Pages:
Author

Topic: ARG Puzzle with 3.5 BTC Private Key Prize, Game Over - page 29. (Read 99503 times)

newbie
Activity: 28
Merit: 0
I was so confused about what SHA256 is.
newbie
Activity: 14
Merit: 0
Damn I'm slow... Thanks to you all. Grin
newbie
Activity: 14
Merit: 0
THAT'S THE ONE. I've literally been sitting here trying to remember what the hell I put assuming that it was "Wow!". Sorry folks!

Thanks Mirth.
member
Activity: 112
Merit: 10
If you're trying to replicate the results, you should be hashing '6EQUJ5' not 'Wow!'. Smiley
arg
newbie
Activity: 14
Merit: 0

Code:
echo -n "$1" | openssl dgst -sha256 -binary | tr -d '\n' | openssl dgst -sha256



The first hash is into hex, then the second hash is of the hex not the binary.
sr. member
Activity: 358
Merit: 250
lol yeah , when i sha256 Wow! twice i get somthing different to the answer, so i'm intrigued to know what is the real answer because it doesn't seem like it was Wow!
newbie
Activity: 14
Merit: 0
Damn son, what a fluke! hahahaha Grin

To unlock Crops:

shax2 Wow! = 807779b76e88b7aa9abc84a126822f76c0f24a28b5eb2ea1baa435eb09f5c155

Sorry for a bit offtop, but have a newbie question, how to get this? First calculate hash of "Wow!" (without quotes), then hash result again? Lowercase or uppercase? Already tried this bash script (''sh scriptname.sh Wow!''):

Code:
echo -n "$1" | openssl dgst -sha256 -binary | tr -d '\n' | openssl dgst -sha256

And this python code:

Code:
>>> a = hashlib.sha256()
>>> a.update("Wow!")
>>> a.hexdigest()
'4a7d6d3e8888a86b41c710f1d44c43d9ec7a4f97dce4f1ec3c0fb124ca0188de'
>>> a2 = hashlib.sha256()
>>> a2.update(a.digest())
>>> a2.hexdigest()
'15b46b4b87922f08d5cf6df20f900941953fb712df4bd2dda935f0b1f82b7cb9'

No matches. Look like all this time I do it wrong. Grin
arg
newbie
Activity: 14
Merit: 0

edit3: it's also unclear what the next step is - there's no obvious thing to unzip, so does that mean we're almost done? even if that's the case, I am going to step away from the keys for a while. Smiley

The JPEG is too big for my liking.
member
Activity: 112
Merit: 10
Ok, here's what we've got:
Code:
CHANNEL NUMBER, (TWO DIGITS, WRITTEN VERTICALLY).
z69JZqlJn862D1ndx7oLVEMmVOlP1zewEeUCrsI7Roahzpeny7P

edit2: note that it's unclear if that's a O or 0 above; the two fonts are different so there's nothing to compare it against. I think it's most likely the letter O but the transformation below assumed it was a 0.

perhaps that means a transformation?
Code:
z9Zln6DnxoVMVl1eEUrIRazeyP
6JqJ821d7LEmOPzweCs7ohpn7

or perhaps a similar thing with just the digits?
Code:
68107
96717

zip codes in nebraska and hawaii?

edit: amusing factoid: if I convert that to GPS, it's in Siberia... I was all excited that it might be pointing at the Tunguska event, but upon closer inspection it's quite a ways off. Siberia a big place.

uhhm.

the fact that string is 51 characters was obviously compelling at first, but it's not in base58 so it's unclear how we'd shift it into a private bitcoin key. I've tried a couple approaches and always end up with some invalid characters, unless I start out by doing some weird transpositions that don't make a lot of sense.

edit3: it's also unclear what the next step is - there's no obvious thing to unzip, so does that mean we're almost done? even if that's the case, I am going to step away from the keys for a while. Smiley

edit4: managed to extract this hidden image!


...

ok, not really. zzz.
sr. member
Activity: 358
Merit: 250
only thing that sticks out for me is
1ndx (index)
V0lP (voip)
and of course the Roahzpeny (Rose penny)

but as usual dead ends all around and no idea which direction to take. zzzz
sr. member
Activity: 345
Merit: 500
Come on guys let's keep it simple.
I will try to broadcast the double SHA of the key into space, let's hope someone answers...

edit: https://www.youtube.com/watch?v=OkycNvrpjCs
sr. member
Activity: 644
Merit: 250
yes that's the original, so we're working with the info that has been changed which is
z69JZqlJn862D1ndx7oLVEMmV0lP1zewEeUCrsI7Roahzpeny7P

that's the clue we have, but again no other help

getting boring for me now, such needle in haystack every time

check wikipedia website for WOW! signal...

maybe we need to do something with the audio files?


http://de.wikipedia.org/wiki/Wow!-Signal
sr. member
Activity: 358
Merit: 250
yes that's the original, so we're working with the info that has been changed which is
z69JZqlJn862D1ndx7oLVEMmV0lP1zewEeUCrsI7Roahzpeny7P

that's the clue we have, but again no other help

getting boring for me now, such needle in haystack every time
sr. member
Activity: 644
Merit: 250


check creation date of the file: 1977 !


Das Wow!-Signal war ein Schmalband-Radiosignal, das der Astrophysiker Jerry R. Ehman ... August 1977 aus Richtung des ...


moth, day, year is exact the same!




sr. member
Activity: 644
Merit: 250
here is the peek tool result which show all strings and ascii from the  WOW.jpg file:

dont know if it is useful or not:

jau.cc/bitcoin/PEEK.txt
hero member
Activity: 508
Merit: 500
That's what usually comes to my mind when I hear wow, tot wow signal from SETI(or world of warcraft).
This thread is mighty interesting, 92 pages already? wow!
newbie
Activity: 13
Merit: 0
August 15
The Big Ear, a radio telescope operated by Ohio State University as part of the SETI project, receives a radio signal from deep space; the event is named the Wow! signal for a notation made by a volunteer on the project.
Herbert Kappler escapes from the Caelian Hill military hospital in Rome.
full member
Activity: 183
Merit: 100
in WOW there is a xmp packet
All that data matches up with what http://regex.info/exif.cgi has labeled the Paint Based Correction. This might just be the OPs edits on top of the original.

Looks like that's true. Here's the coordinates plotted out.


hero member
Activity: 602
Merit: 500
In math we trust.
note how z69JZqlJn862D1ndx7oLVEMmV0lP1zewEeUCrsI7Roahzpeny7P
is 51 chars long... same as the bitcoin private key!
https://en.bitcoin.it/wiki/Private_key   Cool Cool Cool
Pages:
Jump to: