Bitcoin Forum
June 17, 2024, 05:04:41 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 [22] 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 ... 76 »
  Print  
Author Topic: The Legend of Satoshi Nakamato, FINAL STEP PUBLISHED.... 4.87 BTC GRAND PRIZE!  (Read 108443 times)
sonihr
Sr. Member
****
Offline Offline

Activity: 454
Merit: 250


THE TIME HAS COME...


View Profile
April 27, 2015, 04:09:38 PM
 #421

The image on the LTB forum seems to be different(smaller, different size,different exiftool result). Also this is the HTML tag of the image.

<img data-reverse="true" alt="r3ts@m" src="https://letstalkbitcoin.com/resources/abpt/hyap.jpg">

Notice the ALT description "r3ts@M" which is in reverse M@st3r (MASTER).
Not sure if data-reverse="true" is a good attribute but first time I see it.
Also the md5 sums of that image end with 7dead or dead7.
I also tried the convert to text site which was earlier posted which gave the word Miagi before and a lot of number and text were detected.

I have no idea if this related but I thought I would share.


What goes around comes around...
sonihr
Sr. Member
****
Offline Offline

Activity: 454
Merit: 250


THE TIME HAS COME...


View Profile
April 27, 2015, 04:11:12 PM
 #422

I counted many times and I get 98 inner flames so I don't know any more about about base 6.

On another note on the LTB forum there is a link to the image with an input to put an answer.

The page is called https://letstalkbitcoin.com/torched-h34r7s

torched-h34r7s I believe is Torched-Hearts is this related?

that link is not publicly available, and even if you create an account on that site, the link says permission denied.
You need to get the special tokens from the LTB site to view it.

You can start here:

https://letstalkbitcoin.com/rabbit-a01daj2dakf9

What goes around comes around...
micaman
Sr. Member
****
Offline Offline

Activity: 345
Merit: 500



View Profile WWW
April 27, 2015, 04:21:53 PM
 #423

Which of the 3 puzzles are you guys playing?
sonihr
Sr. Member
****
Offline Offline

Activity: 454
Merit: 250


THE TIME HAS COME...


View Profile
April 27, 2015, 04:23:34 PM
 #424

Which of the 3 puzzles are you guys playing?
I already have 3 tokens on LTB I was just wondering about the difference between the image on LTB and the one posted on imgur/twitter and the extra information on LTB...

What goes around comes around...
mirth23
Member
**
Offline Offline

Activity: 112
Merit: 10


View Profile
May 05, 2015, 07:17:29 PM
 #425

Which of the 3 puzzles are you guys playing?
I already have 3 tokens on LTB I was just wondering about the difference between the image on LTB and the one posted on imgur/twitter and the extra information on LTB...

iirc they are identical according to bindiff
ytcoinartist
Jr. Member
*
Offline Offline

Activity: 46
Merit: 2


View Profile
May 06, 2015, 02:37:32 AM
 #426

A walk thru of "The Legend of Satoshi Nakamoto," Part 1.

https://docs.google.com/document/d/1-EbSshf76PN407Srs3V4A5JWsAzmMmD7Oddrrfh9fwE/edit?usp=docslist_api

The final stage of the puzzle - the painting - remains unsolved.
Delek
Full Member
***
Offline Offline

Activity: 157
Merit: 100


Salí para ver


View Profile WWW
May 06, 2015, 05:51:27 PM
 #427

I loaded the painting on my Multivac and I got a message that reads: "Insufficient data for meaningful answer."

\/\/\/\/\/\/\/
-> delek.net <-
/\/\/\/\/\/\/\
Todamont
Sr. Member
****
Offline Offline

Activity: 604
Merit: 273


View Profile
May 08, 2015, 05:16:50 PM
 #428

I scanned the painting with a tricorder. It detected subpace vacuoles with a covariant triaxilating frequency. I'm still waiting for the computer to finish a multipolar analysis.
AgentofCoin
Legendary
*
Offline Offline

Activity: 1092
Merit: 1001



View Profile
May 08, 2015, 05:52:09 PM
 #429

I scanned the painting with a tricorder. It detected subpace vacuoles with a covariant triaxilating frequency. I'm still waiting for the computer to finish a multipolar analysis.

Geordi and Data had already performed that analysis, in a previous post.
They determined it was just subspace distortion related to a Romulan Warbird being cloaked near by.

I support a decentralized & unregulatable ledger first, with safe scaling over time.
Request a signed message if you are associating with anyone claiming to be me.
Todamont
Sr. Member
****
Offline Offline

Activity: 604
Merit: 273


View Profile
May 08, 2015, 07:14:08 PM
 #430

Yeah but Geordi inverted the polarity. He always does that.
Todamont
Sr. Member
****
Offline Offline

Activity: 604
Merit: 273


View Profile
May 11, 2015, 08:43:00 PM
 #431

Anyone have any new ideas on this thing? New hints still popping up anywhere?
e1ghtSpace
Legendary
*
Offline Offline

Activity: 1526
Merit: 1001


Crypto since 2014


View Profile WWW
May 12, 2015, 08:07:17 AM
 #432

I scanned the painting with a tricorder. It detected subpace vacuoles with a covariant triaxilating frequency. I'm still waiting for the computer to finish a multipolar analysis.
I have no idea what you just said, but it sounds so advanced. Like something from a sci-fi move.

...Ok I just googled it... It turns out it is from a sci-fi movie...
http://en.m.wikipedia.org/wiki/Tricorder

welp.
AgentGidget
Newbie
*
Offline Offline

Activity: 2
Merit: 0


View Profile
May 14, 2015, 02:44:52 AM
 #433

I haven't read through ALL 22 pages, just the beginning and ending pages and thought I'd throw this idea out and see if it benefits anyone.

If you use this (example image) and drop it on this page http://mozaiq.org/decrypt
The password is: alice

You should get a message that = the bitcoin address


This is hiding a message inside an image (AKA steganography). Some require passwords, some don't. So if you know the password, you could unlock the hidden message in the image.

Might be useable with the original photo. If you figure out the password, you may could unlock the real hidden message in the photo. Cheers! Send me a tip if you find this useful  Grin

My Bitcoin Address: 1B2tpddvJbdqQUvivw2XvqGVLdxdnoUXom
Todamont
Sr. Member
****
Offline Offline

Activity: 604
Merit: 273


View Profile
May 15, 2015, 01:53:09 AM
 #434

I used stegdetect and it did think there was a jphide message hiding in there, with the sensitivity turned up high enough. However, I've tried over 300,000 passwords with stegbreak, including every odd word or phrase mentioned in any of the threads here. Nothing so far. I'd be surprised if this was a brute force cracking problem, anyhow.
mooglez
Newbie
*
Offline Offline

Activity: 9
Merit: 0


View Profile
May 15, 2015, 09:22:52 AM
 #435

I used stegdetect and it did think there was a jphide message hiding in there, with the sensitivity turned up high enough. However, I've tried over 300,000 passwords with stegbreak, including every odd word or phrase mentioned in any of the threads here. Nothing so far. I'd be surprised if this was a brute force cracking problem, anyhow.

Here are my results from that:
OSpEZtA.jpg : jsteg(Ca/Q) Processed 1 files, found 1 embeddings. Time: 92459 seconds: Cracks: 450945859
so stegdetect claims that Ca/Q was a valid password, but no file was output
Cryptarch
Newbie
*
Offline Offline

Activity: 10
Merit: 0


View Profile
May 20, 2015, 04:57:58 PM
 #436

Any new leads?
Todamont
Sr. Member
****
Offline Offline

Activity: 604
Merit: 273


View Profile
May 20, 2015, 05:40:10 PM
 #437

Hmmmm, I wasn't able to replicate this result. What version of stegbreak are you using, I could only use 4.0, couldn't get 6.0 to build for the life of me. Apparently stegdetect is known for false positives, telling you there's a jphide message even if there is not, if you turn sensitivity high enough.
mooglez
Newbie
*
Offline Offline

Activity: 9
Merit: 0


View Profile
May 20, 2015, 10:26:57 PM
 #438

Hmmmm, I wasn't able to replicate this result. What version of stegbreak are you using, I could only use 4.0, couldn't get 6.0 to build for the life of me. Apparently stegdetect is known for false positives, telling you there's a jphide message even if there is not, if you turn sensitivity high enough.

I'm using stegbreak 0.4.
I also think its a false positive caused by upping the sensitivity to around 1.4
The only thing that confused me was, that stegbreak didn't output any file on that.. i'd have expected some gibberish file to come out of a false positive
Todamont
Sr. Member
****
Offline Offline

Activity: 604
Merit: 273


View Profile
May 21, 2015, 08:10:21 PM
Last edit: May 21, 2015, 08:26:07 PM by Todamont
 #439

There's a stego tool called Rizzy, also, written in python, but you still need a key or keyfile. I got this warning when I input "Ca/Q" as a possible password:

Input strings must be a multiple of 16 in length


I think if you really want to look at steganographic analysis of this thing, you may actually have to get into stego theory and manipulating raw bits in the image file. It's not clear which toolset may have been used to encode the data, if any actually was, at this point, and without a key, it's a brute-force thing with little luck so far. I was sure the Bacon cypher thing would turn up something.
AgentofCoin
Legendary
*
Offline Offline

Activity: 1092
Merit: 1001



View Profile
June 21, 2015, 10:31:01 PM
 #440

anybody claimed the 4.87 BTC yet?  Huh looks pretty complicated...

Not yet. https://blockchain.info/address/1FLAMEN6rq2BqMnkUmsJBqCGWdwgVKcegd
Complicated indeed. It is either extremely over my head, or so simplistic no one is able to see the way.
From reading all about the last one, it is probably over my head.  Cheesy

I support a decentralized & unregulatable ledger first, with safe scaling over time.
Request a signed message if you are associating with anyone claiming to be me.
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 [22] 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 ... 76 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!