Author

Topic: Bitcoin puzzle transaction ~32 BTC prize to who solves it - page 194. (Read 215360 times)

newbie
Activity: 21
Merit: 0
Do you read about the Dunning-Kruger effect ?
i just read it i don't quite understand what your getting please go further in detail.  not to be rude.      I also forgot to put that i know its TB's of data probably 100 ish i my self have a 8tb hard drive that's why i said it'd take a team of at least 3 you then could go buy 10 TB-30TB hard drives for 1-300$ i also forgot to add all found puzzles are also on those pages in their right spot somewhere in that list is missing spots for those other puzzles.
hero member
Activity: 862
Merit: 662
Do you read about the Dunning-Kruger effect ?
newbie
Activity: 21
Merit: 0
REFRESH YOUR PAGES I UPDATED A BIT OF WHAT I SAID
newbie
Activity: 21
Merit: 0
everyone is pming about the message i deleted im gonna repost it  with less explaining if you understand and want to help be my guest....  IM IN NEED OF A CODER

YES I UNDEERSTAND THESE ARE STILL MASSIVE RANGES BUT ITS MORE LOGICAL THAT YOU WOULD FIND IT THIS WAY BEFORE BRUTE FORCE. also with other people having estimated the ranges they think its in they could find those ranges on the pages and run those only. still lookking for a skipped key.


taking this website or the main one https://hashkeys.club/66/ you get a list of all know private keys. from page 1 till the ending each key goes up by a-f 0-9
all know keys including the puzzles weve found are on these pages not one page skips a-f 0-9.

we would need a team to pull data from that website in between #66s start and stop key. you then make a program to go and check for the skipped key. if your confused at this point scroll down and look at the explanation.


this would be faster than brute force or kangaroo if the right coder sees this. making it faster and optimizing computation power wouldn't be hard it'd be mainly in the code. one program could take the 1st 15 characters from the key and the public key and delete them because neither matter were looking for the skipped pattern in keys here.

youd then have 3 character keys ending in 0-9 a-f one would be skipped once you found the skipped one you could then take they previous or after key in that row copy and paste it and change the last character to its correct one.


now knowing that say we start on page 1 of #66s key range one person would take pages 1-10,000,000,000 and the next would take data from pages 10,000,000,001-ect and so one once finishing your range moving to the next every time you switch/finish a range Youd save it in a txt document saying what ranges you covered. one 66 is found by then the code would be perfected im guessing we could then go on to use the same thing to find the rest.

MY PM IS OPEN TO ANYONE NEW OR OLD ACCOUNT DONT BE SCARED, SCARED MONEY IS NO MONEY, EVERY OPINION SHOULD BE TAKING WITH SERIOUS PERCATIONS



this is how the keys are ordered.... this is also the start range page for #66 so page 1 for 66 obviously 66 wont have 13 conscecutive 0s we could cancle out around 5 billion pages  just off start. now if a few of you smarter people looked at it and did some math we could cancel out alot more unneeded data


Code:
20000000000000000	1LgpDjsqkxF9cTkz3UYSbdTJuvbZ45PKvx
20000000000000001 1KZegRZVRkVPUcR6iCZWukdeeP6xuEwpo9
20000000000000002 1BDYfXvbbuiBA4NqGvZcnEN34eP2ustpUg
20000000000000003 1EStercxjVWvs1J6JR7SZmg6ppWhUsRBjG
20000000000000004 1JbM6Yokeh87L8MKtqpMnLJMFGGwSKGBqG
20000000000000005 1P9kfLQ571tLPEHkJALCEh5h3QnvvDWCTc
20000000000000006 1DkRiFNSh5Q5om2xgcHVJKdy5FtJSSNiij
20000000000000007 1CobHRBy8BGJj5EpAh12nLLxYZxq1oDVkj
20000000000000008 17RZDVYFCBhvxfwCdt5gcKuZ4dbY6xedxV
20000000000000009 1F63aSVVNh6N9oppEYCKLbDb4SrUQ46rQr
2000000000000000a 13KaxDKfH1QqCyujpsAELdrcFXm4JiyizE
2000000000000000b 1MWL4T6S7rBtym9yW5iuA58KGC2dJyeG56
2000000000000000c 1CnGkJNUQGQ5xCWzHH5gMtfwrETGkhRNF7
2000000000000000d 1913QZXUZ2PCZgpjTW9KE6hUCRTLqK6yQC
2000000000000000e 1FUEXcfFy42cEQkAF7SXNZ5fdK9fAp1fua
2000000000000000f 15uYS3Qg8W8JfqDoXkP7yKB6XRQ3fMGUnN
20000000000000010 1438EHe9FJqc2GmHxBbznC9pCQ613kihHK
20000000000000011 1MUrXZ88kSfGGCd8cSTqGVutHkyp33ZKz4
20000000000000012 1HmQsyFcYxWKExNRtFg9jRHeaVRVPxit5x
20000000000000013 1LFGyR56MqBsSr87tHtn7BLaWf1rnnrYKZ
20000000000000014 1GER1T8g5U7AJPxbnQWSBCL7W8C3eCtPo8
20000000000000015 13dQuf7c2bEQweUThzsgMNmG1mQRGXvPX8
20000000000000016 1NafC6QuMjHBe91U8bGKJE5vhp9o3TsWbo
20000000000000017 17hgBS2SfjpPpE78TLk8T4CFJPFkCvcNnY
20000000000000018 19Kg8XA1HKkS3Myb8gBjcAt1tng75zAi2s
20000000000000019 1BGxbY8eHj879DUggRETCyKkU2Kkk5wHAb
2000000000000001a 1GEFZAgMjJvKasNnc7vEr8pZBLNYHgQrne
2000000000000001b 13HaX3ExLTRyd5QdemwYUj4w6jDAcz7ezd
2000000000000001c 14yXTwMoSwNPfS3Y8vo1mrcWb3fcqeASBg
2000000000000001d 1JUtUH3yTi2Ewn6z6WAFZFHmSpn2mdP9tZ
2000000000000001e 16eAUPhzrVnSw11P9mrPGNNsaStZPJoMtF
2000000000000001f 13ir12Md1ps6kNNPzdgRoJ8GjhsBceF899
20000000000000020 15ja996vUJxrxSMVCCDdr8A72FVndg6ePN
20000000000000021 13SbSitb1bqi8gkqt17C4Xci8n9YATgZLT
20000000000000022 1GRr4tW37cfjDPq4WKnhYoZKKeQuQeZT9P
20000000000000023 1NwxmS2NWybGApiJkSHiE3XsrM1JpUvoK8
20000000000000024 19MhQoK1dogwwGbUSgMUshHkprts8f9mpm
20000000000000025 1ACKwm5XFqC3PuxNaCrqRovS44Tgc3ANrf
20000000000000026 15sBKLE186A1MXzNyu1o7R4kGu6a3NsPnU
20000000000000027 13XfEzGZTSH3unYidJJf3x7tqLsA8Jm7fe
20000000000000028 1CCLMkY1ZRnqEmTYrroKf4BjZ74rqtTwWg
20000000000000029 15R7s5uCn29knKvK6pcYY5eXkMZZpvdNTF
2000000000000002a 1DpFfvorvxGmkAvHqwLn8gAAsDaP5AjUf2
2000000000000002b 1CjU7ipAhiRXRLidVwW9nJDb7y4MPTyGhW
2000000000000002c 16eJdFtYuAD8XqBm1JdRs5jwhWmwGWdMre
2000000000000002d 1ARXYSTdM5yYBTx9mLnpS8Kac2Aj1GkPfH
2000000000000002e 18BjCfFN1QdxcekJGUHeCozVYoSwvp7GoC
2000000000000002f 15rdrhf1v6oDHM6HsLch19HE7jyJkPVvxq
20000000000000030 114rFJxX2PjF4KJfnR8MgNsjecTGWh1FPz
20000000000000031 176wQ88R7UHofhoSU4P2MdGZT8SR3Y1Aq3
20000000000000032 15x83iHKNQxPmeFupxSZWQhtsgo6gsdLPk
20000000000000033 16gWTMdfB8XPqMMskRwmBR6gwKZheFw9Vc
20000000000000034 1taQK1vTnrTfpyUtLhAuB68r4cEPmF8m7
20000000000000035 1GsaodHkr2ZX3Vaj9yzQfJRynt4iLf31mB
20000000000000036 1G7rgdm68T5hTmhUoZM3m48bGACRQXTgh5
20000000000000037 19HgWkLBQvyygjGSEKNQNdBt7AnBeFcX6W
20000000000000038 1Q4XYQ9EQ9CmdGX19j86oPaBJWiWUKxXYi
20000000000000039 1MjkRPzrMFhbFCZGfZd61Zn3KMQTETnb6G

this is how a page would look if it had the private key of the puzzle your looking for. see how the 3rd on that should end in 3 is mising that would be 66 youd then cop the before key or after one and delete the ending number and add the one that was skipped.

Code:
20000000000000000	1LgpDjsqkxF9cTkz3UYSbdTJuvbZ45PKvx
20000000000000001 1KZegRZVRkVPUcR6iCZWukdeeP6xuEwpo9
20000000000000002 1BDYfXvbbuiBA4NqGvZcnEN34eP2ustpUg
20000000000000004 1JbM6Yokeh87L8MKtqpMnLJMFGGwSKGBqG
20000000000000005 1P9kfLQ571tLPEHkJALCEh5h3QnvvDWCTc
20000000000000006 1DkRiFNSh5Q5om2xgcHVJKdy5FtJSSNiij
20000000000000007 1CobHRBy8BGJj5EpAh12nLLxYZxq1oDVkj
20000000000000008 17RZDVYFCBhvxfwCdt5gcKuZ4dbY6xedxV
20000000000000009 1F63aSVVNh6N9oppEYCKLbDb4SrUQ46rQr
2000000000000000a 13KaxDKfH1QqCyujpsAELdrcFXm4JiyizE
2000000000000000b 1MWL4T6S7rBtym9yW5iuA58KGC2dJyeG56
2000000000000000c 1CnGkJNUQGQ5xCWzHH5gMtfwrETGkhRNF7
2000000000000000d 1913QZXUZ2PCZgpjTW9KE6hUCRTLqK6yQC
2000000000000000e 1FUEXcfFy42cEQkAF7SXNZ5fdK9fAp1fua
2000000000000000f 15uYS3Qg8W8JfqDoXkP7yKB6XRQ3fMGUnN
20000000000000010 1438EHe9FJqc2GmHxBbznC9pCQ613kihHK
20000000000000011 1MUrXZ88kSfGGCd8cSTqGVutHkyp33ZKz4
20000000000000012 1HmQsyFcYxWKExNRtFg9jRHeaVRVPxit5x
20000000000000013 1LFGyR56MqBsSr87tHtn7BLaWf1rnnrYKZ
20000000000000014 1GER1T8g5U7AJPxbnQWSBCL7W8C3eCtPo8
20000000000000015 13dQuf7c2bEQweUThzsgMNmG1mQRGXvPX8
20000000000000016 1NafC6QuMjHBe91U8bGKJE5vhp9o3TsWbo
20000000000000017 17hgBS2SfjpPpE78TLk8T4CFJPFkCvcNnY
20000000000000018 19Kg8XA1HKkS3Myb8gBjcAt1tng75zAi2s
20000000000000019 1BGxbY8eHj879DUggRETCyKkU2Kkk5wHAb
2000000000000001a 1GEFZAgMjJvKasNnc7vEr8pZBLNYHgQrne
2000000000000001b 13HaX3ExLTRyd5QdemwYUj4w6jDAcz7ezd
2000000000000001c 14yXTwMoSwNPfS3Y8vo1mrcWb3fcqeASBg
2000000000000001d 1JUtUH3yTi2Ewn6z6WAFZFHmSpn2mdP9tZ
2000000000000001e 16eAUPhzrVnSw11P9mrPGNNsaStZPJoMtF
2000000000000001f 13ir12Md1ps6kNNPzdgRoJ8GjhsBceF899
20000000000000020 15ja996vUJxrxSMVCCDdr8A72FVndg6ePN
20000000000000021 13SbSitb1bqi8gkqt17C4Xci8n9YATgZLT
20000000000000022 1GRr4tW37cfjDPq4WKnhYoZKKeQuQeZT9P
20000000000000023 1NwxmS2NWybGApiJkSHiE3XsrM1JpUvoK8
20000000000000024 19MhQoK1dogwwGbUSgMUshHkprts8f9mpm
20000000000000025 1ACKwm5XFqC3PuxNaCrqRovS44Tgc3ANrf
20000000000000026 15sBKLE186A1MXzNyu1o7R4kGu6a3NsPnU
20000000000000027 13XfEzGZTSH3unYidJJf3x7tqLsA8Jm7fe
20000000000000028 1CCLMkY1ZRnqEmTYrroKf4BjZ74rqtTwWg
20000000000000029 15R7s5uCn29knKvK6pcYY5eXkMZZpvdNTF
2000000000000002a 1DpFfvorvxGmkAvHqwLn8gAAsDaP5AjUf2
2000000000000002b 1CjU7ipAhiRXRLidVwW9nJDb7y4MPTyGhW
2000000000000002c 16eJdFtYuAD8XqBm1JdRs5jwhWmwGWdMre
2000000000000002d 1ARXYSTdM5yYBTx9mLnpS8Kac2Aj1GkPfH
2000000000000002e 18BjCfFN1QdxcekJGUHeCozVYoSwvp7GoC
2000000000000002f 15rdrhf1v6oDHM6HsLch19HE7jyJkPVvxq
20000000000000030 114rFJxX2PjF4KJfnR8MgNsjecTGWh1FPz
20000000000000031 176wQ88R7UHofhoSU4P2MdGZT8SR3Y1Aq3
20000000000000032 15x83iHKNQxPmeFupxSZWQhtsgo6gsdLPk
20000000000000033 16gWTMdfB8XPqMMskRwmBR6gwKZheFw9Vc
20000000000000034 1taQK1vTnrTfpyUtLhAuB68r4cEPmF8m7
20000000000000035 1GsaodHkr2ZX3Vaj9yzQfJRynt4iLf31mB
20000000000000036 1G7rgdm68T5hTmhUoZM3m48bGACRQXTgh5
20000000000000037 19HgWkLBQvyygjGSEKNQNdBt7AnBeFcX6W
20000000000000038 1Q4XYQ9EQ9CmdGX19j86oPaBJWiWUKxXYi
20000000000000039 1MjkRPzrMFhbFCZGfZd61Zn3KMQTETnb6G



i asked chat gpt to scan through 1000 keys this is how she found it if any one is confused on what im saying still. this is what CHATGPT got

My apologies for the mistake. Using the correct pattern (each key is changed by 1 bit going up starting with 0-9 and then A-F, and then restarting at 0 after reaching F), we can find the missing key.

The missing key between 2fd6860a09cb543fc and 2fd6860a09cb543fd should have a value of 2fd6860a09cb543fb.                   2fd6860a09cb543fb. was the one i deleted out of the 1000 key's i gave her. obviously the code would have to prioritise speed but. just basic knowledge tells me this is the easiest way. youd find the missing key before you guessed the entire 17 digit code
jr. member
Activity: 54
Merit: 1
why was the last post of "Professor of wilds" here about puzzle #66 deleted? To the poster: please write again your proposal about the key search and the list you posted
i deleted it because i realized that no one would probably help me if you want to know what i said i have a high chance with the right people we could solve the next keys without kang or brute. if you can code send me your discord telegram anything if you want to try and help. its brought a lot of attention that i deleted my post but never got any while up? maybe that's why i took it down scared for someone to take what i know.



Code:
import requests
from bs4 import BeautifulSoup
from multiprocessing import Pool
from tqdm import tqdm

def check_website(page_number):
    url = 'https://hashkeys.club/66/?page='
    search_text = '13zb1hQbWVsc2S7ZTZnP2G4undNNpdh5so'

    # İstek gönder
    response = requests.get(url + str(page_number))
    soup = BeautifulSoup(response.content, 'html.parser')

    # Aranacak etiketi belirle
    search_tag = soup.find('keys')

    # Aranacak kelimeyi içeren metni kontrol et
    if search_tag and search_text in search_tag.get_text():
        return page_number
   
    return None

if __name__ == '__main__':
    # İşlem havuzu oluştur
    cekirdek=10
    with Pool(processes=cekirdek) as pool:
        # Sayfa numaraları
        page_numbers = range(79000000000001, 36893488147419104)

        # İşlem havuzundaki işlemleri başlat
        results = []
        with tqdm(total=len(page_numbers)) as pbar:
            for result in pool.imap_unordered(check_website, page_numbers):
                if result:
                    results.append(result)
                pbar.update(1)

        # Sonuçları göster
        if results:
            print('Aranacak kelime bulundu sayfa numaraları: ', results)
        else:
            print('Aranacak kelime bulunamadı.')
member
Activity: 185
Merit: 15
Two things you should never abandon: Family & BTC

fffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd0364140 .. there are also invalid public keys. The reason is  there are pub keys that lie outside the curve. But i gotta agree that the mentioned pubs above are interesting, especially knowing that one of their addresses is a used one.
There is no such a thing as invalid private or public key, whatever private key you think is invalid or outside the range, I will prove you wrong if you just show it to me.

Deal! Prove me wrong, type this pvt key into the "view details" page in bitaddress.org and if you get an address out of it I'll send you 5 BTC:

fffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd0364142
member
Activity: 177
Merit: 14
i deleted it because i realized that no one would probably help me if you want to know what i said i have a high chance with the right people we could solve the next keys without kang or brute. if you can code send me your discord telegram anything if you want to try and help. its brought a lot of attention that i deleted my post but never got any while up? maybe that's why i took it down scared for someone to take what i know.

Can you re - post what you previously said? I didn't see it earlier. Maybe if you have a good idea about puzzle 66 we can then "try" to bruteforce it together.
jr. member
Activity: 32
Merit: 1
why was the last post of "Professor of wilds" here about puzzle #66 deleted? To the poster: please write again your proposal about the key search and the list you posted
i deleted it because i realized that no one would probably help me if you want to know what i said i have a high chance with the right people we could solve the next keys without kang or brute.

Change your setting to accept dm from newbie Im interested in your work and would like to help
newbie
Activity: 21
Merit: 0
why was the last post of "Professor of wilds" here about puzzle #66 deleted? To the poster: please write again your proposal about the key search and the list you posted
i deleted it because i realized that no one would probably help me if you want to know what i said i have a high chance with the right people we could solve the next keys without kang or brute. if you can code send me your discord telegram anything if you want to try and help. its brought a lot of attention that i deleted my post but never got any while up? maybe that's why i took it down scared for someone to take what i know.
jr. member
Activity: 54
Merit: 1
Dear @WanderingPhilospher please tell me what happened with stride in VanBitCracken, I have absolutely no idea how difficult this task is. But I hope that you will definitely be able to do it.
I have yet to figure it out. Therefore, I had to create my stride function with the help of python lol...python creates next stride; but this is not as fast as if it were built into the program.

program, python stride, program, python stride, etc.

How is it possible to achieve this through Python? Since VanBitCracken always starts counting from 1, so it is impossible to have a jump like stride. Could you provide me with an example, how to accomplish this using Python? Even if there is a difference in speed, the stride function should work.

Are you talking about VBCRandom.exe ?




hi, this also works for higher prefix than that for example for
Code:
13zb1hQbWVsc2S7
  ?


i think it's working


newbie
Activity: 74
Merit: 0
Dear @WanderingPhilospher please tell me what happened with stride in VanBitCracken, I have absolutely no idea how difficult this task is. But I hope that you will definitely be able to do it.
I have yet to figure it out. Therefore, I had to create my stride function with the help of python lol...python creates next stride; but this is not as fast as if it were built into the program.

program, python stride, program, python stride, etc.

How is it possible to achieve this through Python? Since VanBitCracken always starts counting from 1, so it is impossible to have a jump like stride. Could you provide me with an example, how to accomplish this using Python? Even if there is a difference in speed, the stride function should work.

Are you talking about VBCRandom.exe ?

https://pasteboard.co/2KNmMhxAigSN.bmp


hi, this also works for higher prefix than that for example for
Code:
13zb1hQbWVsc2S7
  ?
member
Activity: 177
Merit: 14
How many keys/s does the 4090 can do with vanitysearch or bitcrack?

About 1500 - 1800M per card
member
Activity: 177
Merit: 14

The strange public key which I'm sure has a solution to it, when I try to convert from compressed to uncompressed I get an error.

Code:
0400000000000000000000001dbc672b1fc4d076ca0a7ad5145686cb6b3cafce319f9cbcdfb95741014c1ee4c4d763f97f976c8deeb4e7017e03806508072ceef9

Code:
0300000000000000000000001dbc672b1fc4d076ca0a7ad5145686cb6b3cafce31

neither the uncompressed public key is valid nor the compressed one. Both pub keys are invalid and does not lie inside the curve
newbie
Activity: 3
Merit: 0
How many keys/s does the 4090 can do with vanitysearch or bitcrack?
copper member
Activity: 1330
Merit: 899
🖤😏

fffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd0364140 .. there are also invalid public keys. The reason is  there are pub keys that lie outside the curve. But i gotta agree that the mentioned pubs above are interesting, especially knowing that one of their addresses is a used one.
There is no such a thing as invalid private or public key, whatever private key you think is invalid or outside the range, I will prove you wrong if you just show it to me.

About the keys above, here are 2 private keys, one will open one of the above, I just changed the X on the original one it converted to it's mirror version.

Code:
7fffffffffffffffffffffffffffffff5d576e7357a4501ddfe92f46681b20a0

If you have seen the start range, end range for bitcoin keys, the above is the middle range.😉

The strange public key which I'm sure has a solution to it, when I try to convert from compressed to uncompressed I get an error.

Code:
0400000000000000000000001dbc672b1fc4d076ca0a7ad5145686cb6b3cafce319f9cbcdfb95741014c1ee4c4d763f97f976c8deeb4e7017e03806508072ceef9

Code:
0300000000000000000000001dbc672b1fc4d076ca0a7ad5145686cb6b3cafce31
member
Activity: 107
Merit: 61

Example of a strange public key:

Code:
0400000000000000000000003b78ce563f89a0ed9414f5aa28ad0d96d6795f9c633f3979bf72ae8202983dc989aec7f2ff2ed91bdd69ce02fc0700ca100e59ddf3

Code:
0400000000000000000000003b78ce563f89a0ed9414f5aa28ad0d96d6795f9c63c0c686408d517dfd67c2367651380d00d126e4229631fd03f8ff35eef1a61e3c



Just like there is invalid private keys, specifically those after the key fffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd0364140 .. there are also invalid public keys. The reason is  there are pub keys that lie outside the curve. But i gotta agree that the mentioned pubs above are interesting, especially knowing that one of their addresses is a used one. The only thing I'm not so fond of is the idea of.trying to figure out a mathematical formula to solve the puzzle. Sometimes it's possible to find a pattern in chaos, but most times you can't.


These are perfectly normal public keys that lie on a curve. Their private keys are 7fffffffffffffffffffffffffffffff5d576e7357a4501ddfe92f46681b20a0 and 7fffffffffffffffffffffffffffffff5d576e7357a4501ddfe92f46681b20a1
member
Activity: 185
Merit: 15
Two things you should never abandon: Family & BTC


Edit:
Example of a strange public key:

Code:
0400000000000000000000003b78ce563f89a0ed9414f5aa28ad0d96d6795f9c633f3979bf72ae8202983dc989aec7f2ff2ed91bdd69ce02fc0700ca100e59ddf3

Code:
0400000000000000000000003b78ce563f89a0ed9414f5aa28ad0d96d6795f9c63c0c686408d517dfd67c2367651380d00d126e4229631fd03f8ff35eef1a61e3c

Find their difference, also after that check 69 and 96 as hex, convert them to decimal and compare their values and difference in values, as I have said before this is an ocean, and somehow the designers of EC and the math involved either used magic to come up with these equations, or I am still unable to fathom  the infrastructure underneath them all, yet.  Do not rely on existing tools, if you can come up with new solutions, share them if they can not be used to endanger coins other than puzzle coins. Otherwise you should not reveal anything if it can be exploited to steal coins from people.


That's bullshit mate. These are freaking completely normal VALID public keys and have of course private keys that are connected to the them. There is nothing strange with them or what so ever....

Just because a public key has many zeros does not make it "weird" or "strange".


Here's a VALID private key with many zeros. Is it weird?

Code:
000000000000000000000000000000000ffff000000000001111111111100000

It's actually interesting to see public keys that follow this pattern. The keys produce the following addresses when they are uncompressed:

Code:

./calculatefrompublickey 0400000000000000000000003b78ce563f89a0ed9414f5aa28ad0d96d6795f9c633f3979bf72ae8202983dc989aec7f2ff2ed91bdd69ce02fc0700ca100e59ddf3
address 16qakrWzEAPvDsY1yMdCrkgAWZ6DxpTK4z

./calculatefrompublickey 0400000000000000000000003b78ce563f89a0ed9414f5aa28ad0d96d6795f9c63c0c686408d517dfd67c2367651380d00d126e4229631fd03f8ff35eef1a61e3c
address 14szHdohyNkdE3XdiwUw1wNmuBUamPBXiS


at compressed format they produce the following addresses (and they had an out transaction meaning they have a valid private key)

Code:

./calculatefrompublickey 0200000000000000000000003b78ce563f89a0ed9414f5aa28ad0d96d6795f9c63
address 13see6qjfupx1YWgRefwEkccZeM8QGTAiJ
./calculatefrompublickey 0300000000000000000000003b78ce563f89a0ed9414f5aa28ad0d96d6795f9c63
address 1LVAsnUyEtJgZ9HzLfbtiJZuZMzHLX1n6k




Just like there is invalid private keys, specifically those after the key fffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd0364140 .. there are also invalid public keys. The reason is  there are pub keys that lie outside the curve. But i gotta agree that the mentioned pubs above are interesting, especially knowing that one of their addresses is a used one. The only thing I'm not so fond of is the idea of.trying to figure out a mathematical formula to solve the puzzle. Sometimes it's possible to find a pattern in chaos, but most times you can't.

 It feels weird for me to say that especially that i believe numbers are the solution to everything and the base behind the universe existence. I once was joking saying to my cousin that God is Math! Lol.

Problem with big numbers like the ones we're dealing with right now is it's bigger than human imagination. The lowest number of keys we're going after here is #66 which evaluates to 36.8 Million Trillions. And according to WanderingPhilosopher's calculations, the lowest number here is #125, using kangaroo, this number has gotten smaller: 2^63.05 .. if we manage to solve any of these two puzzles, we will literally make history.
newbie
Activity: 24
Merit: 4


Edit:
Example of a strange public key:

Code:
0400000000000000000000003b78ce563f89a0ed9414f5aa28ad0d96d6795f9c633f3979bf72ae8202983dc989aec7f2ff2ed91bdd69ce02fc0700ca100e59ddf3

Code:
0400000000000000000000003b78ce563f89a0ed9414f5aa28ad0d96d6795f9c63c0c686408d517dfd67c2367651380d00d126e4229631fd03f8ff35eef1a61e3c

Find their difference, also after that check 69 and 96 as hex, convert them to decimal and compare their values and difference in values, as I have said before this is an ocean, and somehow the designers of EC and the math involved either used magic to come up with these equations, or I am still unable to fathom  the infrastructure underneath them all, yet.  Do not rely on existing tools, if you can come up with new solutions, share them if they can not be used to endanger coins other than puzzle coins. Otherwise you should not reveal anything if it can be exploited to steal coins from people.


That's bullshit mate. These are freaking completely normal VALID public keys and have of course private keys that are connected to the them. There is nothing strange with them or what so ever....

Just because a public key has many zeros does not make it "weird" or "strange".


Here's a VALID private key with many zeros. Is it weird?

Code:
000000000000000000000000000000000ffff000000000001111111111100000

It's actually interesting to see public keys that follow this pattern. The keys produce the following addresses when they are uncompressed:

Code:

./calculatefrompublickey 0400000000000000000000003b78ce563f89a0ed9414f5aa28ad0d96d6795f9c633f3979bf72ae8202983dc989aec7f2ff2ed91bdd69ce02fc0700ca100e59ddf3
address 16qakrWzEAPvDsY1yMdCrkgAWZ6DxpTK4z

