Pages:
Author

Topic: == Bitcoin challenge transaction: ~1000 BTC total bounty to solvers! ==UPDATED== - page 49. (Read 56284 times)

newbie
Activity: 1
Merit: 0
Mr zielar You recently rejoined the distributed effort ( ttdclient ) to crack #64, can you please share what hardware are you using ? These speeds are impressive I guess there must be multiple gpus ?
full member
Activity: 706
Merit: 111
Wow.  It's been more than a year since I last ran BitCrack.  And #64 is still unsolved?

Yep still unsolved
newbie
Activity: 17
Merit: 1
Wow.  It's been more than a year since I last ran BitCrack.  And #64 is still unsolved?
full member
Activity: 637
Merit: 131
Hi,
I am very interested in these, but everyone's discussion is too professional, most of which I can't understand. I don't understand the code.
I want to join, so I see that when "http://bitchain.pl/100btc/pollard_kangaroo.txt", I downloaded a python, copy and paste this code. The bad thing is that I don't know what to modify.
Can anyone help? When I want to try #120, how should I modify it. Or there is a better code to share.
                                                                                                              Thank you

It all starts in this thread here
https://bitcointalksearch.org/topic/bitcoin-puzzle-transaction-32-btc-prize-to-who-solves-it-1306983

and the latest one here
https://bitcointalksearch.org/topic/archive-bitcoin-challenge-discusion-5166284

read up and good luck
copper member
Activity: 909
Merit: 2301
It is also possible to create another puzzle, where even the puzzle creator don't know private keys for the challenge. For example something like this:
Code:
OP_DUP 027fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff OP_LESSTHAN OP_VERIFY OP_CHECKSIG
OP_DUP 023fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff OP_LESSTHAN OP_VERIFY OP_CHECKSIG
OP_DUP 021fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff OP_LESSTHAN OP_VERIFY OP_CHECKSIG
OP_DUP 020fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff OP_LESSTHAN OP_VERIFY OP_CHECKSIG
OP_DUP 0207ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff OP_LESSTHAN OP_VERIFY OP_CHECKSIG
OP_DUP 0203ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff OP_LESSTHAN OP_VERIFY OP_CHECKSIG
OP_DUP 0201ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff OP_LESSTHAN OP_VERIFY OP_CHECKSIG
OP_DUP 0200ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff OP_LESSTHAN OP_VERIFY OP_CHECKSIG
OP_DUP 02007fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff OP_LESSTHAN OP_VERIFY OP_CHECKSIG
OP_DUP 02003fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff OP_LESSTHAN OP_VERIFY OP_CHECKSIG
OP_DUP 02001fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff OP_LESSTHAN OP_VERIFY OP_CHECKSIG
OP_DUP 02000fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff OP_LESSTHAN OP_VERIFY OP_CHECKSIG
Unfortunately, such scripts could be spent only by miners.
newbie
Activity: 2
Merit: 0
Hi,
I am very interested in these, but everyone's discussion is too professional, most of which I can't understand. I don't understand the code.
I want to join, so I see that when "http://bitchain.pl/100btc/pollard_kangaroo.txt", I downloaded a python, copy and paste this code. The bad thing is that I don't know what to modify.
Can anyone help? When I want to try #120, how should I modify it. Or there is a better code to share.
                                                                                                              Thank you
member
Activity: 245
Merit: 17
And finaly the #115 was found. Congratulations Zielar and Jean_Luc_Pons  Smiley We are all wondering which was the privkey  Wink

Many thanks!
A valid private key that is solution #115 has already been placed in the main post table.

for #115 , you've got the wrong date in the main post Smiley
full member
Activity: 282
Merit: 114
And finaly the #115 was found. Congratulations Zielar and Jean_Luc_Pons  Smiley We are all wondering which was the privkey  Wink

Many thanks!
A valid private key that is solution #115 has already been placed in the main post table.
jr. member
Activity: 47
Merit: 13
And finaly the #115 was found. Congratulations Zielar and Jean_Luc_Pons  Smiley We are all wondering which was the privkey  Wink
full member
Activity: 1232
Merit: 242
Shooters Shoot...
hello guys, can someone tell me how to change DP modulo in this kangaro's version " https://github.com/JeanLucPons/Kangaroo "
i want to set it at  2^30

Will you be compiling yourself?


yes i use my GPU but the kangoros jump are small 2^20 is not enough so i asked how to change it in files so it jump 2^30
Are you searching in the 2^40 range? The avg jump size is determined by the rangePower. It's set to rangePower / 2 + 1.

It's in the Kangaroo.cpp file, around the 730s/740s lines (depending if you've made mods or the version you are using)

code:
Code:
void Kangaroo::CreateJumpTable() {

#ifdef USE_SYMMETRY
  int jumpBit = rangePower / 2;
#else
  int jumpBit = rangePower / 2 + 1;
#endif
newbie
Activity: 25
Merit: 0
hello guys, can someone tell me how to change DP modulo in this kangaro's version " https://github.com/JeanLucPons/Kangaroo "
i want to set it at  2^30

Will you be compiling yourself?


yes i use my GPU but the kangoros jump are small 2^20 is not enough so i asked how to change it in files so it jump 2^30
full member
Activity: 1232
Merit: 242
Shooters Shoot...
hello guys, can someone tell me how to change DP modulo in this kangaro's version " https://github.com/JeanLucPons/Kangaroo "
i want to set it at  2^30

Will you be compiling yourself?
newbie
Activity: 25
Merit: 0
hello guys, can someone tell me how to change DP modulo in this kangaro's version " https://github.com/JeanLucPons/Kangaroo "
i want to set it at  2^30
member
Activity: 348
Merit: 34
Congrats to zielar for solving #110
Hope you will solve #115
And more  Grin
Create multipubkey ver, it would be better then 1000 GPU's
but know you are now under contract and you cant do it, anyway enjoy you GPU pools testing
sr. member
Activity: 462
Merit: 701
Congrats to zielar for solving #110
Hope you will solve #115
And more  Grin
jr. member
Activity: 37
Merit: 1
110 key hex: 00000000000000000000000000000000000035c0d7234df7deb0f20cf7062444
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
full member
Activity: 1232
Merit: 242
Shooters Shoot...
Pages:
Jump to: