Pages:
Author

Topic: == Bitcoin challenge transaction: ~1000 BTC total bounty to solvers! ==UPDATED== - page 5. (Read 57113 times)

member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
As we can see this is a fact. 120,125,130 were withdrawn to the same wallet - 3Emiwzxme7Mrj4d89uqohXNncnRM15YESs


This is Zellar wallet.

Who is he? Or what does it mean?


he

https://bitcointalksearch.org/topic/m.51803085

and he in cooperation

https://bitcointalksearch.org/user/jeanluc-2550169

together take 120,125,130
newbie
Activity: 4
Merit: 0
As we can see this is a fact. 120,125,130 were withdrawn to the same wallet - 3Emiwzxme7Mrj4d89uqohXNncnRM15YESs


This is Zellar wallet.

Who is he? Or what does it mean?
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
As we can see this is a fact. 120,125,130 were withdrawn to the same wallet - 3Emiwzxme7Mrj4d89uqohXNncnRM15YESs


This is Zellar wallet.



I solved the 4 Puzzles using a python script.
solving 130 took 3 months of continously running the script.
i have enough money now.
selling my script for $9999
for all the proofs and to buy the script Contact telegram @margeletio
you can run the script on a very low end PCs also.

go away scammer !!!!
newbie
Activity: 4
Merit: 0
As we can see this is a fact. 120,125,130 were withdrawn to the same wallet - 3Emiwzxme7Mrj4d89uqohXNncnRM15YESs
newbie
Activity: 18
Merit: 0
I think the owner of this Puzzle just moved 13 btc from puzzle #130 to his wallet, the one ending with YESs

No did not move anything. I think it was solved by the same guy as 120,125...
newbie
Activity: 1
Merit: 0
I think the owner of this Puzzle just moved 13 btc from puzzle #130 to his wallet, the one ending with YESs
hero member
Activity: 862
Merit: 662
Why does every four keys a new seed start with "1"?

Wow you just found the puzzle pattern now we can solve it easily thank you very much...

Code:
1 (2**0) 0x1
2 (2**1) 0x2
4 (2**2) 0x4
8 (2**3) 0x8
16 (2**4) 0x10
32 (2**5) 0x20
64 (2**6) 0x40
128 (2**7) 0x80
256 (2**8) 0x100
512 (2**9) 0x200
1024 (2**10) 0x400
2048 (2**11) 0x800
4096 (2**12) 0x1000
8192 (2**13) 0x2000
16384 (2**14) 0x4000
32768 (2**15) 0x8000
65536 (2**16) 0x10000
131072 (2**17) 0x20000
262144 (2**18) 0x40000
524288 (2**19) 0x80000
1048576 (2**20) 0x100000
2097152 (2**21) 0x200000
4194304 (2**22) 0x400000
8388608 (2**23) 0x800000
16777216 (2**24) 0x1000000
33554432 (2**25) 0x2000000
67108864 (2**26) 0x4000000
134217728 (2**27) 0x8000000
268435456 (2**28) 0x10000000
536870912 (2**29) 0x20000000
1073741824 (2**30) 0x40000000
2147483648 (2**31) 0x80000000
4294967296 (2**32) 0x100000000

Jokes aside it is the hexadecimal representation, each puzzle was placed in one bit range (2**bit)
member
Activity: 245
Merit: 17
copper member
Activity: 205
Merit: 1
Hello there  Smiley

Wow, Gratz to the solver of puzzle 130   Shocked



Yeah... It's an unpleasant situation for me, and I think for many.
A lot of time and effort has been spent.
But in any case, let's be happy for the winner!
I hope he will provide a private key so that we can make sure that we have applied our efforts and skills in the right direction.
Or we should continue to learn and come up with new search methods.
newbie
Activity: 3
Merit: 0
Hello there  Smiley

Wow, Gratz to the solver of puzzle 130   Shocked




it`s realy done  Cry
jr. member
Activity: 51
Merit: 13
Hello there  Smiley

Wow, Gratz to the solver of puzzle 130   Shocked

newbie
Activity: 25
Merit: 3
I may be reading this wrong and my theory may be without merit -- but it seems to me, given the replacement transaction was less than 18 seconds behind the original, it implies the creator of the replacement transaction ALREADY had the private key and did not need to the public key to run Pollard's kangaroo against it.  Wouldn't it have taken a little longer than 18 seconds to find the key and replace the transaction?   And isn't it ironic that the creator of the replacement transaction left exactly .66 BTC behind (for puzzle #66), instead of sweeping the entire thing?  Who would have had the private key already and not used it?  Who would leave behind exactly .66 BTC?   Is it possible it was the creator of the puzzle clawing back the lion share and leaving the original amount?   Anyone else have thoughts about this? 

