Pages:
Author

Topic: Bitcoin puzzle transaction ~32 BTC prize to who solves it - page 64. (Read 230409 times)

jr. member
Activity: 42
Merit: 0
Maybe it's mind game, all bot busy for find test , and newly bots maybe also block by ping many times, and in background they play real 66 bit puzzle transaction Smiley
A professional bot definitely does not use mempool.space or similar APIs. It uses its own node, so blocking is only for inexperienced bots that use third-party APIs.

You actually need full-node distro. And mempool in local network .You should use a separate machine just for that, and another very powerful machine for the Bot and BSGS/Keyhunt.   Grin

So, how many machines you have ?  Undecided
member
Activity: 499
Merit: 38
Maybe it's mind game, all bot busy for find test , and newly bots maybe also block by ping many times, and in background they play real 66 bit puzzle transaction Smiley
A professional bot definitely does not use mempool.space or similar APIs. It uses its own node, so blocking is only for inexperienced bots that use third-party APIs.

You actually need full-node distro. And mempool in local network .You should use a separate machine just for that, and another very powerful machine for the Bot and BSGS/Keyhunt.   Grin
jr. member
Activity: 64
Merit: 1
34Sf4DnMt3z6XKKoWmZRw2nGyfGkDgNJZZ
Off topic:

White Hat Recovery reward 10%, i.e., up to $23 Million

https://x.com/WazirXIndia/status/1815004031561220352




Hello, are we going to find one of these wallets, deliver it to the Wazirx exchange official and get a reward? Did I get right ?
Could you share the program you use?
newbie
Activity: 8
Merit: 0
Maybe it's mind game, all bot busy for find test , and newly bots maybe also block by ping many times, and in background they play real 66 bit puzzle transaction Smiley
A professional bot definitely does not use mempool.space or similar APIs. It uses its own node, so blocking is only for inexperienced bots that use third-party APIs.
member
Activity: 348
Merit: 34
I think @WanderingPhilospher forgot us lol...

Hope he's doing ok
He's pretty smart and I think his competition makes sense to test some techniques that allow coins to be transferred safely rather than to show that coins can be easily stolen
Maybe it's mind game, all bot busy for find test , and newly bots maybe also block by ping many times, and in background they play real 66 bit puzzle transaction Smiley
newbie
Activity: 8
Merit: 0
I think @WanderingPhilospher forgot us lol...

Hope he's doing ok
He's pretty smart and I think his competition makes sense to test some techniques that allow coins to be transferred safely rather than to show that coins can be easily stolen
member
Activity: 275
Merit: 20
the right steps towerds the goal
Off topic:

White Hat Recovery reward 10%, i.e., up to $23 Million

https://x.com/WazirXIndia/status/1815004031561220352


member
Activity: 194
Merit: 14
I think @WanderingPhilospher forgot us lol...

Hope he's doing ok
jr. member
Activity: 42
Merit: 0
So, all those poor developers spent months honing their skills in Jacobian Coordinates , only to find out their efforts were as useful as a dragon’s breath mint because the unicorn-bot just swooped in and claimed the prize.

And that’s how you end up with an elaborate riddle-solving contest where the only thing you really need is a magical unicorn-bot to do all the work.  🦄🔮
Jacobian coordinates has jack shit to do with puzzle 66 or any other puzzle without an exposed public key. If you know of any program that uses JC to create zillions of random addresses, please let them know that they are doing something very wrong.

66 & friends are more like a SHA/RIPEMD hashing rate competition, onto which the winner of gets pissed on by the Jacobian Coordinates honing skills contest participants. Oh wait, shit, Jacobian Coordinates are totally incompatible with Pollard's DLP methods.

This was a joke. But it does not matter.
Here's a another one. No matter how much you earn on puzzle 130, the unicorn-bot will earn more from 66-90 🦄
member
Activity: 165
Merit: 26
So, all those poor developers spent months honing their skills in Jacobian Coordinates , only to find out their efforts were as useful as a dragon’s breath mint because the unicorn-bot just swooped in and claimed the prize.

And that’s how you end up with an elaborate riddle-solving contest where the only thing you really need is a magical unicorn-bot to do all the work.  🦄🔮
Jacobian coordinates has jack shit to do with puzzle 66 or any other puzzle without an exposed public key. If you know of any program that uses JC to create zillions of random addresses, please let them know that they are doing something very wrong.

66 & friends are more like a SHA/RIPEMD hashing rate competition, onto which the winner of gets pissed on by the Jacobian Coordinates honing skills contest participants. Oh wait, shit, Jacobian Coordinates are totally incompatible with Pollard's DLP methods.
jr. member
Activity: 42
Merit: 0
So, all those poor developers spent months honing their skills in Jacobian Coordinates , only to find out their efforts were as useful as a dragon’s breath mint because the unicorn-bot just swooped in and claimed the prize.

And that’s how you end up with an elaborate riddle-solving contest where the only thing you really need is a magical unicorn-bot to do all the work.  🦄🔮
copper member
Activity: 903
Merit: 2248
It is possible to get the reward in a trustless way. Some examples:

OP_RIPEMD160 OP_EQUALVERIFY OP_CHECKSIG
OP_SHA256 OP_EQUALVERIFY OP_CHECKSIG

The first Script can be used to send "I know the key" signal in a trustless way. The second Script can reveal the public key, after the first "I know the key" transaction, but also lock the reward to the solver's key.

Some practical examples, with the smallest key:

OP_DUP OP_HASH160 751e76e8199196d454941c45d1b3a323f1433bd6 OP_EQUALVERIFY OP_CHECKSIG

public key: 0279be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798
first hash: 0f715baf5d4c2ed329785cef29e562f73488c8a2bb9dbc5700b361d54b9b0554
second hash: 751e76e8199196d454941c45d1b3a323f1433bd6

OP_RIPEMD160 751e76e8199196d454941c45d1b3a323f1433bd6 OP_EQUALVERIFY OP_CHECKSIG

Then, the solver can provide: " 0f715baf5d4c2ed329785cef29e562f73488c8a2bb9dbc5700b361d54b9b0554". Only the solver will know the first hash. And it is still not the public key, so it can be revealed, as a signal, to get it deeply confirmed, and to give the community a choice: "give me those coins now, if you want to see the solution". By scanning the blockchain, it is possible to determine, who was the first person, revealing the first hash on-chain. Also, because scripts are hidden behind hashes, nobody will fake that signal, if P2SH, P2WSH or P2TR will be deeply confirmed first.

If the community will verify that signal, and agree to deposit 6.6 BTC to get the solution, then the next Script can be constructed:

OP_SHA256 0f715baf5d4c2ed329785cef29e562f73488c8a2bb9dbc5700b361d54b9b0554 OP_EQUALVERIFY OP_CHECKSIG

In that case, this particular solver can provide: " ". Everyone will then try to grab the key for the puzzle, and clear it. However, the signature will protect the coins for the solver.
jr. member
Activity: 47
Merit: 12
gmaxwell creator of 1000 BTC puzzl + Pinapple fund
Please someone also try with a CPFP transaction. Maybe this confuses the other bots.
member
Activity: 499
Merit: 38
We could see a situation where multiple or thousands of bots continuously send replacement transactions, each one with progressively higher fees, trying to claim the coins for themselves. Since no bot is willing to give up the opportunity for another, this could result in a continuous increase in fees. In the end, almost all of the funds might be eaten up by transaction fees, with most of the money going to the miners.

Is it possible that someone runs a bot waiting for 66bit having fees set to almost all balance  just to piss everyone off ?  You know the answer  Grin

It doesn't matter whether the first replacement transaction or 24 in a row is 6 BTC; the result will be the same in the end.
newbie
Activity: 13
Merit: 0
Is it possible that someone runs a bot waiting for 66bit having fees set to almost all balance  just to piss everyone off ?  You know the answer  Grin


you have to stay infront of the computer to make it success.Bot  not working %100 automatic when the process gives error.
Also for me thats theft even ı loot it with the bot to prove something then I sent it back to the real owner
 Someone told 11 days ago found the key but who is the real owner of the puzzle 66 ?
I believe the first one find it should take the prize..
member
Activity: 122
Merit: 11
Is it possible that someone runs a bot waiting for 66bit having fees set to almost all balance  just to piss everyone off ?  You know the answer  Grin
member
Activity: 499
Merit: 38
I have managed to get a "Bot" but it's not a bot i have still to manually give the private key because i didn't know how to extract public key once its in the mempool plus i didn't know how to run Keyhunt or kangaroo after getting public key, sooooo i guess i'll have to be awake lol, i'm so bad


I would be happy for any improvement or any opinions if the following script may work?

I would like to ask for a small script that extract public key once it's seen on the mempool. I couldn't do it myself sadly. Could anyone help?

Thank you!
nomachine posted his bot a couple pages back that includes getting public key, running keyhunt, and sweeping funds.

Please note that this is not the definitive version. Everyone needs to test and retest to create the final version. However, it serves as an example of what it should look like. The bot PC should have nothing installed except the bot. Anything else can affect the response and screw up. A very good ping and a reliable connection to the mempool are crucial.

one of the clues:

This code only work for TX already confirmed

Code:
   while True:
        logging.info("Running scan...")
        pubkey = get_exact_public_key_unconfirmed(address) or get_exact_public_key_confirmed(address)
        if pubkey:
            logging.info(f"Extracted Public Key: {pubkey}")
            save_public_key(pubkey)

            # Uncomment to run Keyhunt (ensure you have the keyhunt tool and the correct parameters)
            run_keyhunt(pubkey)


I have two functions. One is for unconfirmed and the other for confirmed separately Grin
member
Activity: 43
Merit: 10
I got a bot online too, I'll get away from the PC now and leave it running.

Code:
Initializing Thief Bot v0...

Monitoring: 166Bitrbfa16oR7DKKSzgdhU4MpVKE4cKb
No outgoing transaction yet... [T: 1481]
newbie
Activity: 38
Merit: 0
I have managed to get a "Bot" but it's not a bot i have still to manually give the private key because i didn't know how to extract public key once its in the mempool plus i didn't know how to run Keyhunt or kangaroo after getting public key, sooooo i guess i'll have to be awake lol, i'm so bad


I would be happy for any improvement or any opinions if the following script may work?

I would like to ask for a small script that extract public key once it's seen on the mempool. I couldn't do it myself sadly. Could anyone help?

Thank you!
nomachine posted his bot a couple pages back that includes getting public key, running keyhunt, and sweeping funds.
Pages:
Jump to: