Author

Topic: Bitcoin puzzle transaction ~32 BTC prize to who solves it - page 274. (Read 229433 times)

jr. member
Activity: 119
Merit: 1
Hi  ttdclient !

Do I understand correctly ? :

1 - this is designed to search for only one address #64 - 16jY7qLJnxb7CHZyqBP8qca9d51gAjyXQN

2 - the computer must be connected to the Internet all this time

Why did you specify the range of keyspace 8000000 - FFFFFFF after all, according to preliminary calculations, the address #64 - 16jY7qLJnxb7CHZyqBP8qca9d51gAjyXQN should be located in the keyspace range 8000000000000000- FFFFFFFFFFFFFFFFF  ?
jr. member
Activity: 34
Merit: 11
I have created a pool of sorts to collectively solve bit 64 of this challenge.

if you goto http://www.ttdsales.com/64bit/

create an account and you will get access to the user and stats page.  From there you can download the client software. 

It works with bitcrack and the server to hand out work and keep track of what has been checked.

Each range work load is 000000000 - FFFFFFFFF or 68,719,476,735 keys.  I selected this range because it does not complete to quickly on top hardware and is still easily completed in less then an hour with slower GPUs.

8000000 - FFFFFFF is generated by the server randomly.  There is a btc address I have generated for all 134,217,728 ranges in the DB.  The private key for these addresses are used as proof of work for the range work loads.  When the client software finishes a range and submits this proof the DB marks that range as checked and dispenses another.  Before being dispensed the range is checked against the DB to ensure it hasn't already been checked. What I am calling a random collision.

All work completed is kept track of for each user and displayed on your user stats page.

If/when we find the solution the bitcoin stored in 16jY7qLJnxb7CHZyqBP8qca9d51gAjyXQN will be split between the contributing users equally according to work completed just like a bitcoin mining pool would for a mined block.  This percentage is displayed on your stats page.

Please check it out and pm me with any thoughts comments questions or ideas for improvements.

It is a work in progress but seems to be functioning nicely for my 6 machines that have been running on it for a couple of weeks now.  Currently running ~1.37 Billion Keys /s.
newbie
Activity: 5
Merit: 0
Drotika scammer!
he sells this script
https://github.com/beranm14/pollard_rho

https://github.com/Antonkee/Pollard-Rho-kangaroo scammer too, after purchase on satoshidisk you will receive an archive with a password that you do not know!

from me you never bought anything
and that is not me !! Embarrassed Embarrassed


brainless:
I'm not following this thread sorry
https://bitcointalksearch.org/topic/m.52403794
bit75
03a407ff62f7943a48eb34df67e4fb5c50e963ab4c83ae26a7c7af1fa5dec7e6a5
show PK

75Bit 1hour  14secuds hour !

HEX: 6dd7cce5efdaccf6808
WIF:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi42grBwCW3qWwy6Qqm4oMx
Address:17mDwa7RQnszsbKxk3xe3nya3N4LLvJdFD
Pubkey:03a407ff62f7943a48eb34df67e4fb5c50e963ab4c83ae26a7c7af1fa5dec7e6a5

There are very clever programmers here I see
Telariust, Fe57  Grat





Yes, you are scammer, selling fake scripts. Do not buy from this scammer.
Lets talk about proofs, here is pub key 75bit 036cd3a64147d167f30bab1b88b887744e48ca4ed0187950393682897b88afa31e
show PK, as i see you could solve it in about 1 hour
full member
Activity: 706
Merit: 111
Hi,

All below addresses were emptied this year. Most of them in Sept. 2019. Around 2982 BTC in 21 addresses.
All addresses were first used in 2011, and dormant until now.
BCH is still there except 1 address.

No spending transactions on them so the public key was not known.
The owner he suddenly remembered after 8 years that he had some BTC?

12CpK8apTJfaMSiPYhGMDdaRRFYoS721Px
13GUJutC6GKgJQTcGzCtznDDYFQKVJFVwp
13Sa73PU9Ar5sE4SdFcBdbg9ntbNcMQhaA
14k4GhqA1svNZPbssdAjgdnfzWTpAigZVH
14nppk7sMVv91n1Nch6DQKaFto3wVmh8yT
16KVwFVDfU3DKrvnGGSM7hsGp3MnvHczuB
17tXBRCQzQz87zYetp3wwJRms4fcWN4a8v
18ws2qaW2xBRWGCmfjnDiDHa55A5iSJogP
18xEu7DB8u58ivNa3VwEFeEc4ZbjtMVtPD
19w2MURRz5LsjNHCckmp65YX4WCc7kJdJF
1APGxVLKXhXepeaAjV6z3s4d7xCYXXDwmj
1Aw7mXtLMDjTBNcaqjv6cT935BEQQr5vRF
1B3m4F831f9u6ySnpYbUwgriJAgS3tuso5
1BpqxJp2LEban4mJou5rDHYmzA9eTwKbXY
1CbvcQXEYrqXqbBczHL8to3xeVZ3EsgrhH
1DKwr32h5F6uuUmePdT7esZ21AfK7ovASK
1FRtwC64bWcMb7RGBcwLJTup6tYrCMs9ge
1HQT2UZEK4i3yHnYbVTaXNccgnM45th94f
1MtUY5R3xixWfthqrprVPWMMTwR5A7GU2x
1nYrmtXVjX9G3Q86tdKcKQRCq2MPVvNp9

What are your opinions?

Maybe someone solved a puzzle.

Re: Bitcoin treasure https://bitcointalksearch.org/topic/bitcoin-treasure-5146858
1W7yh46qNUqw3RhyWzRVHjuJnHWpQqy7W
13AJqcp7GJRmAEePJqZHJCZLsXPSZuPzn9
13DCZ3sj6gVFVymdTd1mjz3BZZ5g1CQgbr
15JiPJoFoqoBTMcGDWahv5CjxYgdt1msDM
16kG6iyB3oGchcxXJccjjSmtdqBeRsDgio
17RsqLeP4XVT95htFoT9iWu7C4vAZw2FoW
19g8gf31otseCiYcdXPBh2qGEjrpEpqaoe
1A1hm4i1NbGLDFjp6sRMC6NoxZdQeSfD36
1BNVEnRmCbdP5QbuPySTHkznoSMMnkbvG6
1CFjxrYr8PkZoLgnHoAy1pRvg1WwvhuPVL
1DJfq3Nw1xjrrBVHGT3V1ZGxPBHVnJfivC
1EYyYeWSKGriPUK8juC9ubDQzKQUEpJfe7
1GTEootnGUPVw1M77QAQgm32iV7vq2aKJL
1GsaJu5LxJWKJumfiYmmJx28czQ11fXaeK
1Hcbg5k8kbmzcih3Xbzob9RhDZ3QcyfY3i
1JugDKUGpcKztsEfJroMESH92VA134sLSL
1L8YfeDDdY12mcM8j7XmoXGNsv5a8JoMVh
1Li8RFUotXHJPNazCM8HAfnkxKcrKXXpiH
1N1rBm39bTiLyXnW7jkQxxnfBmHC4SZdMV
1NUoeQnBB9QeAigU4r8iApsd4b4iiRpN6V


Why post this...its pointless to post this on this thread.
jr. member
Activity: 119
Merit: 1
sr. member
Activity: 443
Merit: 350
And how you know for sure that those public keys was in the 170 bit range? How to tell what range what a public key is in?

These pubkeys are interesting. All of them coresponds to uncompressed addresses, and for example the first 3 of them are:
13GUJutC6GKgJQTcGzCtznDDYFQKVJFVwp
13Sa73PU9Ar5sE4SdFcBdbg9ntbNcMQhaA
14k4GhqA1svNZPbssdAjgdnfzWTpAigZVH

The input transactions to them were in May 2011, and released only this year in September 2019 (amounts 147BTC, 122BTC and 147BTC).

But why drotika combined these pubkeys saying that they are 170bit?
newbie
Activity: 10
Merit: 6

20 addresses emptied in one month is not luck
https://iancoleman.io/bitcoin-key-compression/
full member
Activity: 706
Merit: 111


And how you know for sure that those public keys was in the 170 bit range? How to tell what range a public key is in?
sr. member
Activity: 443
Merit: 350

What is this? And what is your reason of such message here?
newbie
Activity: 10
Merit: 6
full member
Activity: 431
Merit: 105
I did forget about this. Now I have some features to add to my slow code.


Hi there cryptohazard, you sharing the code. with the features, maybe.
newbie
Activity: 5
Merit: 1
I did forget about this. Now I have some features to add to my slow code.
member
Activity: 174
Merit: 12
Does it work only under INTEL i5-2540 and higher? Will it not work under AMD?

It works for me on AMD Ryzen 7 2700
jr. member
Activity: 119
Merit: 1
Hi!! Is it easier to break an address with the public key? could you explain to me which method?

I need public key for non find number .. 64, 66 etc Grin nobody help my?
Of course, it's easier. You know the points x and y. You need to find the multiplier (the desired private key) from the generator point, that is, from key 1.

Is there any software for this?

Yes it is a Pollard Kangaroo Python script.

Does it work only under INTEL i5-2540 and higher? Will it not work under AMD?
Perhaps there is a compiled software in exe option  -  Such as clBitCrack.exe ?
jr. member
Activity: 114
Merit: 5
Hi!! Is it easier to break an address with the public key? could you explain to me which method?

I need public key for non find number .. 64, 66 etc Grin nobody help my?
Of course, it's easier. You know the points x and y. You need to find the multiplier (the desired private key) from the generator point, that is, from key 1.

Is there any software for this?

Yes it is a Pollard Kangaroo Python script.
full member
Activity: 706
Merit: 111
Public key for #110 = 0309976ba5570966bf889196b7fdf5a0f9a1e9ab340556ec29f8bb60599616167d
Public key for #115 = 0248d313b0398d4923cdca73b8cfa6532b91b96703902fc8b32fd438a3b7cd7f55
Public key for #120 = 02ceb6cbbcdbdf5ef7150682150f4ce2c6f4807b349827dcdbdd1f2efa885a2630
Public key for #125 = 0233709eb11e0d4439a729f21c2c443dedb727528229713f0065721ba8fa46f00e
Public key for #130 = 03633cbe3ec02b9401c5effa144c5b4d22f87940259634858fc7e59b1c09937852
Public key for #135 = 02145d2611c823a396ef6712ce0f712f09b9b4f3135e3e0aa3230fb9b6d08d1e16
Public key for #140 = 031f6a332d3c5c4f2de2378c012f429cd109ba07d69690c6c701b6bb87860d6640
Public key for #145 = 03afdda497369e219a2c1c369954a930e4d3740968e5e4352475bcffce3140dae5
Public key for #150 = 03137807790ea7dc6e97901c2bc87411f45ed74a5629315c4e4b03a0a102250c49
Public key for #155 = 035cd1854cae45391ca4ec428cc7e6c7d9984424b954209a8eea197b9e364c05f6
Public key for #160 = 02e0a8b039282faf6fe0fd769cfbc4b6b4cf8758ba68220eac420e32b91ddfa673
jr. member
Activity: 119
Merit: 1
Hi!! Is it easier to break an address with the public key? could you explain to me which method?

I need public key for non find number .. 64, 66 etc Grin nobody help my?
Of course, it's easier. You know the points x and y. You need to find the multiplier (the desired private key) from the generator point, that is, from key 1.

Is there any software for this?
jr. member
Activity: 37
Merit: 1
Hi!! Is it easier to break an address with the public key? could you explain to me which method?

I need public key for non find number .. 64, 66 etc Grin nobody help my?
Of course, it's easier. You know the points x and y. You need to find the multiplier (the desired private key) from the generator point, that is, from key 1.
newbie
Activity: 37
Merit: 0
Hi!! Is it easier to break an address with the public key? could you explain to me which method?

I need public key for non find number .. 64, 66 etc Grin nobody help my?
member
Activity: 330
Merit: 34
I need public key for non find number .. 64, 66 etc Grin nobody help my?
wait few month, soon some one will find and will post here Smiley
Jump to: