The chosen column is not random, but exactly from the top of the first digit of puzzle 66 vertically to the first line from bottom to top, and we added those 9 numbers (of course, I ignored the single digit number) and the first 3 digits of puzzle 66. came
Excuse me, I didn't look good enough, it all checks out now. You're definitely on the right track. Thank you for sharing your discoveries with us. Now the creator must come forward and explain it, to be able to break his formula. I am too dumb to be able to understand why your magic grid splitting leaked the first 6 digits of #66 (after ignoring the single digit numbers, of course). This gives me shivers.
Anything above 135-bits is safe, given that #135 has a spend from 2019 and still no one has being able to claim the prize.
Since we have no idea of the raw power that is waiting for a spend from the lower puzzles addrs.
I would not consider anything under 130 bits safe anymore, because if I would be RetiredCoder I would already have a good amount of stored DPs which would break any 129-bits key faster than doing it from scratch.
If it's to be solved in under 10 minutes, it again depends, because no one knows if someone has already built some DP database that is able to break some range in under 10 minutes. Why? Because it also depends on how much computing power is also used. Some people may attack using a single GPU while others maybe have an entire GPU rendering farm waiting to be booted up and execute the attack.
For a personal user with a single GPU and months of precomputing in advance, nothing under 100 bits is safe today. And that number can only go up as the GPUs become more powerful, affordable, and a proper DP database is improved with every day that passes.