>>>>
2024-09-12: puzzle #66 (6.60126013 BTC) was solved by 1Jvv4yWkE9MhbuwGUoqFYzDjRVQHaLWuJd (tx) but the original spending transaction was replaced by bc1qpkp47q5cucrvnyepsdnjcv2kzyav5ze0ta7n67 (tx) spending only 5.93923605 BTC. Another address 15XVN6hFkzGdUTY1XcsYKXxRezjARwyBQx took the rest of the prize: 0.66100387 BTC (tx).
>>>>



~~~

Hello, I noticed something.

66. Wallet transfer time: 9/13/2024, 01:59:39
Your message: 09/13/2024, 01:57:12
...
You should normalize timestamps to UTC for universal comparability. Block #861068 which contained the first withdrawal tx 57a88f47e4c0...6e9ae7fc2f5f has a block timestamp of 2024-09-12T22:59:39Z (the suffix Z for Zulu means it's UTC). And one of my own nodes saw this block at precisely 2024-09-12T22:59:57Z ("Saw new header" announcement) and UpdateTip a second later.

Common blockchain explorers like mempool.space or bitcoinexplorer.org show block and transaction timestamps in your browser's local timezone per default (for bitcoinexplorer.org you can configure it to display in UTC which is nice), while blockchair.com displays it in UTC per default AFAIR.

If you draw conclusions based on wrong data (unknowingly?), you spread false and flawed assumptions. Sort of a disease in these internet times when too many people spread any BS unquestioned...

I'm no expert but....
To your first question, no. The first transaction was https://www.blockchain.com/explorer/transactions/btc/8c8ec6b3511c62500ea9b3a1c30ca937e15d251b55d30290a2a6da2f1124f3fb which was replaced by https://www.blockchain.com/explorer/transactions/btc/57a88f47e4c047740b782a5562fca143ce85de0373cbff3a7d406e9ae7fc2f5f about 75 seconds later, but treat this number as a ballpark figure since transactions are seen by nodes at slightly different times as they propagate across the network.  For a mid to high end PC with a well written script, this is more than enough time to crack the key and broadcast a replacement transaction. Using albert0's Keyhunt on my own desktop PC (Intel i7-14700k, 96GB RAM) assuming I have already saved the pubkey to file 66key.txt:

time ./keyhunt -m bsgs -f tests/66key.txt -l compress -b 66 -s 1 -t 28 -k 2048 -S -6
  • Version 0.2.230519 Satoshi Quest, developed by AlbertoBSD
  • Search compress only
  • Stats output every 1 seconds
  • Threads : 28
  • K factor 2048
[W] Skipping checksums on files
  • Mode BSGS sequential
  • Opening file tests/66key.txt
  • Added 1 points from file
  • Bit Range 66
  • -- from : 0x20000000000000000
  • -- to   : 0x40000000000000000
  • N = 0x100000000000
  • Bloom filter for 8589934592 elements : 29445.30 MB
  • Bloom filter for 268435456 elements : 920.17 MB
  • Bloom filter for 8388608 elements : 28.76 MB
  • Allocating 128.00 MB for 8388608 bP Points
  • Reading bloom filter from file keyhunt_bsgs_4_8589934592.blm .... Done!
  • Reading bloom filter from file keyhunt_bsgs_6_268435456.blm .... Done!
  • Reading bP Table from file keyhunt_bsgs_2_8388608.tbl .... Done!
  • Reading bloom filter from file keyhunt_bsgs_7_8388608.blm .... Done!
  • Thread Key found privkey 2832ed74f2b5e35ee   62822912 keys in 8 seconds: ~2 Ekeys/s (2193815968482852864 keys/s)
  • Publickey 024ee2be2d4e9f92d2f5a4a03058617dc45befe22938feed5b7a6b7282dd74cbdd
All points were found000000000
  • Thread 0x28339600000000000
real    0m15.194s
user    3m43.041s
sys     0m9.423s

It takes just 15.194 seconds. If anything, I'm surprised the replacement transaction didn't arrive sooner.

As for your other questions (again I'm no expert, just an observer):
1. Maybe key finder was a newb and tried to sweep all funds which failed
2. Maybe the replacement transaction was a bot, choosing to only spend 66's largest input with a much higher fee to increase chances it would be accepted into the mempool and be mined
3. Maybe the key finder was an expert, and in a clever and methodical way, intentionally broadcasted the first sweep transaction as well as the replacement transaction of just the largest input, to increase the chances they would at least get the 5.9BTC, and this (may have??) had the effect of causing the mempool to reject any more replacement transaction attempts until the next block was mined and
4. Maybe there were no bots, or if there was, they either weren't running at the time, were not configured properly/not fast enough to get a replacement transaction broadcast to the mempool or the transactions were simply just rejected because of the then-pending existing replacement transaction
5. Maybe the number of possible scenario's that could have played out is as big as the bitcoin keyspace itself, I doubt we will ever really know who/what/when/where/how it happened.
newbie
Activity: 1
Merit: 0
I may be reading this wrong and my theory may be without merit -- but it seems to me, given the replacement transaction was less than 18 seconds behind the original, it implies the creator of the replacement transaction ALREADY had the private key and did not need to the public key to run Pollard's kangaroo against it.  Wouldn't it have taken a little longer than 18 seconds to find the key and replace the transaction?   And isn't it ironic that the creator of the replacement transaction left exactly .66 BTC behind (for puzzle #66), instead of sweeping the entire thing?  Who would have had the private key already and not used it?  Who would leave behind exactly .66 BTC?   Is it possible it was the creator of the puzzle clawing back the lion share and leaving the original amount?   Anyone else have thoughts about this? 

>>>>
2024-09-12: puzzle #66 (6.60126013 BTC) was solved by 1Jvv4yWkE9MhbuwGUoqFYzDjRVQHaLWuJd (tx) but the original spending transaction was replaced by bc1qpkp47q5cucrvnyepsdnjcv2kzyav5ze0ta7n67 (tx) spending only 5.93923605 BTC. Another address 15XVN6hFkzGdUTY1XcsYKXxRezjARwyBQx took the rest of the prize: 0.66100387 BTC (tx).
>>>>



~~~

Hello, I noticed something.

66. Wallet transfer time: 9/13/2024, 01:59:39
Your message: 09/13/2024, 01:57:12
...
You should normalize timestamps to UTC for universal comparability. Block #861068 which contained the first withdrawal tx 57a88f47e4c0...6e9ae7fc2f5f has a block timestamp of 2024-09-12T22:59:39Z (the suffix Z for Zulu means it's UTC). And one of my own nodes saw this block at precisely 2024-09-12T22:59:57Z ("Saw new header" announcement) and UpdateTip a second later.

Common blockchain explorers like mempool.space or bitcoinexplorer.org show block and transaction timestamps in your browser's local timezone per default (for bitcoinexplorer.org you can configure it to display in UTC which is nice), while blockchair.com displays it in UTC per default AFAIR.

If you draw conclusions based on wrong data (unknowingly?), you spread false and flawed assumptions. Sort of a disease in these internet times when too many people spread any BS unquestioned...
copper member
Activity: 205
Merit: 1
Hi guys, I made a little key miner that works for keys 66, 67 and 68, using a tiny super mini esp32-c2, it only generates about 24 keys per second but it's a very low power microcontroller, it has an audible alarm to hear when I win the prize, what do you think?

https://imgur.com/a/bitcoin-puzzle-Ay0xXiY

This is pretty good for a start.
The speed is not great, of course, but it will do for general education.
Well, everyone knows that a tree grows from a small seed.
Good luck with your development.
newbie
Activity: 3
Merit: 0
Hi guys, I made a little key miner that works for keys 66, 67 and 68, using a tiny super mini esp32-c2, it only generates about 24 keys per second but it's a very low power microcontroller, it has an audible alarm to hear when I win the prize, what do you think?

https://imgur.com/a/bitcoin-puzzle-Ay0xXiY
member
Activity: 245
Merit: 17
jr. member
Activity: 137
Merit: 2
Quote
Puzzle 66 was found - 13zb1hQbWVsc2S7ZTZnP2G4undNNpdh5so

congratulations to the winner!
so, now 6.7 at fire.
newbie
Activity: 68
Merit: 0
~~~

Hello, I noticed something.

66. Wallet transfer time: 9/13/2024, 01:59:39
Your message: 09/13/2024, 01:57:12
...
You should normalize timestamps to UTC for universal comparability. Block #861068 which contained the first withdrawal tx 57a88f47e4c0...6e9ae7fc2f5f has a block timestamp of 2024-09-12T22:59:39Z (the suffix Z for Zulu means it's UTC). And one of my own nodes saw this block at precisely 2024-09-12T22:59:57Z ("Saw new header" announcement) and UpdateTip a second later.

Common blockchain explorers like mempool.space or bitcoinexplorer.org show block and transaction timestamps in your browser's local timezone per default (for bitcoinexplorer.org you can configure it to display in UTC which is nice), while blockchair.com displays it in UTC per default AFAIR.

If you draw conclusions based on wrong data (unknowingly?), you spread false and flawed assumptions. Sort of a disease in these internet times when too many people spread any BS unquestioned...

If you had read what I wrote carefully, I would have been happy.

"I guess"

Don't say you have this kind of disease. Smiley
hero member
Activity: 714
Merit: 1010
Crypto Swap Exchange
~~~

Hello, I noticed something.

66. Wallet transfer time: 9/13/2024, 01:59:39
Your message: 09/13/2024, 01:57:12
...
You should normalize timestamps to UTC for universal comparability. Block #861068 which contained the first withdrawal tx 57a88f47e4c0...6e9ae7fc2f5f has a block timestamp of 2024-09-12T22:59:39Z (the suffix Z for Zulu means it's UTC). And one of my own nodes saw this block at precisely 2024-09-12T22:59:57Z ("Saw new header" announcement) and UpdateTip a second later.

Common blockchain explorers like mempool.space or bitcoinexplorer.org show block and transaction timestamps in your browser's local timezone per default (for bitcoinexplorer.org you can configure it to display in UTC which is nice), while blockchair.com displays it in UTC per default AFAIR.

If you draw conclusions based on wrong data (unknowingly?), you spread false and flawed assumptions. Sort of a disease in these internet times when too many people spread any BS unquestioned...
Pages:
Jump to: