Bitcoin Forum
June 27, 2024, 03:44:30 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 3 4 5 [6] 7 »  All
  Print  
Author Topic: How long until bots can profitably guess private keys?  (Read 7742 times)
nutildah (OP)
Legendary
*
Offline Offline

Activity: 3038
Merit: 8168



View Profile WWW
July 24, 2014, 06:09:05 PM
 #101

Here is the database of all bitcoin addresses and private keys
http://directory.io

Good luck finding an address with fund  Grin

This is brilliant. I haven't actually tested one to see if they work, but you should add a "search" function to this!

▄▄███████▄▄
▄██████████████▄
▄██████████████████▄
▄████▀▀▀▀███▀▀▀▀█████▄
▄█████████████▄█▀████▄
███████████▄███████████
██████████▄█▀███████████
██████████▀████████████
▀█████▄█▀█████████████▀
▀████▄▄▄▄███▄▄▄▄████▀
▀██████████████████▀
▀███████████████▀
▀▀███████▀▀
.
 MΞTAWIN  THE FIRST WEB3 CASINO   
.
.. PLAY NOW ..
Yakamoto
Legendary
*
Offline Offline

Activity: 1218
Merit: 1007


View Profile
July 24, 2014, 06:26:56 PM
 #102

Here is the database of all bitcoin addresses and private keys
http://directory.io

Good luck finding an address with fund  Grin

This is brilliant. I haven't actually tested one to see if they work, but you should add a "search" function to this!
I'm more-so against this. This would make it too easy to steal back coins, and it would pretty much just wreck the Bitcoin ecosystem all together.

I think that this could create HUGE disruptions already, and I start to worry more and more as people begin to use this.

Isn't this just a giant database that you can use to steal coins with?
DeathAndTaxes
Donator
Legendary
*
Offline Offline

Activity: 1218
Merit: 1079


Gerald Davis


View Profile
July 24, 2014, 06:30:34 PM
Last edit: July 24, 2014, 07:55:09 PM by DeathAndTaxes
 #103

I can even type in directory.io/904625697166532776746648320380374280100293470930272690489102837043110636675 and it will give me new keys, just like every other page.

Each page has ~60 private keys.  904625697166532776746648320380374280100293470930272690489102837043110636675 * 60 = 2^256 = all possible keypairs.

The website is just a calculator.  It appears to have all private keys.  Your calculator can display large numbers when requested it doesn't mean it needs to store every number that exists.  Private keys are just large numbers.  It is just starting at a specific number (60* page number) and generating the next 60 keys in sequence.

Lets say for a second they did compute and store all those keys, it would require ~7 x 10^78 bytes of storage space.  The NSA recently built an exabyte scale datacenter for $1.5 billion.  An exabyte is one million 1TB drives.  It would take 8x10^60 datacenters like the NSA facility to store all those records.  Do you think they might just be playing a joke on you?
hhanh00
Sr. Member
****
Offline Offline

Activity: 467
Merit: 266


View Profile
July 24, 2014, 06:44:40 PM
 #104

And yet, they got ~1.8 BTC in donations.

Yakamoto
Legendary
*
Offline Offline

Activity: 1218
Merit: 1007


View Profile
July 24, 2014, 06:48:17 PM
 #105

I can even type in directory.io/904625697166532776746648320380374280100293470930272690489102837043110636675 and it will give me new keys, just like every other page.

Each page has ~60 private keys.  So 904625697166532776746648320380374280100293470930272690489102837043110636675 is ~= 2^256.  It is just a calculator (for those bad at math) to appear like they have all private keys.  Your calculator can display large numbers.  Does that mean it stores every single possible number inside the calculator or does it perform large numbers.  Private keys are just large numbers.

Lets say for a second they did compute all those keys.  That would be ~7 x 10^78 bytes to store all possible keys.  The NSA recently built an exabyte scale datacenter for $1.5 billion.  An exabyte is one million 1TB drives.  It would take 8x10^60 datacenters to store that many records and it would use more matter than our entire planet and consume more power than what is used by the entire human race.  Do you think they might just be playing a joke on you?
Ugh, I am such a fool...

Thanks for showing me how much of an idiot I was being, probably didn't get enough sleep last night...

Yeah I'm a moron, I get it. Didn't think anything through and fell right for it...
DeathAndTaxes
Donator
Legendary
*
Offline Offline

Activity: 1218
Merit: 1079


Gerald Davis


View Profile
July 24, 2014, 06:56:01 PM
 #106

Didn't think anything through and fell right for it...

Don't feel bad you aren't the first and you won't be the last.  For your penance you can explain it to the next 10 people who get alarmed by the threat of this website.

There is a similar website which is down now: http://ismyprivatekeystolen.com/

It asks the user for their private key so they can search to see if it has been stolen.  Luckily it is a just a PSA which then warns the user about providing private keys to unstrusted websites.  They used this site for inspiration: http://ismycreditcardstolen.com/
BADecker
Legendary
*
Offline Offline

Activity: 3822
Merit: 1373


View Profile
July 24, 2014, 06:59:50 PM
 #107

Anything is possible. If the bots can guess one private key, they won't be able to guess a second one for untold ages.

If technology somehow increases to make it possible for bots to start guessing keys on a regular basis, the same technology will be applied to the encryption, making it harder than ever for the bots to guess a key.

Smiley

Cure your cancer at home. Ivermectin, fenbendazole, methylene blue, and hydroxychloroquine (HCQ) are chief among parasite drugs. Find out that all disease is based in parasites or pollution, and what you can easily do about it - https://www.huldaclark.com/, https://thedrardisshow.com/, https://thehighwire.com/.
jonald_fyookball
Legendary
*
Offline Offline

Activity: 1302
Merit: 1004


Core dev leaves me neg feedback #abuse #political


View Profile
July 24, 2014, 07:17:55 PM
 #108

What is unclear to me now, though, is why is this different from just receiving a single transaction
with multiple inputs (for example dust gathered from a wallet and sent out).

In both cases you have multiple inputs, so why is it a problem if they were sent in separate transactions vs together?

I may misunderstand the question but all that matter is multiple unique messages (sub txns) being signed with the same key and same k.  If that happens the k value can be recovered and from the k value the private key.   It doesn't matter if this occurs in a single txn (spending multiple outputs) or multiple txns (each spending one output).  If either k is unique or the key is unique there it is infeasible to recover k.  Obviously k "should" be unique and if it is there is no risk of reusing an address (at least not due to k exploit).  If however you were unlucky and used a wallet with the flawed android PRNG you would still be safe if each key only had a single input to spend.




You did misunderstand the question, but that's
only because my thinking was so confused to begin with.

I got the answer I was looking for.

Somehow I thought that getting 2 inputs to the same
address would be the same exact thing, whether or
not they were from different transactions.

I see they are not... 2 inputs can be separate and
each signed for when they are inputs, but when
combined into a single output, it now is just 1 input
again for the next address to sign for.



e4xit
Sr. Member
****
Offline Offline

Activity: 302
Merit: 250



View Profile
July 24, 2014, 07:21:22 PM
 #109

snip
There is a similar website which is down now: http://ismyprivatekeystolen.com/

It asks the user for their private key so they can search to see if it has been stolen.  Luckily it is a just a PSA which then warns the user about providing private keys to unstrusted websites.  They used this site for inspiration: http://ismycreditcardstolen.com/
snip

Holy shit that is a good one! Not seen that one before.

Not your keys, not your coins.
CoinJoin, always.
nutildah (OP)
Legendary
*
Offline Offline

Activity: 3038
Merit: 8168



View Profile WWW
July 24, 2014, 08:08:11 PM
 #110


If technology somehow increases to make it possible for bots to start guessing keys on a regular basis, the same technology will be applied to the encryption, making it harder than ever for the bots to guess a key.


Yep, in the back of my mind I was thinking this but was more or less just playing devil's advocate the whole time.

It will also be interesting to see if quantum computers can be used to speed up the mining process, but I'm not holding my breath.

▄▄███████▄▄
▄██████████████▄
▄██████████████████▄
▄████▀▀▀▀███▀▀▀▀█████▄
▄█████████████▄█▀████▄
███████████▄███████████
██████████▄█▀███████████
██████████▀████████████
▀█████▄█▀█████████████▀
▀████▄▄▄▄███▄▄▄▄████▀
▀██████████████████▀
▀███████████████▀
▀▀███████▀▀
.
 MΞTAWIN  THE FIRST WEB3 CASINO   
.
.. PLAY NOW ..
nutildah (OP)
Legendary
*
Offline Offline

Activity: 3038
Merit: 8168



View Profile WWW
July 24, 2014, 08:39:28 PM
 #111

Just for fun, this is an address of a brainwallet hacker:

1brain7kAZxPagLt2HRLxqyc3VgGSa1GR

https://bitcointalk.org/index.php?topic=347828.0

He's pretty good at it.

▄▄███████▄▄
▄██████████████▄
▄██████████████████▄
▄████▀▀▀▀███▀▀▀▀█████▄
▄█████████████▄█▀████▄
███████████▄███████████
██████████▄█▀███████████
██████████▀████████████
▀█████▄█▀█████████████▀
▀████▄▄▄▄███▄▄▄▄████▀
▀██████████████████▀
▀███████████████▀
▀▀███████▀▀
.
 MΞTAWIN  THE FIRST WEB3 CASINO   
.
.. PLAY NOW ..
Lauda
Legendary
*
Offline Offline

Activity: 2674
Merit: 2965


Terminated.


View Profile WWW
July 24, 2014, 09:07:27 PM
 #112

This drawing is misleading because it applies to brute forcing a key. If you have a safe with 6 digits, a thief would not try to try every combination. He will use your birthday, your wife's birth day, etc first. If that doesn't work, he would drill a hole and peek through the lock tumblers. Basically, no one questions the breadth of the key space - but there might be backdoors to ECC or bugs in its implementation.
That's like brute forcing with a few parameters. You try something relevant from my life, when all that fails you start trying random numbers.
How exactly is someone going to guess my private key if they know my birthday?

"The Times 03/Jan/2009 Chancellor on brink of second bailout for banks"
😼 Bitcoin Core (onion)
bitllionaire
Legendary
*
Offline Offline

Activity: 1120
Merit: 1000


View Profile
July 25, 2014, 12:47:20 AM
 #113

I think that will be difficult in the near future
R2D221
Hero Member
*****
Offline Offline

Activity: 658
Merit: 500



View Profile
July 25, 2014, 02:05:30 AM
 #114

If computers can break private keys consistently, then Bitcoin would not be the only thing affected. With such power, one could hack anything, get all the encrypted information of any kind (not just money is encrypted, you know), and basically rule the world if they like.

An economy based on endless growth is unsustainable.
hhanh00
Sr. Member
****
Offline Offline

Activity: 467
Merit: 266


View Profile
July 25, 2014, 04:09:07 AM
 #115

This drawing is misleading because it applies to brute forcing a key. If you have a safe with 6 digits, a thief would not try to try every combination. He will use your birthday, your wife's birth day, etc first. If that doesn't work, he would drill a hole and peek through the lock tumblers. Basically, no one questions the breadth of the key space - but there might be backdoors to ECC or bugs in its implementation.
That's like brute forcing with a few parameters. You try something relevant from my life, when all that fails you start trying random numbers.
How exactly is someone going to guess my private key if they know my birthday?

Some people use brainwallets that are derived from their birthday or other data that they find easy to remember.

nutildah (OP)
Legendary
*
Offline Offline

Activity: 3038
Merit: 8168



View Profile WWW
July 25, 2014, 07:33:39 AM
 #116

This drawing is misleading because it applies to brute forcing a key. If you have a safe with 6 digits, a thief would not try to try every combination. He will use your birthday, your wife's birth day, etc first. If that doesn't work, he would drill a hole and peek through the lock tumblers. Basically, no one questions the breadth of the key space - but there might be backdoors to ECC or bugs in its implementation.
That's like brute forcing with a few parameters. You try something relevant from my life, when all that fails you start trying random numbers.
How exactly is someone going to guess my private key if they know my birthday?

Some people use brainwallets that are derived from their birthday or other data that they find easy to remember.

Earlier today I tried the experiment of seeing how long it would take a bot to hack a simple brainwallet (too simple) pass phrase. The word I used was "fart" and the deposit was swooped up literally IMMEDIATELY. As in, the same second!

The bot paid a fee of 0.00001 BTC and has been pretty successful. You can see it hacked "password" on 7/11, "aaaaa" on 7/16 and again on 7/22.

I know there's a relationship between the length of a pass phrase and the time it takes to crack it but I still thought <1 sec hacktime was pretty remarkable.

▄▄███████▄▄
▄██████████████▄
▄██████████████████▄
▄████▀▀▀▀███▀▀▀▀█████▄
▄█████████████▄█▀████▄
███████████▄███████████
██████████▄█▀███████████
██████████▀████████████
▀█████▄█▀█████████████▀
▀████▄▄▄▄███▄▄▄▄████▀
▀██████████████████▀
▀███████████████▀
▀▀███████▀▀
.
 MΞTAWIN  THE FIRST WEB3 CASINO   
.
.. PLAY NOW ..
Sheldor333
Sr. Member
****
Offline Offline

Activity: 406
Merit: 250


View Profile
July 25, 2014, 08:52:52 AM
 #117

Well when quantum computers come along we will be in trouble, but that will not happen all at once, and not everyone will be able to buy a quantum computer. Bitcoin will have to be updated to compensate for that, and after that it should be safe, but things like brain wallets won't unless you have used something that doesn't exist online, even then there might be a possibility you are not safe it will still depend how smart the attacker is.

The00Dustin
Hero Member
*****
Offline Offline

Activity: 807
Merit: 500


View Profile
July 25, 2014, 10:05:26 AM
 #118

Earlier today I tried the experiment of seeing how long it would take a bot to hack a simple brainwallet (too simple) pass phrase. The word I used was "fart" and the deposit was swooped up literally IMMEDIATELY. As in, the same second!

The bot paid a fee of 0.00001 BTC and has been pretty successful. You can see it hacked "password" on 7/11, "aaaaa" on 7/16 and again on 7/22.

I know there's a relationship between the length of a pass phrase and the time it takes to crack it but I still thought <1 sec hacktime was pretty remarkable.
I'm not sure why I'm explaining this since your previous post in this very same thread was a link to a thread that probably explains the same, but the brain wallets you refer to were probably "hacked" before the deposits were ever made and then monitored.  A bot is used to monitor those addresses and immediately redirect funds, but it isn't really "hacking" addresses that have funds, it is generating addresses based on parameters and then monitoring them for deposits.  This is no different than setting up a regular wallet with a bot to redirect all deposits except that the regular wallet derived without parameters is unlikely to have collisions while the wallet derived from simple dictionary passwords is very likely to have exact matches.
Baitty
Hero Member
*****
Offline Offline

Activity: 532
Merit: 500

Currently held as collateral by monbux


View Profile
July 25, 2014, 11:05:26 AM
 #119

It's so unlikely that we might as well not even talk about it people could have a shot at the dark by changing some numbers/letters but there is no fool proof system of guessing private keys and never will be.

Currently held as collateral by monbux
amaclin
Legendary
*
Offline Offline

Activity: 1260
Merit: 1019


View Profile
July 25, 2014, 11:34:09 AM
 #120

Quote
Earlier today I tried the experiment of seeing how long it would take a bot to hack a simple brainwallet (too simple) pass phrase. The word I used was "fart" and the deposit was swooped up literally IMMEDIATELY. As in, the same second!

The bot paid a fee of 0.00001 BTC and has been pretty successful. You can see it hacked "password" on 7/11, "aaaaa" on 7/16 and again on 7/22.

I know there's a relationship between the length of a pass phrase and the time it takes to crack it but I still thought <1 sec hacktime was pretty remarkable.

Thank you.
Pages: « 1 2 3 4 5 [6] 7 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!