Pages:
Author

Topic: Bitcoin puzzle transaction ~32 BTC prize to who solves it - page 3. (Read 246030 times)

newbie
Activity: 68
Merit: 0
Hello everyone, I am completely new here. Suppose that I found the solution to puzzle 67 last night. How should I proceed now to ensure that no one can misappropriate the coins through the disclosure of the public key?

The only thing that is real is,

1- Your first message, I found the wallet. How do I transfer it? Wink
2- You share SHA256. (Fake)
3- You are a real LIAR. Smiley)

What did you gain as a result?
member
Activity: 165
Merit: 26
Hello everyone, I am completely new here. Suppose that I found the solution to puzzle 67 last night. How should I proceed now to ensure that no one can misappropriate the coins through the disclosure of the public key?

Post the SHA256 hash of the compressed public key, so you can prove you found the solution without disclosing either the private or the public key. If you don't have the public key, all I can say is that you had a nice dream last night.
member
Activity: 348
Merit: 34
puzzle 135 ,140,145,150,155 and 160 will be sent to
this address: bc1qqq7mmrt8hwk9gkamtkz22kpskvxdgl64rn72pl
I am the solver,
Create a sign message with above your statement
newbie
Activity: 23
Merit: 0
Hello everyone, I am completely new here. Suppose that I found the solution to puzzle 67 last night. How should I proceed now to ensure that no one can misappropriate the coins through the disclosure of the public key?
create a signed offline transaction and trust the mara service
?
Activity: -
Merit: -
Hello everyone, I am completely new here. Suppose that I found the solution to puzzle 67 last night. How should I proceed now to ensure that no one can misappropriate the coins through the disclosure of the public key?
newbie
Activity: 0
Merit: 0
puzzle 135 ,140,145,150,155 and 160 will be sent to
this address: bc1qqq7mmrt8hwk9gkamtkz22kpskvxdgl64rn72pl
I am the solver,
newbie
Activity: 5
Merit: 0
visually if you only just stare at the puzzle for some minutes, it just can sometimes look like a pattern exists.  many others have commented about it on this thread in the earlier pages but it is just misleading to actually think that a real pattern exists.  what i was actually trying to say.  like i just find it fascinating how it looks that way even with some of the past solved puzzles but then when you start writing the code yourself and trying different things, you begin to quickly realize that it really only comes down to brute force searching and alot of waiting or good luck.
member
Activity: 348
Merit: 34
Bitcoin just hit 100k again. Time for some ChatGPT + Python + Crackpot theories and the enduring acceptance of defeat as I cook my ramen noodles.


This made me laugh, sounds about right though.   The struggle of the bitcoin puzzles summed up in a few short words.   I do think that some patterns exist in the puzzles but being able to use it in code is an entirely different story and it probably wont really help much because the search space is just too large.
Since the creator said it has no pattern, it doesnt make sense to exist a pattern in a puzzle created out of ramdomness in a determined range.
Sorry to say
Creator did not say you will find pubkey by kangaroo in puzzle
Creator did not say try brute force for early addresses in puzzle
Creator did not say he used seeds to generate dermenistic  wallet for each bit range
Creator did not say he used pure random generator addresses
Etc
Question is what you design develop for find puzzle
You can design seeds, pattern, logics , formula etc
Link pic describe well about this
https://i.ibb.co/WxtfkZT/profit-bitcoin.jpg
?
Activity: -
Merit: -
Bitcoin just hit 100k again. Time for some ChatGPT + Python + Crackpot theories and the enduring acceptance of defeat as I cook my ramen noodles.


This made me laugh, sounds about right though.   The struggle of the bitcoin puzzles summed up in a few short words.   I do think that some patterns exist in the puzzles but being able to use it in code is an entirely different story and it probably wont really help much because the search space is just too large.
Since the creator said it has no pattern, it doesnt make sense to exist a pattern in a puzzle created out of ramdomness in a determined range.
newbie
Activity: 5
Merit: 0
Bitcoin just hit 100k again. Time for some ChatGPT + Python + Crackpot theories and the enduring acceptance of defeat as I cook my ramen noodles.


This made me laugh, sounds about right though.   The struggle of the bitcoin puzzles summed up in a few short words.   I do think that some patterns exist in the puzzles but being able to use it in code is an entirely different story and it probably wont really help much because the search space is just too large.
?
Activity: -
Merit: -
 VanitySearch VanitySearch does not have an option for 67 bit 68 etc. it only generates 256 bit private keys. Does anyone know the version that uses smaller bits in searches? I want 67 bit
newbie
Activity: 68
Merit: 0
Hi, I just got started. I just have a question. What program does he use to save when, for example, the first 5 characters are the same?

You can use VanitySearch and Bitcrack.
?
Activity: -
Merit: -
Hi, I just got started. I just have a question. What program does he use to save when, for example, the first 5 characters are the same?
newbie
Activity: 68
Merit: 0

write me a PM or open access..


I opened it but yours is closed. I couldn't write.




Statistics and probability are extremely counterintuitive, and have historically confused even the best mathematicians. I hope you find what you are looking for!


Thanks man, I hope everyone succeeds. For everyone's sake.

[moderator's note: consecutive posts merged]
?
Activity: -
Merit: -
Looking for more information about puzzle 66 transaction issue and how to prevent such situation. What does it mean for us, which puzzles are still secure from such outcome?
For how long a transaction can be blocked by the processing party?


I guess it's still mostly speculation of what exactly has happened to puzzle 66.
But in short, let's assume you got really really lucky, and manage to find the private key of puzzle 67, convert the hex private key to wif, login via Electron and start a spending transaction.
As soon as there is a confirmation on the blockchain, the corresponding public key of said wallet is exposed to the public and it's not really hard to write a bot which checks the latest transaction history from any wallet.
That means, if some bot manages to get the public key in time, bruteforcing the private key via bsgs or kangaroo algorithm is not very hard and on any modern gpu would not take longer than a couple of seconds to minutes.
So any stealer can then replace your transaction with higher sats which means the blockchain will prioritize those transactions and you receive nothing.

So to answer your question of "For how long a transaction can be blocked by the processing party":
Just imagine 100 bots attempting to replace the transaction with a slightly higher fee. The will continue so unless no money is to be made. Remember, only the transaction with the highest fee will be processed.

To answer your question of which puzzles are "safe": Any puzzle with high enough entropy which cannot be solved via bsgs/pollard rho/pollard kangaroo within 10 minutes is a safe bet.
However, keep in mind that each time a puzzle is solved, the next one essentially doubles in difficulty, that's why it currently makes little sense to attempt to solve puzzle 68, 69, 70, etc. or 160 via kangaroo.
Stick with either puzzle 67 (normal bruteforcing) or puzzle 135 (kangaroo, not BSGS because BSGS is useless here).

What to really do if you manage to solve low-entropy puzzles
Again, highly speculative but as far as timing goes right - each block is mined approx. every 10 minutes. So if you get your timing right, you should be able to do the spending transaction and the next block is mined within the next seconds which should in theory increase your odds of claiming the reward.
Apart from that, I would likely try to get my timing right and combine it with Mara's slipstream, which I personally have never used, but will when I manage to find some private keys.

In any case, document anything carefully with evidence that YOU found the private key of said wallet which could be viewed at later on if anything goes wrong.

Best regards

so this thing is bad cause now i have to worry about 2 things ... to be the first to find the key and also hope that the transaction goes trough
...if i find it , whats the chance a bot will steal it from me ? i kinda need to know if its worth it :\

also btw hi guys , im new . just started this year to use my gpu to hunt for keys and been trough almost 1 quadrillion so far . no luck tho ..
closest match i found is 1BY8GQbnuEzh8EWgMVthkqWzYXRMKvUTF5  : 63D03AA35D4BEC7D7

good luck to everyone and happy hunting , dont give up , and lets hope no one will steal it from the lucky one .. fingers crossed 🤞
member
Activity: 239
Merit: 53
New ideas will be criticized and then admired.
Quote
If you even want a proof, we can do something like this.
Tell me a 67 bit hex starting with 6D000 and 7CFFF, a place, I will tell you the closest

1BY8GQbnu and 1BY8GQbnue.
This only proves that maybe you ran those ranges in their entirety. How does this prove anything about "math"? Maybe I don't understand what you are really saying.
If you can determine via math, where all "1BY8GQbnue" prefixes are, then just solve 67 and be done with it.
If you tell me a 67 bit hex starting with 75A3E and 57604, I will tell you the closest 1BY8GQbnu and 1BY8GQbnue.


I am saying 67 bits in the range of 57604 and 75A3E.

I want a wallet and HEX code starting with 6E71 hex, 67 bits 1BY8GQbnue.

I know where the 1BY8GQbnue prefixes are on AVERAGE. But for the right wallet, I am scanning.

Statistics and probability are extremely counterintuitive, and have historically confused even the best mathematicians. I hope you find what you are looking for!
newbie
Activity: 68
Merit: 0
Quote
If you even want a proof, we can do something like this.
Tell me a 67 bit hex starting with 6D000 and 7CFFF, a place, I will tell you the closest

1BY8GQbnu and 1BY8GQbnue.
This only proves that maybe you ran those ranges in their entirety. How does this prove anything about "math"? Maybe I don't understand what you are really saying.
If you can determine via math, where all "1BY8GQbnue" prefixes are, then just solve 67 and be done with it.
If you tell me a 67 bit hex starting with 75A3E and 57604, I will tell you the closest 1BY8GQbnu and 1BY8GQbnue.


I am saying 67 bits in the range of 57604 and 75A3E.

I want a wallet and HEX code starting with 6E71 hex, 67 bits 1BY8GQbnue.

I know where the 1BY8GQbnue prefixes are on AVERAGE. But for the right wallet, I am scanning.
full member
Activity: 1232
Merit: 242
Shooters Shoot...
Quote
If you even want a proof, we can do something like this.
Tell me a 67 bit hex starting with 6D000 and 7CFFF, a place, I will tell you the closest

1BY8GQbnu and 1BY8GQbnue.
This only proves that maybe you ran those ranges in their entirety. How does this prove anything about "math"? Maybe I don't understand what you are really saying.
If you can determine via math, where all "1BY8GQbnue" prefixes are, then just solve 67 and be done with it.
If you tell me a 67 bit hex starting with 75A3E and 57604, I will tell you the closest 1BY8GQbnu and 1BY8GQbnue.
newbie
Activity: 68
Merit: 0
This thread is very toxic. For your own sanity you should remember a couple things:

1. ChatGPT will always agree with whatever BS you pull into his mouth to swallow. As a result, everyone can easily break ECDSA and ECDLP, you only need to know a bit of math and probabilities, and maybe not more than an Raspberry Pi chip.

2. Reality is a bitch. You know, made out of actual people that can think. ECDSA and ECDLP are safe against any form of probability attack (except Kangaroo if you have a pubKey). Anyone who thinks otherwise should check 1 above. All forms of trying to include probability to break an address (e.g. a hash function) will fail, because the effort to "divide and conquer" doubles by each bit, and becomes higher than normal brute-force. They will only realize this when trying to put in practice their fallacy-based theories and end up needing to have clusters of hundreds of thousands of computers to do the job.

1- No one said they could crack ECDSA or ECDLP.

2- There are probability values ​​in the entire system. It means that transactions can only be made in low bit wallets.

3- You said except for Pubkey and Kangaroo. Why? Can you make a wallet with high bit? For example 135 bit? Yes, it can be done, but it takes time. If I tell you that you need to scan certain intervals, how much time will it reduce?

I'm talking about the Basics of Probability. I'll start to think that you've never dealt with encryption before. Brute Force was always done. So, does the time shorten for a password that consists only of text? Or does the time shorten for a password that consists only of numbers?

Also, if you know the length of the password. Smiley How many hours, how many days will it take?

How long do you think it will take to break? If you can't think, it means you've never tried to break a password.

1. Yeah, lots of people did. We're still waiting on their breakthroughs since they were all something around the lines of "I'll break this by February 2024 / 2 weeks / this year / I already did it".

As a bonus, you're claiming you broke a hash function, not DLP, which is exponentially more difficult of a problem (2^256 or 2^160, vs 2^128 or 2^67 or 2^33.5). Congrats, we'll wait.

2. I don't think you know what you are talking about.

3. I don't think you know the difference between hashing functions, public key signatures, and symmetric encryption. You're making a mess out of them all while calling everyone else idiots without ever knowing what they do for a living.

Also, my post was not directed to you. You can keep going with whatever you're trying to do in peace.

I agree with you on some issues.
No one thinks they can do anything without knowing anything.

I never promised anyone a time like this. Everyone has a method, work, planning. I respect that. I never belittled anyone about how they do their job by saying it can't be done, it won't happen or anything like that.

I am one of those who understand that there is knowledge here. But you want everyone to think the way you think.

Every idea needs RESPECT. That's why I respect everyone in your studies or other conversations.

But MATHEMATICS is used everywhere. I like to say this, you may not like it.

If you even want a proof, we can do something like this.
Tell me a 67 bit hex starting with 6D000 and 7CFFF, a place, I will tell you the closest

1BY8GQbnu and 1BY8GQbnue.
member
Activity: 165
Merit: 26
This thread is very toxic. For your own sanity you should remember a couple things:

1. ChatGPT will always agree with whatever BS you pull into his mouth to swallow. As a result, everyone can easily break ECDSA and ECDLP, you only need to know a bit of math and probabilities, and maybe not more than an Raspberry Pi chip.

2. Reality is a bitch. You know, made out of actual people that can think. ECDSA and ECDLP are safe against any form of probability attack (except Kangaroo if you have a pubKey). Anyone who thinks otherwise should check 1 above. All forms of trying to include probability to break an address (e.g. a hash function) will fail, because the effort to "divide and conquer" doubles by each bit, and becomes higher than normal brute-force. They will only realize this when trying to put in practice their fallacy-based theories and end up needing to have clusters of hundreds of thousands of computers to do the job.

1- No one said they could crack ECDSA or ECDLP.

2- There are probability values ​​in the entire system. It means that transactions can only be made in low bit wallets.

3- You said except for Pubkey and Kangaroo. Why? Can you make a wallet with high bit? For example 135 bit? Yes, it can be done, but it takes time. If I tell you that you need to scan certain intervals, how much time will it reduce?

I'm talking about the Basics of Probability. I'll start to think that you've never dealt with encryption before. Brute Force was always done. So, does the time shorten for a password that consists only of text? Or does the time shorten for a password that consists only of numbers?

Also, if you know the length of the password. Smiley How many hours, how many days will it take?

How long do you think it will take to break? If you can't think, it means you've never tried to break a password.

1. Yeah, lots of people did. We're still waiting on their breakthroughs since they were all something around the lines of "I'll break this by February 2024 / 2 weeks / this year / I already did it".

As a bonus, you're claiming you broke a hash function, not DLP, which is exponentially more difficult of a problem (2^256 or 2^160, vs 2^128 or 2^67 or 2^33.5). Congrats, we'll wait.

2. I don't think you know what you are talking about.

3. I don't think you know the difference between hashing functions, public key signatures, and symmetric encryption. You're making a mess out of them all while calling everyone else idiots without ever knowing what they do for a living.

Also, my post was not directed to you. You can keep going with whatever you're trying to do in peace.
Pages:
Jump to: