Pages:
Author

Topic: Bitcoin puzzle transaction ~32 BTC prize to who solves it - page 26. (Read 192344 times)

newbie
Activity: 3
Merit: 0
Can anyone please be so kind and explain to me what it means that some public keys from this puzzle (like task 130 but not task 66 for example) have been found which makes kangaroo and keyhunt with bsgs mode possible?

I thought we know public addresses as they hold the reward and the task is to find the suitable public key from a reduced key range. So what does it mean that the public key for task 130 is known and is 03633cbe3ec02b9401c5effa144c5b4d22f87940259634858fc7e59b1c09937852? I literally don't understand this.

Thank you
member
Activity: 316
Merit: 34
I tried JLP's Kangaroo on puzzle 65. It found the privat key in 28 seconds !  

Can you share the exact command?
Today it found it in 46 seconds. It's probably possible to do this in 1 second or much faster than 46 seconds. If somebody knows exactly how please let me know.


Better to focus unsolved keys
Try 66 with Bitcrack2
jr. member
Activity: 43
Merit: 1
I tried JLP's Kangaroo on puzzle 65. It found the privat key in 28 seconds !  

Can you share the exact command?
Today it found it in 46 seconds. It's probably possible to do this in 1 second or much faster than 46 seconds. If somebody knows exactly how please let me know.

jr. member
Activity: 50
Merit: 1
Hi..Digaran..Meet you after a long time..How are you..Lol

I also have this suspicion about that user and other users, a lot of newbie accounts recently came up to this topic, all of them writing non-senses


the probleme is not there, the probleme is we didint see digran reply from a long time, so you know the conclusion now xd we need mod here to check their ip and ban those users,



full member
Activity: 244
Merit: 126
I tried JLP's Kangaroo on puzzle 65. It found the privat key in 28 seconds ! 

Can you share the exact command?
jr. member
Activity: 43
Merit: 1
Is JLP's Kangaroo program used for puzzle 130, which is original and published on github? Yes or no ?

Some said you can use it because the range width is 125 bits. Some have said that the original version of JLP has 130 puzzles and you cannot use it for more comprehensive puzzles.

Which one is right ?


What I'm talking about is the 130 bit range width, that is, if there is more than a 125 bit gap between the start and end, does the program work?
I tried JLP's Kangaroo on puzzle 65. It found the privat key in 28 seconds ! 
member
Activity: 286
Merit: 15
- clear CMOS / flash UEFI or BIOS

Someone in Russian intelligence is about to have an abrupt meeting with an open window.  Grin

Another step is missing here. Clean bios with me_cleaner


https://github.com/corna/me_cleaner


Here is a demo of how to hack even the power-off computer via IME


https://youtu.be/9fhNokIgBMU
newbie
Activity: 33
Merit: 0
If you dont trust it, just dont use it. NEVER use any exe you didnt compile

Better yet:
- review the source code line by line, if anything seems suspicious or don't understand it, it's likely a threat on so many levels;
- review the compiler, check all SHA signatures for all downloaded and installed packages (use https to get sigs from authors, verify certificates, compare against results on another computer which you never touched)
- dump Windows. You may have viruses already which you never knew about, or ever will.
- clear CMOS / flash UEFI or BIOS and make sure secure boot is on and  that you never signed insecure kernel modules to load at boot time

Lastly:
- make sure you protect against RF attacks (keystrokes and such can travel a long way in the EM field). Use a mechanical keyboard and a CRT monitor (not a digital display, pixels can be trapped with a correctly tuned analog-to-digital converter and some decoding software)
- for maximal anti-virus protection you need to also disconnect from the internet, run all software on VMs.

Compile everything from scratch.

Oh! This boy will never do it without a condom! Grin
member
Activity: 76
Merit: 16
hi... new here. apologies for entering the gates with suspicions but merely curious what these means, if anything important.
If you dont trust it, just dont use it. NEVER use any exe you didnt compile

Better yet:
- review the source code line by line, if anything seems suspicious or don't understand it, it's likely a threat on so many levels;
- review the compiler, check all SHA signatures for all downloaded and installed packages (use https to get sigs from authors, verify certificates, compare against results on another computer which you never touched)
- dump Windows. You may have viruses already which you never knew about, or ever will.
- clear CMOS / flash UEFI or BIOS and make sure secure boot is on and  that you never signed insecure kernel modules to load at boot time

Lastly:
- make sure you protect against RF attacks (keystrokes and such can travel a long way in the EM field). Use a mechanical keyboard and a CRT monitor (not a digital display, pixels can be trapped with a correctly tuned analog-to-digital converter and some decoding software)
- for maximal anti-virus protection you need to also disconnect from the internet, run all software on VMs.

Compile everything from scratch.
jr. member
Activity: 74
Merit: 4
hi... new here. apologies for entering the gates with suspicions but merely curious what these means, if anything important. I have followed along for a bit now and recognize many geniuses in here that know more than I in this realm.. so I understand the first response will be "If you dont trust it, just dont use it" and the second will be "NEVER use any exe you didnt compile"... Got it.

Now, I uploaded brichard19's cuBitcrack.exe into this site virustotal.com and also Iceland2k14's close source file from his bsgs 'ice_secp256k1.dll'... is it normal to have 'Contacted IP traffic' for these types of things and also are these Execution Parents actually part of the dll file? Alas, BSGS Cuda by Etasyon. My PC through up every red flag and refused for me to allow it to be on my machine.. virustotal showing IP Traffic of some sort...

https://www.virustotal.com/gui/file/0eecdbfabaaef36f497e944a6ceb468d01824f3ae6457b4ae4b3ac8e95eebb55/relations
https://www.virustotal.com/gui/file/fcc1fa47a3f7aabfd2b7772b86987b699d5741584a6312743cf2778e01894ab1/relations
https://www.virustotal.com/gui/file/292d7c84618df3be1179aabbc599ead21c7ad00dfc5222dc2fc6ff44676f891f/behavior

Silly, I see i cant post pics here so the links will have to suffice for reference.
They are false positives. If you are using Windows just block their ability to send and receive to and from the internet they should still work, most of the anti-viruses will give some kind of warning on mining software even though these are not considered mining software. I have been using each on and off for years with no issues
newbie
Activity: 1
Merit: 0
hi... new here. apologies for entering the gates with suspicions but merely curious what these means, if anything important. I have followed along for a bit now and recognize many geniuses in here that know more than I in this realm.. so I understand the first response will be "If you dont trust it, just dont use it" and the second will be "NEVER use any exe you didnt compile"... Got it.

Now, I uploaded brichard19's cuBitcrack.exe into this site virustotal.com and also Iceland2k14's close source file from his bsgs 'ice_secp256k1.dll'... is it normal to have 'Contacted IP traffic' for these types of things and also are these Execution Parents actually part of the dll file? Alas, BSGS Cuda by Etasyon. My PC through up every red flag and refused for me to allow it to be on my machine.. virustotal showing IP Traffic of some sort...

https://www.virustotal.com/gui/file/0eecdbfabaaef36f497e944a6ceb468d01824f3ae6457b4ae4b3ac8e95eebb55/relations
https://www.virustotal.com/gui/file/fcc1fa47a3f7aabfd2b7772b86987b699d5741584a6312743cf2778e01894ab1/relations
https://www.virustotal.com/gui/file/292d7c84618df3be1179aabbc599ead21c7ad00dfc5222dc2fc6ff44676f891f/behavior

Silly, I see i cant post pics here so the links will have to suffice for reference.
hero member
Activity: 862
Merit: 662
What I'm talking about is the 130 bit range width, that is, if there is more than a 125 bit gap between the start and end, does the program work?

Somobody already reply you

jean luc kangaroo just added to his github's readme.


#130, 129bits private key [2119,2120-1], [1Fo65aKq8s8iquMt6weF1rku1moWVEd5Ua](https://www.blockchain.com/explorer/addresses/btc/1Fo65aKq8s8iquMt6weF1rku1moWVEd5Ua) **13.0BTC**

Expected time: several years on 256 Tesla V100 (Not possible with this program without modification)
damn
jr. member
Activity: 37
Merit: 1
34Sf4DnMt3z6XKKoWmZRw2nGyfGkDgNJZZ
Is JLP's Kangaroo program used for puzzle 130, which is original and published on github? Yes or no ?

Some said you can use it because the range width is 125 bits. Some have said that the original version of JLP has 130 puzzles and you cannot use it for more comprehensive puzzles.

Which one is right ?


What I'm talking about is the 130 bit range width, that is, if there is more than a 125 bit gap between the start and end, does the program work?
hero member
Activity: 862
Merit: 662
Hi..Digaran..Meet you after a long time..How are you..Lol

I also have this suspicion about that user and other users, a lot of newbie accounts recently came up to this topic, all of them writing non-senses
member
Activity: 260
Merit: 19
the right steps towerds the goal
What if I can open all of them at once? Would that not overwhelm the miners? They can't be watching all of them.

What if I just sweep all of them at the same time? What if I know how to generate all of them, the same way he did? Where I have all of them, all at once? What then? It's like being frozen and unable to walk from the casino to the parking lot just to get back to your car after everyone around you heard you won... How do you get back to your car safely?

I need help and I don't know where to find it...

It's been 3 days now and I still can't come up with a safe way to get back to the mother fucking car...

~K¹


(Does anyone live in Southeast Missouri? I will meet you, pay you, to get this over with. We all know how much is here, you can have 40%.)

Hi..Digaran..Meet you after a long time..How are you..Lol
member
Activity: 316
Merit: 34
in short, you have puzzle 66 key, and afraid to create tx ?

Who knows how many of them here are with a key  Grin
And watching each n every post day n night like the Dog, for how to create safe n secure tx Smiley
member
Activity: 286
Merit: 15
in short, you have puzzle 66 key, and afraid to create tx ?

Who knows how many of them here are with a key  Grin
member
Activity: 316
Merit: 34
What if I can open all of them at once? Would that not overwhelm the miners? They can't be watching all of them.

What if I just sweep all of them at the same time? What if I know how to generate all of them, the same way he did? Where I have all of them, all at once? What then? It's like being frozen and unable to walk from the casino to the parking lot just to get back to your car after everyone around you heard you won... How do you get back to your car safely?

I need help and I don't know where to find it...

It's been 3 days now and I still can't come up with a safe way to get back to the mother fucking car...

~K¹


(Does anyone live in Southeast Missouri? I will meet you, pay you, to get this over with. We all know how much is here, you can have 40%.)

I think you don't understand what the "problem" is here. What happens here is what the bitcoin protocol is expected to do. What is not expected is that someone can obtain a private key that "does not" belong to them, and that can only happen with the certainty of a certain proximity as occurs in the case of low bit puzzles.

9 bit - 256 bit ... they're all the same as far as I'm concerned. Only difference here is that it looks like it's considered "acceptable" for one to take what's in the addresses that are provided for themselves, instead of it being considered theft if it were to come from any other address. The addresses that aren't included in this "puzzle" however, belong to individuals that aren't participating in any of this... So obviously that's not an ethical option, we get that. But here, here is different. The only thing keeping these addresses from being swept is the fact there remains the potential for the "reward" to be ripped out from under you... So, as I said, it's now been 4 days... And I still can't come up with a safe way to get back to the mother fucking car...

in short, you have puzzle 66 key, and afraid to create tx ?
member
Activity: 286
Merit: 15
jean luc kangaroo just added to his github's readme.


#130, 129bits private key [2119,2120-1], [1Fo65aKq8s8iquMt6weF1rku1moWVEd5Ua](https://www.blockchain.com/explorer/addresses/btc/1Fo65aKq8s8iquMt6weF1rku1moWVEd5Ua) **13.0BTC**

Expected time: several years on 256 Tesla V100 (Not possible with this program without modification)
damn


 
This is Blackwell Grin
newbie
Activity: 2
Merit: 0
What if I can open all of them at once? Would that not overwhelm the miners? They can't be watching all of them.

What if I just sweep all of them at the same time? What if I know how to generate all of them, the same way he did? Where I have all of them, all at once? What then? It's like being frozen and unable to walk from the casino to the parking lot just to get back to your car after everyone around you heard you won... How do you get back to your car safely?

I need help and I don't know where to find it...

It's been 3 days now and I still can't come up with a safe way to get back to the mother fucking car...

~K¹


(Does anyone live in Southeast Missouri? I will meet you, pay you, to get this over with. We all know how much is here, you can have 40%.)

I think you don't understand what the "problem" is here. What happens here is what the bitcoin protocol is expected to do. What is not expected is that someone can obtain a private key that "does not" belong to them, and that can only happen with the certainty of a certain proximity as occurs in the case of low bit puzzles.

9 bit - 256 bit ... they're all the same as far as I'm concerned. Only difference here is that it looks like it's considered "acceptable" for one to take what's in the addresses that are provided for themselves, instead of it being considered theft if it were to come from any other address. The addresses that aren't included in this "puzzle" however, belong to individuals that aren't participating in any of this... So obviously that's not an ethical option, we get that. But here, here is different. The only thing keeping these addresses from being swept is the fact there remains the potential for the "reward" to be ripped out from under you... So, as I said, it's now been 4 days... And I still can't come up with a safe way to get back to the mother fucking car...
Pages:
Jump to: