Pages:
Author

Topic: Bitcoin puzzle transaction ~32 BTC prize to who solves it - page 31. (Read 230601 times)

member
Activity: 499
Merit: 38
If (someone solves Puzzle 130) -> (they have extreme computational resources).
Not (anyone has extreme computational resources).
Therefore, Not (anyone solved Puzzle 130) -> it may have been manipulated.

If someone solved Puzzle 130, then holy molly, they’ve got a supercomputer the size of a small moon! But wait — no one’s got one of those lying around (unless NASA’s hiding something). So, if no one solved Puzzle 130, holy molly, something fishy’s going on — maybe the puzzle fairies had a little too much coffee and fancy lunches in Dubai!  Grin


Greetings to Everyone here. I hope to add my small contribution and knowledge to these pages, I am ExiledDatum.

Welcome, ExiledDatum! We're glad to have you here.  Wink
brand new
Activity: 0
Merit: 0
It is a shame to observe some of the blatant entropy spewed to hinder others out of greed.

Thank you to Alberto, NoMachine, and many others who have contributed so much to these endeavors. I have learned a great deal from many of you who so willingly shared your code, time and very essence while working on this puzzle.

I have also been afflicted with the obsession of plinking away at the code, tearing it apart at the bit in hopes to glimpse the true clockwork beneath. I can see the draw which has held many of you here for so long observing.

Imagine my own anger with myself after finding out #66 has been solved and going back over the many terrabytes of code I have horded, scrapped and reconstructed across this thread well into a third restart. My hypothesis had placed me within 2**61 or less of the key. An going back over my bat files and clutters external drives stuffed to the brim with my attempts.

I had calculated 2628a3ad7d90cd20f to 2728ad7d90cd20f. I had sitting in a bat file created and last ran 5/13/2024.


I agree with many and none of the findings here.

Perhaps it is part of my unique approach... preferring to bash myself upon the rocks while learning to swim after leaping into the sea that these puzzles represent. While thrashing away in my inadequate mind at this, and many other puzzles. I have discovered a few things. Alberto has probably also and is why he is still here to observe. I will with-hold my many hypotheses and the likes as I am a woefully ignorant newcomer, but I am observant.

While there is no pattern as the author clearly stated, he did have a system in which he used to generate the keys, and how clever and simple it was hidden is plain sight. I almost missed it myself, but kept rounding back to it.

There is no pattern, but all beings are creatures of habit. Don't waste your time on seeking the pattern. It is pointless at this size of key space. Leverage your ingenuity, cunning and logic. Stop blind skips into the key space, look for habit, not pattern. #66 broke many of the rules the author seemed to have kept to, no repeating characters greater than two. No repeated string lengths. The vast keyspace size now protects the prizes, not some cleverly constructed riddle or system to solve.

I am here to offer what the author secretly wished to set about and construct with his double puzzle. This puzzle is not just about cracking the entropy. It is about cracking the human condition, there are keen minds here and the blockchain is power.

Smart-contracts written and publicly audited could govern the key space search server, so blind trust is removed. True equality could be possible. I reference Alberto mostly because he has the most work along with WanderingPhilosopher, there are most likely others I miss, and forgive my ignorance.

Understand those people gave openly and freely shared with all so everyone was given equal chance.

Thank you, to those who gave openly because they understood this concept so well.

To those dreaming, I say dream, but understand. You must give before others learn to give also. It one of the strangest paradoxes. No one will share until you decide to teach them how to share.

If you all would stop searching in single castles with vaults empty waiting for the prize while dreaming, this puzzle would crumble in a few months under true collaboration.

Truly come together and work as a team. I see several small groups within these pages, islands of brilliant minds drawn to one another.

But, what do I know. I am just some old man to the party.  A SimpleMind.

Greetings to Everyone here. I hope to add my small contribution and knowledge to these pages, I am ExiledDatum.
member
Activity: 122
Merit: 11
I agree with Akito that the creator of this puzzle moved out puzzles 120, 125, and 130. I have been researching this topic for a long time, and based on my analysis, just after puzzle 120 was solved on 2023-02-27, the creator increased the prize money to a total of 1000 BTC on 2023-04-16. This seemed to be a public stunt by the creator to draw more attention to the puzzle. Then, on 2023-07-09, puzzle 125 was removed again, likely as another public stunt to generate further discussion and speculation that someone had gained the knowledge to crack ECDSA within a 3-4 month period. After that, when puzzle 66 was solved and subsequently stolen by another pseudo person (I’m unsure if this was also a public stunt), the creator quickly moved btc of puzzle 130, likely to attract even more attention.

I don’t mean to offend anyone—this is just my analysis. Everyone is entitled to their own opinion, and this is simply mine. I have no intention of offending anyone.


This could be true but from the other hand why he would do that ?  You said his goal is to draw more attention. I don't think so. This whole puzzle thing is very niche topic, normal people don't care whatever he will do here... and moving puzzles like 120 125 130 and 66 makes the whole thing even more unaccessible to average person due to obvious hardware limitations.

He stated clearly what this "puzzle" really is:  it's meant to measure what can be cracked at current time, He doesn't care who takes the bitcoins or how it was done or if someone stole the transaction. All he cares about is current cracking capabilities.  As if someone is monitoring if increasing bitcoin security is necessary.

I think the "creator" is not a random private person. It represents someone who have important goal in knowledge how safe bitcoin is currently.  This is someone who created BTC, big exchange or something like this.

How many people you know that instead of cashing it all or at least holding would make a puzzle and play such game ?  And if someone has thousands of bitcoins and this is just a part of them  why would he even bother to make such puzzle ?   I tell you it's not a single private person and he is not moving the puzzles himself.
jr. member
Activity: 42
Merit: 0
I don’t mean to offend anyone—this is just my analysis. Everyone is entitled to their own opinion, and this is simply mine. I have no intention of offending anyone.

I'm a mathematician. I deal with logic - a part of mathematics.


Formulating the Argument.

Steps for a logical analysis:
Formalize the claims: The main claims can be expressed as premises in logic:

Premise 1: After puzzle 120 was solved, the creator increased the prize money on 2023-04-16 to 1000 BTC (public stunt hypothesis).
Premise 2: Puzzle 125 was removed on 2023-07-09, likely as another stunt (further public manipulation hypothesis).
Premise 3: Puzzle 130 was moved after the solving of puzzle 66, likely to generate more attention.
Premise 4: It is practically impossible to solve puzzle 130 without at least 1000 GPUs, making it improbable for anyone to solve it legitimately.


Logical Conclusion:
Using modus tollens (if P implies Q, and Q is false, then P must be false):

If it is true that solving Puzzle 130 is only possible with extreme computational resources (Premise 4), and no one is known to possess those resources, then no one could have solved it without manipulation.
The formula could look like:

If (someone solves Puzzle 130) -> (they have extreme computational resources).
Not (anyone has extreme computational resources).
Therefore, Not (anyone solved Puzzle 130) -> it may have been manipulated.


This reasoning framework doesn't "prove" the manipulation but shows that, given the constraints, the likelihood of a public stunt increases if the technical requirements are realistically impossible for most individuals.
newbie
Activity: 30
Merit: 0
I agree with Akito that the creator of this puzzle moved out puzzles 120, 125, and 130. I have been researching this topic for a long time, and based on my analysis, just after puzzle 120 was solved on 2023-02-27, the creator increased the prize money to a total of 1000 BTC on 2023-04-16. This seemed to be a public stunt by the creator to draw more attention to the puzzle. Then, on 2023-07-09, puzzle 125 was removed again, likely as another public stunt to generate further discussion and speculation that someone had gained the knowledge to crack ECDSA within a 3-4 month period. After that, when puzzle 66 was solved and subsequently stolen by another pseudo person (I’m unsure if this was also a public stunt), the creator quickly moved btc of puzzle 130, likely to attract even more attention.

I don’t mean to offend anyone—this is just my analysis. Everyone is entitled to their own opinion, and this is simply mine. I have no intention of offending anyone.
hero member
Activity: 862
Merit: 662
If it is not zielar or JLP, then it only means that the creator decided to do with his keys what he wants and when he wants.

How the fuck do you reach these conclusions, Based on what evidence?

There is NO EVIDENCE in one way or in the other. Those are only your opinion.

Please stop spreading FUD
member
Activity: 499
Merit: 38
Sometimes I don't know when you are serious or joking or just provoking


I've tried everything I or anyone else could think of, but nothing seems to work. Honestly, I don't know what I might have missed. I'm just kidding in some parts of the topic, mostly out of frustration, but it's all part of the challenge. The truth is, no matter how much effort we put in, it's practically impossible to crack this—or it would take more computing power than the world has to break.
jr. member
Activity: 42
Merit: 0
If it is not zielar or JLP, then it only means that the creator decided to do with his keys what he wants and when he wants.

The numbers involved are astronomical—comparable to the size of the entire universe. It would take advanced quantum computing, and even then, only an exceptionally powerful one, to crack this puzzles without  the public key.

Only the state or intelligence agencies can have such resources.


We don't even know if there is yet some unpublished weakness in ECDSA that was exploited.  Also why would one gather 1.7 million $ in a single script address and not touch it at all after more than a year and a half, assuming there was a high cost of solving, that needs to be paid...?

The public program on GitHub could serve as a honeypot, used to monitor those trying to solve cryptographic puzzles or who are interested in cracking ECDSA. It could act as a form of surveillance, watching who interacts with it, akin to government efforts to track those with knowledge of or interest in sensitive cryptographic topics.

The non-public solution could indicate that powerful entities (e.g., intelligence agencies, corporations) are exploiting vulnerabilities privately while letting the public chase dead ends or false leads.

The decision to not touch the funds could simply be a matter of operational security.

Sometimes I don't know when you are serious or joking or just provoking ,  but this is one of the more accurate posts here.

It is very possible that the creator is part of an institution or agency.
full member
Activity: 282
Merit: 114
Due to the fact that a lot has changed in the topic recently - for fun I decided to read what you are writing about IN THIS TOPIC, but in order not to waste too much time - I started from page 300 of this topic and:
COBRAS - I won't address the whining gibberish of this idiot because it's a waste of space here. Man, do something useful... go pick up trash in the forest or go clean up in church, because you'll contribute more there than here, spouting nonsense in every post. In relation to everything this trash posts, I can say that he knows more about me than I do about myself :-) And even more about this challenge. Write a code in Python to get your brain in order, but start with the line that creates it... apart from the COBRAS mental disability - for your satisfaction I state referring to individual posts:

hi i think this is user zielar https://bitcointalksearch.org/user/zielar-1020539 taking 120 125 130 he works in a company where there are many gpus i think the company doesn't know that he is using their equipment

Companies that use a large number of GPUs, especially at the scale of 20,000 or more

1.Google
2.Amazon (AWS)
3.NVIDIA
4.Meta (Facebook)
5.Tesla: Tesla Dojo
6.Cryptocurrency Mining Farms

In which company do you think it is possible to solve puzzle 130 unnoticed from the list above?  Grin

Do you still have doubts that it wasn't this person who decided https://bitcointalksearch.org/topic/m.51803085

That's right. At that time I had the opportunity and permission to use very large computing power at that time... The company knew about it - otherwise I wouldn't brag about it. That power is a grain in the sand today... None of the companies mentioned are correct :-)
====

Do you still have doubts that it wasn't this person who decided https://bitcointalksearch.org/topic/m.51803085

https://bitcointalksearch.org/topic/m.62181304

With  8x Tesla A100 ? I have 6 in my lab. I haven't found anything so far. It's not just about the GPUs here.
Something else is happening here.

Maybe he/she is just a brilliant mind...and that person knows a way to reuse the DPs from 120,125 to find 130 and the rest.

I would like to know how he/she did it !

As far as I know - such a possibility has always existed :-) However, I do not have a perfect mind to use it... especially since I have no progress in those ranges. I have a set from the 115 range, so if someone wants - I am open to suggestions.
====
120, 125 and 130.
captured by hacker ? because this address is 1DiegoU6ETJXK9hNWVTeuK4Y8fkksPnEnK seem fishy with 3Emiwzxme7Mrj4d89uqohXNncnRM15YESs
and he's announce this "https://www.blockchain.com/explorer/transactions/btc/69888f5e55d414b8de65f3a9307a1f414d7035cf9142239045300ce018984bd4"

the next target to take and spend.

    {
      "address": "1BY8GQbnueYofwSuFAT3USAhGjPrkxDdW9",
      "pkscript": "76a914739437bb3dd6d1983e66629c5f08c70e5276937188ac",
      "value": 1231,
      "spent": false,
      "spender": null
    },

it's 67, anyone who can find even 67, the transactions will be attacked by this person.

ngl, this guy very smart and genius build the transaction and from the number of transactions increasing slowly and rhythmically.

You are right about the attack. However about 3Emi, I do not think so, that transaction you shared does not belong to 3Emi, it belongs to a lamer, a noob, a very beginner who does not know anything.

And for you guys, I shared in older posts a script where you can immediately move BTC from one wallet to another. Use those kind of proper and reliable script to move when you solve any puzzle. Also, move whole balance all in once, because while waiting small amount of transfer to be moved (testing if btc is going), hackers start slowing and solves the private key from the exposed public key in 4-5 minutes for the small numbers like the puzzle #67.

And that's what I was writing about. This challenge ended when I made public the solution to puzzle #115. Later "additional payments" of a few BTC to the address and "nobody's" solutions not made public are a different game... The game is about who will rob whom and how... and why in the first place? That's why I approach the topic with a great deal of distance, because in the perspective of time - facts and time have shown that TODAY no one will honestly get rich on this game just by trying to find a solution.

====
Damn!!! whoever the solver of 130 bit is. is genius..!!!

Of course, that is JLP himself, but apparently not with the GitHub version of Kangaroo 2.2.
This is version 8.0 at least.  Grin


How do you know it is JLP ?

Because when it comes to solving 130-bit, even the Kangaroo needs a turbo boost... and JLP's got the keys to the garage!  Tongue

I know from JLP himself that he is not working on this project because he simply does not have time for it. His profession is closely related to some exact science and is a really serious profession, and such a side project used to be an element of training in light of what he does professionally. I do not think that this will change in the long run, especially since #115 when I tried to take on #120 - then he had much less time and contact was very difficult due to lack of time. I do not think that he read it at all or that anything about this challenge interests him at the moment, although it may have changed, because I last wrote to him a year ago. Certainly all of the above -> excludes JLP as having found the solution using his "improved" work... and I am certainly convinced that if it were completely the other way around -> he would have made the solution known to us.
====
Maybe you all remember
When puzzle 64 and 120 found right after puzzle listed prices fill up with high amount
6.6 from 0.6
13 from 1.3

Do you all think maybe this time puzzle 66 and 130 found same old 64 and 120
And price may be goesmore up like

Example
67 from 6.7
135 from 13.5

Wait and see or ask puzzle Creator for more updates
 Grin


Believe me or not - but I've been thinking about it for two days Cheesy And I suspect that this will happen for two reasons:
Logical - because the facts known to us today show how difficult this achievement is and it will have the task of stopping and encouraging those who have doubted to act, and it will contribute a lot
Obvious - because we will never know the finder and the method, and the funds will be officially "stolen" by a person who has nothing to do with finding a solution, because they either knew it from the beginning or they will prey on someone who will do it for them.
====
Current solver(s) just don't care about this thread. They have many, many GPUs and just take the BTC as a little bonus. Maybe they are criminal hackers.
Thanks to french idiot JLP for giving the sourcecode for free to all them.

Might be some chinese or north korean guys. Some place where energy costs nothing or maybe every GPU is hacked.

It is very unlikely that there is a new algorithm to solve the ECDLP. Else we might expect more frequent solves and maybe a new scientific paper.
It is game over for normal guys if you not find a real new approach to cracking the ECDLP.

Zielar had access to many GPUs but I doubt he had access to that many. But he might have solved it somehow anyway. He is a very greedy/selfish person who never gave anything back to JLP, brichard19 or others.
====
Another scumbag who is coming after me because he is sad that I succeeded in and have a big part in this challenge. If you don't know, don't give a damn!
1. The last solution I found with JLP is #115

2. JLP refused to accept compensation for a joint achievement... Then he said that if I wanted to take on #120 and he would find time to help me with it - then he would agree.
3. Don't cry.... it won't lead to any benefit for you. No one will give you anything to wipe your tears every time you cry... just like I have no obligation to give money to everyone I see around me. Following your train of thought, choosing your wrong criterion for assessing my person online -> a cleaner in the yard should I donate for not walking around dirty, support BMW with a donation because their car allows me to move around mobile, and also support MICROSOFT because thanks to them you can see on the screen what I type on the keyboard?
And what.. are you bald?
====
pubkey new down....

...


cf4863281bb44f52677de8876600000000 10000

c1d204c36910280a6e0952c00000000000 111c80
bad8afea76b82aa806c0d19a8000000000 11c000
aeb619ed70bba24a4d8dd0000000000000 12fb9e <-
ae8dccc375a55045649fec3c2000000000 130000

...

a3379838c4438008c873a4000000000000 1451d8


...

up down ,up down... new down...up down ,up down...


to be continue Wink

ps  needs stock of zero's for this manipulations  Grin

I know... I wasn't supposed to relate, but this is beyond me. What an idiot  Cheesy Cheesy Cheesy Wake up!! We're getting up!! You wet yourself!! Grin Roll Eyes
====
I have more and more doubts that some geniuses are solving the puzzle. In my opinion, starting from the 120bit solution, the creator does all this. To keep the interest in his mystery alive. If you compare the sequence of events (dates of decisions, increase in the prize), then everything adds up to a logical picture. Now it is more profitable to use computing power for the inference of neural networks, for their training, rather than for searching for a needle in a haystack with an unknown result. And here you need very large computing power, which will cost a lot to rent.

Honestly, I don't think it was the creator who withdrew the funds. Someone who over the years didn't stop the challenge despite having the private keys - he could have withdrawn them with multi-million profits, and instead deposited dozens of BTC to each address shows that the creator is a person who sleeps on cash and is like oxygen to him - obviously he is and that he will never take it away. So I don't think that someone stopped achieving the ultimate goal of creating this challenge by fawning over change... especially since finding 120,125,130 does not bring anything positive in the perspective of the entire challenge... especially since we don't know of any solutions that he could skillfully announce while making progress towards achieving the goal.
I think the finder is someone who reads us here, but does not share the results or methods of action, because so far she has successfully gained $2 million on it using her excellent method of breaking subsequent thresholds. In other words - for safety's sake she is silent, because she simply -> plans to top up those $2 million with subsequent levels. If we live to see #160, there is a chance that we will learn the solutions.
====
I have

more and more doubts that some geniuses are solving the puzzle. In my opinion, starting from the 120bit solution, the creator does all this. To keep the interest in his mystery alive. If you compare the sequence of events (dates of decisions, increase in the prize), then everything adds up to a logical picture. Now it is more profitable to use computing power for the inference of neural networks, for their training, rather than for searching for a needle in a haystack with an unknown result. And here you need very large computing power, which will cost a lot to rent.
I've been saying this for a long time, but people keep rushing blindly, like a donkey chasing a carrot! Puzzles 120, 125, 130 have all been emptied by the creator, and possibly Puzzle 66 as well, intercepted by him to cover his tracks. Puzzle 66 was broadcast just moments before the next block was mined.

#64 and #66 - these levels are no longer related to anything that requires research and technology. These levels and their solutions are the result of robbing people of their computing power by assuring them of sharing the profits if a solution is found. In both cases, this sharing did not happen, because no one admitted to finding a solution, despite the fact that the pool achieved significant effects. The only thing that connects low thresholds with high ones is that no one admitted to finding a solution, and the difference is that there is no goal in this - because using a kangaroo for low thresholds is comparable to flushing a toilet or having a brain by COBRAS... that's why we know these solutions. The lack of a lucky person shows that the thief simply did not intend to share the profit from the stolen power, because as we know, he did not have to... after all, everyone gave it to him, believing on their word of honor that if we find it, we would share it Wink


----
O.M.G. 10 forum pages, a few references and two hours in the ass Tongue That's enough.

IN SUM:
I am also not the finder of any solution since finding 115 with JeanLucPons. I would like to point out that all successes with the included private key and description of the method of finding were made available to you on the same day it happened, while all solutions later than the one achieved when we found 115 were not made public, which indicates that we are dealing with theft, fraud and scheming of the RBC type or open theft of power by creating fictitious pools.

Greetings to all (excluding COBRAS, because it's no one and not everyone Cool Tongue)
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
Im not understand what this code doing

while rnd(817190); return;

Your code samples 14 elements from a set of 23, and stops when it matches the desired combination, what is not to understand here, or do you not understand your own posted code?

comb(23, 14) = 817190

so on average the loop will run 817190 times until it finds the match.

wre you get from 23 to 14 ?


yes [40, 38, 35, 34, 33, 32, 29, 27, 25, 24, 22, 20, 19, 18] 1238261


random find it in 1238261 this is 10 times faster then my second script


inpuT  0x33d28c937a4b0ac7e33d57d6b0217789a
result -W; 0x1d16de1a73780 189 i 1 input 0x57449a4f5a683 zGood 3 Zz 115
zzzzzGOOD 3 resultGood 0x1d16de1a73780 valid 115 1 zzTotal 115 one 5 17 thre 64 115 ddd-Fake 64 zGood 3
input -W: 0x57449a4f5a683 PP 115
Iiiii 1 s 0x1 0x1d16de1a73780 0x1d16de1a73780 0x1d16de1a73780
combo 233224241413322334324242434124242333224233414223413 51

input priv:

0x33d28c937a4b0ac7e33d57d6b0217789a
combo is a sequence from [1..4]  pcs 51 times

combo:
233224241413322334324242434124242333224233414223413

this is a 2**50 result:

0x1d16de1a73780



to Zeblaro/b] - Im ignore you, don't waste your time to write yours stoopid massages.  Grin, baby, you need some time use devise what named head , not jast put GPUs of your frinds to puzzles  without result

forget about Zeblaro, hi is not in a game more, GPU of his frinds not upgraded, so hi outside puzzle 130 + )))  Hj is very dissapointed, we need understan his bad news. By by Zaeblaro .  Tongue
member
Activity: 165
Merit: 26
Im not understand what this code doing

while rnd(817190); return;

Your code samples 14 elements from a set of 23, and stops when it matches the desired combination, what is not to understand here, or do you not understand your own posted code?

comb(23, 14) = 817190

so on average the loop will run 817190 times until it finds the match.
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
this code is very good, but, too  slow for 65 pcs, maybe nomachine modify to fast RND gen in rust ?

After removing all redundancy, first one is literally equivalent to:

Code:
while rnd(817190); return;

so yeah it's fast assuming rnd() returns 0 sooner or later.

Forget sqrt bounds, let's use factorial complexity and infinite recursive loops. Ok...

There are no patterns in the bits of the keys, if you exclude some patterns than that would mean there is a pattern in the keys. Does that make sense? Maybe reflect on it for a few minutes.

There is no RND magic generator, neural network, magic circle that can ever predict the next unknown sequence. There are an infinite amount of RND generator equations, neural network matrice states, and magic circles that can FIT any amount of KNOWN random bits. But that does not make them crystal balls, they will all fail to predict any other sequence other than what is already known.

I talk what rng is faster, , second rnd not generate chaos, he generate sequence. Bit is unknown, but next bit in privkey has restriction and generated sequence too, because he is next bit , nec bit not same to previous bit what's why this is sequence. Yes,  sequense for what transform 130 bit to 0 bit 65 bit long, but you not know, exact what bit first in generated sequence is first of 120 bit in priv  130 or not.


Im not understand what this code doing

while rnd(817190); return;


Can you explain ? This is summ of parts of puzzle ?

factorial complexity, this is nothing , not joke too...

abount factorial complexity:


inpuT  0x272a396ed18748cd2442bd57161ca6eb5 ---- this is inlut privkey 120 bit
result -W; 0xcf4a324de92c2b1f8cf 66 i 1 input 0x67a51926f496158fc67a zGood 2 Zz 66
zzzzzGOOD 2 resultGood 0xcf4a324de92c2b1f8cf valid 66 1 zzTotal 66 one 0 5 thre 50 66 ddd-Fake 48 zGood 2
input -W: 0x67a51926f496158fc67a PP 66
Iiiii 1 s 0x1 0xcf4a324de92c2b1f8cf 0xcf4a324de92c2b1f8cf 0xcf4a324de92c2b1f8cf
OДИH 232476502045627352 18


this is result after manipulation

0xcf4a324de92c2b1f8cf

this is a number need get, for take result:

232476502045627352


and if operations is  too mach, and need save many data to disk, more as
adecvate is go to final result without intermediate savings.
member
Activity: 165
Merit: 26
this code is very good, but, too  slow for 65 pcs, maybe nomachine modify to fast RND gen in rust ?

After removing all redundancy, first one is literally equivalent to:

Code:
while rnd(817190); return;

so yeah it's fast assuming rnd() returns 0 sooner or later.

Forget sqrt bounds, let's use factorial complexity and infinite recursive loops. Ok...

There are no patterns in the bits of the keys, if you exclude some patterns than that would mean there is a pattern in the keys. Does that make sense? Maybe reflect on it for a few minutes.

There is no RND magic generator, neural network, magic circle that can ever predict the next unknown sequence. There are an infinite amount of RND generator equations, neural network matrice states, and magic circles that can FIT any amount of KNOWN random bits. But that does not make them crystal balls, they will all fail to predict any other sequence other than what is already known.
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
because "^" part only from 1 to 130

Oh, COBRAS broke the square root bound! We only have 130 parts in a 130-bit puzzle, guess no one figured this out. Let's now reduce the range from 130 to 32, because why not. Maybe divide everything by zero (n) and call it a day? I'd say the magic astrological chart would work better though. But in base 112. Add parity to each letter in the puzzle addresses and solve using bubble sort. Spin the wheel until we reduce the checksums to zero, than split circle in 256. Convert each digit from cartesian to polar and compute corresponding point on the curve. Make lattice from points, to compute correct font size to use. Unspin, rejoin, set font size, get all keys. There, ECDLP solved.


no, puzzle is, this,

Thanks to nomachine for code


this code is very good, but, too  slow for 65 pcs, maybe nomachine modify to fast RND gen in rust ?

import random as A

tri = [40,38,35,34,33,32,29,27,25,24,22,20,19,18]

B=list(range(40,17,-1))

C =[]
count = 0

while tri != C:
    count=count+1
    C=A.sample(B,k=A.randint(14,14))
    C.sort(reverse=True);
    
    if tri == C:
        print(C,"yes")
    if count % 60000 ==0:
        print(C,count)
        print(len(tri))
        



and this



speed is very difference, but


from collections import deque

tri = [41,40,39,38,37,36,35,34,33,32,31,30,29,28,27,26,25,24,23,22,21,20,19,18]#,9,8,7,6,5,4,2]
one = [40,38,35,34,33,32,29,27,25,24,22,20,19,18]

def generate_combinations(lst, r):
    if r == 0:
        yield []
    else:
        for i in range(len(lst)):
            current = lst
            rest = lst[i + 1:]
            for c in generate_combinations(rest, r - 1):
                yield [current] + c

def bfs(tri, one):
    queue = deque([(tri, [])])
    counter = 0
    while queue:
        current_tri, path = queue.popleft()
        counter += 1
        if len(current_tri) == len(one):
            print("Пpoмeжyтoчный peзyльтaт:", current_tri, flush=True)
        if set(current_tri) == set(one):
            print("Peшeниe нaйдeнo!", flush=True)
            print(path, flush=True)
            return
        for r in range(1, len(current_tri) + 1):
            for combination in generate_combinations(current_tri, r):
                counter= counter+1
                new_tri = [x for x in current_tri if x not in combination]
                if len(new_tri) <= len(one):
                    if counter % 1000 == 0:
                        print("Oбpaбaтывaeтcя кoмбинaция:", combination, "Counter:", counter, flush=True)
                    queue.append((new_tri, path + combination))

bfs(tri, one)



and you need jast 50..65 puzzle length for solve 2^120

all parts of puzzle has restriction, I don understand what sqrt you talk, but jast what total part of puzle 120 and for solve need  aproximately  120 / 2
member
Activity: 165
Merit: 26
because "^" part only from 1 to 130

Oh, COBRAS broke the square root bound! We only have 130 parts in a 130-bit puzzle, guess no one figured this out. Let's now reduce the range from 130 to 32, because why not. Maybe divide everything by zero (n) and call it a day? I'd say the magic astrological chart would work better though. But in base 112. Add parity to each letter in the puzzle addresses and solve using bubble sort. Spin the wheel until we reduce the checksums to zero, than split circle in 256. Convert each digit from cartesian to polar and compute corresponding point on the curve. Make lattice from points, to compute correct font size to use. Unspin, rejoin, set font size, get all keys. There, ECDLP solved.
member
Activity: 499
Merit: 38
I don’t know what I missed. I tried everything imaginable.  I now have a collection of 150 useless scripts, all aimed at cracking this puzzle. From polynomial regression to geometric progressions, there is no discernible pattern here. . I even spent seven whole months targeting the last eighteen characters of the WIF, attempting to reconstruct the private key. Regardless of which method you choose, without knowing the public key, this is unsolvable. At best, it could be solved in thousands of years. The numbers involved are astronomical—comparable to the size of the entire universe. It would take advanced quantum computing, and even then, only an exceptionally powerful one, to crack this puzzles without  the public key.
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
@nomachine privkey of btc is a geometric progression. they have only summ of ^ , 2^10+2^12+2^30 etc. Random generation of 2^10 to 2^130 has 130 parts(because "^" part only from 1 to 130 fkr 130 puzzke) of puzzle or range, everyone can select what hi like more range or puzzle. And if thant ^40 in result remove1..40 first parts of puzzle
member
Activity: 499
Merit: 38
I don't need no SHA-256, no RIPEMD-160. what is needed is an optimized algorithm that works with non-compression public keys.

The fastest approach to this is not tied to a specific programming language but rather to how well ECC scalar multiplication is optimized. Libraries such as secp256k1 in C or Rust's secp256k1 crate are already highly optimized for this task.


Rng generators is more faster then simple range brute or kangaroo range brute. Kangaroo not provide result with 100% garanty, why people continue use and talk about kangaroo. I think kangaroo and  bsgs not specialisation on crack, for ex they not provide option for replace base point, replace scale of range etc

Brute force is like rolling a dice repeatedly at high speed, hoping to land on a specific number. Each roll is random, and you have no control over the outcome, so you're essentially relying on sheer luck. The faster you roll the dice, the quicker you can try different possibilities.

Bitcoin key generation, on the other hand, is more like playing a game of Craps. The game consists of multiple stages which slow down the whole process of winning: you first roll the dice to establish a target (this represents the key generation). After that, you roll again in the hopes of matching or getting closer to the target. In both cases, there's an element of randomness and strategy, but instead of relying purely on luck, Bitcoin generation involves cryptographic rules that govern each stage, making it a complex and structured process which reduce the attacks to zero..
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
I don't need no SHA-256, no RIPEMD-160. what is needed is an optimized algorithm that works with non-compression public keys.

The fastest approach to this is not tied to a specific programming language but rather to how well ECC scalar multiplication is optimized. Libraries such as secp256k1 in C or Rust's secp256k1 crate are already highly optimized for this task.


Rng generators is more faster then simple range brute or kangaroo range brute. Kangaroo not provide result with 100% garanty, why people continue use and talk about kangaroo. I think kangaroo and  bsgs not specialisation on crack, for ex they not provide option for replace base point, replace scale of range etc
jr. member
Activity: 42
Merit: 0
No major shortcuts exist for ECC due to the huge math involved.  Sad
Pages:
Jump to: