1q5a3ak3vlmsawfptv99pvmxzv4qxvg7aj7re48g and this one has most of its transactions as payment+change to itself, which I thought is a very old way of doing transactions

Is that correct? Do you notice other curious things about these addresses?

Thanks.
Cricktor
Legendary
*
Offline Offline

Activity: 1218
Merit: 2851



View Profile
August 02, 2025, 02:34:01 PM
Merited by pooya87 (4), hosemary (2), vapourminer (1), ABCbits (1)
 #2

Well, it looks like unnecessary address re-use because no proper change address is used. One reason for this could be e.g. if you create a wallet by importing only the private key for address bc1q5a3ak3vlmsawfptv99pvmxzv4qxvg7aj7re48g into an Electrum (and likely other) wallet. When there are no change addresses in an Electrum wallet and there's only one address known to the wallet, Electrum will exactly do this what you observed when you send a partial amount out of such a wallet, using the source address also as change address.

There's another key insight from what you observed: never create private keys from publicly know data! The Pi decimals aren't exactly secret, are they!

Someone else had the same idea as you and a stealer bot, likely more of them, fought to grab the funds (indicated by the high amount of fees used by the winning transaction. Yet more people who have the private key in their stealer bot databases.

apogio
Hero Member
*****
Offline Offline

Activity: 882
Merit: 1817


Duelbits.com - Rewarding, beyond limits.


View Profile WWW
August 03, 2025, 10:19:05 AM
Merited by vapourminer (1)
 #3

I am lazy to try it, but Cricktor gave a good explanation.

Lesson Learned:
Nerver rely on any memorizable source for randomness. These numbers are simply not random.

Fun Time:
Randomness (a.k.a entropy) is a very fascinating subject in physics and mathematics.
In short, there is no provable random number generator, that's 100% guaranteed to be random.
Scientists believe that a good entropy source is to study and observe the atoms, waiting for them to have a spontaneous fission.
They claim that this event is the closest to real randomness that we can get.

Therefore, you can imagine that using the numbers of Pi, which are known to millions of people around the world, isn't a very good idea.

vapourminer
Legendary
*
Offline Offline

Activity: 4788
Merit: 4942


what is this "brake pedal" you speak of?


View Profile
August 03, 2025, 11:36:26 PM
 #4


Scientists believe that a good entropy source is to study and observe the atoms, waiting for them to have a spontaneous fission.
They claim that this event is the closest to real randomness that we can get.



there are tutorials on using radioactive decay using geiger counters for RNG setups. interesting stuff.
NotFuzzyWarm
Legendary
*
Offline Offline

Activity: 4088
Merit: 3198


Evil beware: We have waffles!


View Profile
August 04, 2025, 12:54:22 AM
Last edit: August 04, 2025, 03:09:27 AM by NotFuzzyWarm
Merited by vapourminer (4), ABCbits (1)
 #5

A much easier and far more compact route is to use the inherent quantum phase fluctuations present in beams from a laser diode operated just above its lasing threshold. QRNG (quantum random number generator) chips have already been made based on it.

ref
https://www.mdpi.com/2304-6732/11/5/468
https://opg.optica.org/ol/abstract.cfm?uri=ol-35-3-312
https://ieeexplore.ieee.org/document/10460108

- For bitcoin to succeed the community must police itself -    My info useful? Donations welcome!  3NtFuzyWREGoDHWeMczeJzxFZpiLAFJXYr
 -Sole remaining active Primary developer of cgminer, Kano's repo is here  Discord support invite at https://kano.is/
-Support Sidehacks miner development. Donations to:   1BURGERAXHH6Yi6LRybRJK7ybEm5m5HwTr
pooya87
Legendary
*
Offline Offline

Activity: 3906
Merit: 11844



View Profile
August 04, 2025, 02:50:06 AM
Merited by vapourminer (4), ABCbits (1)
 #6

bc1q5a3ak3vlmsawfptv99pvmxzv4qxvg7aj7re48g and this one has most of its transactions as payment+change to itself, which I thought is a very old way of doing transactions
That's not strange, that's just address reuse. You send coins from address A to address B and send the change to same address A instead of to a new address. If you want to see strange look at one of the addresses that received coins from bc1q5a[..]48g which was 1M4r[...]jXz. It receives coins but then in 2 transactions it sends the coins from 1M4r[...]jXz to itself without any other output.


I dare say the owner of these coins is performing a weird Spam Attack! Based on these two cases (first being sending coins to weak keys) and cases like this:
Coins from bc1q5a[..]48g go to 19L9[...]EpV then they go to 1DWQ[...]UXA then they go to 1E8n[...]Lxs just to end up back in bc1q5a[..]48g!

apogio
Hero Member
*****
Offline Offline

Activity: 882
Merit: 1817


Duelbits.com - Rewarding, beyond limits.


View Profile WWW
August 04, 2025, 03:52:27 PM
 #7

there are tutorials on using radioactive decay using geiger counters for RNG setups. interesting stuff.

A much easier and far more compact route is to use the inherent quantum phase fluctuations present in beams from a laser diode operated just above its lasing threshold. QRNG (quantum random number generator) chips have already been made based on it.

ref
https://www.mdpi.com/2304-6732/11/5/468
https://opg.optica.org/ol/abstract.cfm?uri=ol-35-3-312
https://ieeexplore.ieee.org/document/10460108

Thanks guys, good information. I am super bad in physics and I can't really understand, but are the two things that you suggest essentially the same thing? Or are they completely different?

NotFuzzyWarm
Legendary
*
Offline Offline

Activity: 4088
Merit: 3198


Evil beware: We have waffles!


View Profile
August 04, 2025, 04:28:15 PM
Last edit: August 05, 2025, 02:37:48 AM by NotFuzzyWarm
Merited by vapourminer (1), apogio (1)
 #8

While they both are based on completely random processes, they are very different in what is being detected or measured. The Geiger method relies on detecting the timing of particle emission from radioactive elements while the laser method is measuring differences in the phase of light waves being generated by a laser. Not sure how fast the Geiger method can generate random numbers but the laser method can generate them at several hundred MHz to over 1GHz.

- For bitcoin to succeed the community must police itself -    My info useful? Donations welcome!  3NtFuzyWREGoDHWeMczeJzxFZpiLAFJXYr
 -Sole remaining active Primary developer of cgminer, Kano's repo is here  Discord support invite at https://kano.is/
-Support Sidehacks miner development. Donations to:   1BURGERAXHH6Yi6LRybRJK7ybEm5m5HwTr
Tfs (OP)
Newbie
*
Offline Offline

Activity: 22
Merit: 24


View Profile
August 06, 2025, 03:37:29 PM
 #9

Thanks to all for both the on topic and off topic answers, very informative.
programmer3666
Member
**
Offline Offline

Activity: 126
Merit: 75


View Profile
August 07, 2025, 03:13:57 AM
 #10




Bruh!!! this is a great reminder that using publicly known data like Pi for key generation is extremly a risky one.
As @apogio noted... these numbers are simply not random and coupled with what @Cricktor pointed out about Electrum reuse behavior is on poin!! becaus address reuse and weak entropy is definitely a dangerous combo....

I tested one Pi based key just for fun!! the address already had like 2 txs and still holds some dust in it...



It makes you wonderhow many funds have already been lost to weak key experiments like this........

mcdouglasx
Sr. Member
****
Offline Offline

Activity: 728
Merit: 392



View Profile WWW
August 07, 2025, 03:58:55 AM
Merited by vapourminer (1)
 #11

Nothing uploaded to the internet or known to humans is immune to bots hunting for vulnerable addresses, ranging from BrainWallets to AI promts.
Whichever fragment of any known number you choose, you'll be at risk.
Whether it's pi, Euler, or the golden ratio...

That's why so many people lost their coins with BrainWallets, I don't think it's something strange, they are just vulnerable.

▄▄█████████████████▄▄
▄█████████████████████▄
███▀▀█████▀▀░░▀▀███████

██▄░░▀▀░░▄▄██▄░░█████
█████░░░████████░░█████
████▌░▄░░█████▀░░██████
███▌░▐█▌░░▀▀▀▀░░▄██████
███░░▌██░░▄░░▄█████████
███▌░▀▄▀░░█▄░░█████████
████▄░░░▄███▄░░▀▀█▀▀███
██████████████▄▄░░░▄███
▀█████████████████████▀
▀▀█████████████████▀▀
Rainbet.com
CRYPTO CASINO & SPORTSBOOK
|
█▄█▄█▄███████▄█▄█▄█
███████████████████
███████████████████
███████████████████
█████▀█▀▀▄▄▄▀██████
█████▀▄▀████░██████
█████░██░█▀▄███████
████▄▀▀▄▄▀███████
█████████▄▀▄███
█████████████████
███████████████████
██████████████████
███████████████████
 
 $20,000 
WEEKLY RAFFLE
|



█████████
█████████ ██
▄▄█░▄░▄█▄░▄░█▄▄
▀██░▐█████▌░██▀
▄█▄░▀▀▀▀▀░▄█▄
▀▀▀█▄▄░▄▄█▀▀▀
▀█▀░▀█▀
10K
WEEKLY
RACE
100K
MONTHLY
RACE
|

██









█████
███████
███████
█▄
██████
████▄▄
█████████████▄
███████████████▄
░▄████████████████▄
▄██████████████████▄
███████████████▀████
██████████▀██████████
██████████████████
░█████████████████▀
░░▀███████████████▀
████▀▀███
███████▀▀
████████████████████   ██
 
[..►PLAY..]
 
████████   ██████████████
apogio
Hero Member
*****
Offline Offline

Activity: 882
Merit: 1817


Duelbits.com - Rewarding, beyond limits.


View Profile WWW
August 07, 2025, 10:45:21 AM
Merited by vapourminer (4), pooya87 (4), mcdouglasx (2)
 #12

That's why so many people lost their coins with BrainWallets, I don't think it's something strange, they are just vulnerable.

Surprisingly enough people don’t realise that if they can remember their password, then it’s probably weak. Obviously the longer the better anyway. But if the entropy source is weak, then it can be too easily broken.
I enjoyed reading this: https://github.com/demining/History-of-Bitcoin-Wallet-Hacks/blob/main/README.md

Cricktor
Legendary
*
Offline Offline

Activity: 1218
Merit: 2851



View Profile
August 08, 2025, 06:42:32 PM
 #13

Definitely a gamble to use publicly known data from which to derive a private key.

Coming back to irrational number Pi of which according to Google around 100 trillion decimals have been computed and are therefore known. Nobody should use the starting sequence of Pi's digits, that's too obvious and apparently not a good choice (you certainly aren't the first who tried this).

I wouldn't want to try, but what if you'd start your number sequence at some random point from few ten billionth or trillionths of Pi's decimals, take a number of digits equal to your age in days up to your last birthday, SHA256 this number sequence and voila, you'd have a pretty hard to guess (or precompute) private key. Again, I don't recommend this procedure in particular, I'm just trying to come up with something more resisting to quick theft.

Decent random entropy and private key derived from this are your safer path. Don't loose coins the silly way.  Cheesy

Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!