./calculatefrompublickey 0400000000000000000000003b78ce563f89a0ed9414f5aa28ad0d96d6795f9c63c0c686408d517dfd67c2367651380d00d126e4229631fd03f8ff35eef1a61e3c
address 14szHdohyNkdE3XdiwUw1wNmuBUamPBXiS


at compressed format they produce the following addresses (and they had an out transaction meaning they have a valid private key)

Code:

./calculatefrompublickey 0200000000000000000000003b78ce563f89a0ed9414f5aa28ad0d96d6795f9c63
address 13see6qjfupx1YWgRefwEkccZeM8QGTAiJ
./calculatefrompublickey 0300000000000000000000003b78ce563f89a0ed9414f5aa28ad0d96d6795f9c63
address 1LVAsnUyEtJgZ9HzLfbtiJZuZMzHLX1n6k


member
Activity: 177
Merit: 14


Edit:
Example of a strange public key:

Code:
0400000000000000000000003b78ce563f89a0ed9414f5aa28ad0d96d6795f9c633f3979bf72ae8202983dc989aec7f2ff2ed91bdd69ce02fc0700ca100e59ddf3

Code:
0400000000000000000000003b78ce563f89a0ed9414f5aa28ad0d96d6795f9c63c0c686408d517dfd67c2367651380d00d126e4229631fd03f8ff35eef1a61e3c

Find their difference, also after that check 69 and 96 as hex, convert them to decimal and compare their values and difference in values, as I have said before this is an ocean, and somehow the designers of EC and the math involved either used magic to come up with these equations, or I am still unable to fathom  the infrastructure underneath them all, yet.  Do not rely on existing tools, if you can come up with new solutions, share them if they can not be used to endanger coins other than puzzle coins. Otherwise you should not reveal anything if it can be exploited to steal coins from people.


That's bullshit mate. These are freaking completely normal VALID public keys and have of course private keys that are connected to the them. There is nothing strange with them or what so ever....

Just because a public key has many zeros does not make it "weird" or "strange".


Here's a VALID private key with many zeros. Is it weird?

Code:
000000000000000000000000000000000ffff000000000001111111111100000
copper member
Activity: 1330
Merit: 899
🖤😏

Problem is not with full addresses, the problem is with vanity engine searching for prefixes, when we input 7-10 characters to find a match, it has to perform a double hash which according to Evillo's benchmarking, a double hash takes around 5% of the whole speed, while 5% might be a fraction of hundreds of MK/s for some, but imagine those running with 1MK/s, your tiny 5% is equal to 50 people with 1MK/s, given you only have one card with a speed of 1000MK/s.

However those discussions are irrelevant now because brute force is not the answer, what we need to focus on is finding mathematical shortcuts which I believe already exist, we haven't looked hard enough yet.

One possible method I can think of is multiplying public keys, I don't know how is it possible to multiply a key with another key while their combined values goes beyond the range if EC.

My guess is that, they go round the curve circling around forever, which brings me to using a tool like keyhunt, something to use very large strides searching for collisions.

I don't know if you guys are aware of this, almost 50% of public keys share the same X, with a reversed Y value, but the counterpart resides on the other side of the curve, and I think I have found a public key which in uncompressed mode works fine but converting the compressed key to uncompressed key does not work. There are some strange public keys starting with 30 up to 40 zeros, which again baffles my mind about the possibility of such keys existing. Lol

Edit:
Example of a strange public key:

Code:
0400000000000000000000003b78ce563f89a0ed9414f5aa28ad0d96d6795f9c633f3979bf72ae8202983dc989aec7f2ff2ed91bdd69ce02fc0700ca100e59ddf3

Code:
0400000000000000000000003b78ce563f89a0ed9414f5aa28ad0d96d6795f9c63c0c686408d517dfd67c2367651380d00d126e4229631fd03f8ff35eef1a61e3c

Find their difference, also after that check 69 and 96 as hex, convert them to decimal and compare their values and difference in values, as I have said before this is an ocean, and somehow the designers of EC and the math involved either used magic to come up with these equations, or I am still unable to fathom  the infrastructure underneath them all, yet.  Do not rely on existing tools, if you can come up with new solutions, share them if they can not be used to endanger coins other than puzzle coins. Otherwise you should not reveal anything if it can be exploited to steal coins from people.
Jump to: