1,157,920,892,373,161,954,235,709,850,086,879,078,532,699,846,656,405,640,394,57
We are safe.
1. This number is wrong, because you copy-pasted only half of it correctly.
2. You work with decimal numbers, so your code is probably written in Python, in interpreted mode, which is one of the slowest possible approaches.
3. You are probably trying to target n-value of the secp256k1, so you are going to generate 2^256 keys, instead of 2^128, so you are not a serious attacker.
4. You are trying to target all possible keys, instead of focusing only on those, which are really used. It is like trying to land on the moon by exploring the whole universe, inch by inch, including visiting every single place, filled entirely with void.
5. You don't attack any non-standard keys with timelocks, keyless outputs, and many other address types, so you won't get all coins anyway (and we may switch into
Pay to Quantum Resistant Hashes long before you will find a single key).
I would like to discuss that this system is scientific and buildable.
It is. But not in a brute force way. First, try to solve the 67-bit address, or the 135-bit public key. Starting point:
https://mempool.space/tx/08389f34c98c606322740c0be6a7125d9860bb8d5cb182c02f98461e5fa6cd15
1. Answer : This is the right number 1,157,920,892,373,161,954,235,709,850,086,879,078,532,699,846,656,405,640,394,575,177,306,100,000,000,000,000
2 - 3. Answer : For example, in hexadecimal:
b798b220579fadfb9ad9371b1540fee36355b7f05372446de84b8d3727c72138
is a HEX64 value, expressed in binary as follows:
10110111 10011000 10110010 00100000 01010111 10011111 10101101 11111011
10011010 11011001 00110111 00011011 00010101 01000000 11111110 11100011
01100011 01010101 10110111 11110000 01010011 01110010 01000100 01101101
11101000 01001011 10001101 00110111 00100111 11000111 00100001 00111000
This format is 256-bit long.
Is there some other length that I don't know about. HEX64 = 256bit
4. Answer I'm not focusing on that. What I'm focusing on is that every P2P client will generate 1 billion block hashes and it will be random
For example;
0000000000000000000000000000000000000000000000041d546d02404c4eff
0000000000000000000000000000000000000000000000041d546d027be718ff
There are 1 billion wallets between these two blocks. This block will be scanned by only 1 user. No wallet and key will be stored with the generated Hash, there is no system to store all addresses.
Change your perspective: After 2013, I created a db repository for the lost wallets in the P2P network. The hash generating client will match the compressed and uncompressed wallets it generates in this area with the lost wallets I store in the P2P network. So the generator will be instantly audited.
5. Answer I don't understand what you are saying about this. Secp256k1 does not have a stamped encryption.
The issue is simple. Whoever has the privatekey owns the wallet.
stwenhao thank you for your response. to continue the discussion, your questions will contribute to the development.
Uhhhhh... Perhaps state your point instead of beating around the bush. You 'built a software structure' targeting, what, lost wallets?
What are you suggesting with what you are trying to do? Take funds from lost wallets? If so, I'd advise you to get lost before the rest of the forum goes cut-throat on you. Best you just delete this post, too. You're just wasting everyone's time with a topic that will be disregarded by everyone.
Spend your time trying to invest in bitcoin or obtaining it legally instead of wasting time on dumb luck to find "lost wallets".
I'm not talking about luck, I'm talking about technology.
Bitcoin is a system where the structure of the currency is designed as a reward;
But what if the rules of this system are flawed?
Also these search methods are already available on many sites but they are using the wrong method.
Instead of people on the forum attacking me. They should learn about the encryption system and more secure address methods.
Bitcoin 256 bit wallet system <> π
As a software developer, he can find at least one lost wallet password with an investment of 2 million dollars.
Or if 1-2 million users generate hashes at the same time. 2-3 years to find 1 lost wallet.
I explain this with linear algebra and probability.
There are 73,000 BTC that have been idle since 2013.
An estimated 155,000 BTC are missing.