Pages:
Author

Topic: BitCrack - A tool for brute-forcing private keys - page 24. (Read 77647 times)

legendary
Activity: 952
Merit: 1386

Did BitCrack need fast speed for GPU with PCI-E 3.0 (x16)?
I would like to use with mainboard PCI-E 2.0
So, does it is effective to speed GPU or not?


I think it has impact on data transfer host<->device, so in my opinion you cannot expect any significant improvement, as GPU memory is not much used nor heavily loaded from the host. It would make a difference in GPU would processing a big amounts of data coming from the host for each launch of kernel.
member
Activity: 406
Merit: 47

Did BitCrack need fast speed for GPU with PCI-E 3.0 (x16)?
I would like to use with mainboard PCI-E 2.0
So, does it is effective to speed GPU or not?

jr. member
Activity: 32
Merit: 11
The solution :


python addresses_to_hash160.py addresses.txt hax160.bin
or
b58dec.exe addresses.txt hax160.bin


BinSort.exe 20 hax160.bin hax160sorted.bin
full member
Activity: 1232
Merit: 242
Shooters Shoot...
I try
kanhavishva/KeyHunt-Cuda
and
phrutis/Rotor-Cuda

AND DONT FIND THE KEYS !

FAKE ? SCAM ?

https://github.com/phrutis/Rotor-Cuda/issues/38
https://github.com/kanhavishva/KeyHunt-Cuda/issues/59
Yeah keyhunt-cuda definitely works.

What key were you looking for and what were your settings?
full member
Activity: 706
Merit: 111
I try
kanhavishva/KeyHunt-Cuda
and
phrutis/Rotor-Cuda

AND DONT FIND THE KEYS !

FAKE ? SCAM ?

https://github.com/phrutis/Rotor-Cuda/issues/38
https://github.com/kanhavishva/KeyHunt-Cuda/issues/59


They both work, it just depends on what key you are looking for.
legendary
Activity: 1568
Merit: 6660
bitcoincleanup.com / bitmixlist.org
Why do all programs/tools about bitcoin all-time download chrome browser warning to download and recommend deleting a file?
What algorithms or some code makes the browser check it and think can be harm the computer.
it happens with tools download from Github and open source code, bitcrack, kangaroo all get warning all-time download it.


Whenever you download a file, Google check its hash against a bunch of signatures that are known to belong to malware - the database is stored on Google's servers - and then presents a warning if it matches a hash of malware (whether it's EXE, ZIP or whatever).

Firefox would actually block you from downloading the file in such a case, and delete it instead.
member
Activity: 282
Merit: 20
the right steps towerds the goal
someone have any information about this transaction https://www.blockchain.com/btc/tx/d9a86250b7f93a112cb93903f44c6943464c546a703b58b6b852d59e3102b64d what he was trying to do Huh??
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
Why do all programs/tools about bitcoin all-time download chrome browser warning to download and recommend deleting a file?
What algorithms or some code makes the browser check it and think can be harm the computer.
it happens with tools download from Github and open source code, bitcrack, kangaroo all get warning all-time download it.


Because they have your BTC stealer inside...
hero member
Activity: 862
Merit: 662
Never run exe files of untrusted sources, if there are source available is better to compile it by yourself
member
Activity: 406
Merit: 47
Why do all programs/tools about bitcoin all-time download chrome browser warning to download and recommend deleting a file?
What algorithms or some code makes the browser check it and think can be harm the computer.
it happens with tools download from Github and open source code, bitcrack, kangaroo all get warning all-time download it.
legendary
Activity: 1568
Merit: 6660
bitcoincleanup.com / bitmixlist.org
There is no single tool which he is the author. There is no one single program written by him.
If you want reliability - go and find the original version, from the tool's author, not from that xero guy.
Maybe he has small dick or other complexes and that's why he is not using "fork" option on source repos, he wants projects to look like they were made by him?

I respect him for amount of time he must spend to monitor source repos and copy/paste diffs  Cheesy
So guys, you do not need to worry about virus or other bug hidden in his closed wif500 program, he is not able to do something like that.

I didn't check the repos (Github is a PITA to browse through lynx) but I can conclude two things from this:

a  - if the programs are open-source, then he just coppied the Git tree - anyone can do that. The commits still appear (unless you destroy the tree and create a new one - in which case nobody would really think you wrote the whole thing in 1 commit anyway) if you do a git log, so it's just a nuisance.
b  - the programs are all closed source like that sp-mod guy. In which case the most risk that would come from using it would be the code sending the rewards to some baked address inside the code (or if he is sufficiently insane, maybe he includes a piece of malware like the node-ipc maintainer).
full member
Activity: 1232
Merit: 242
Shooters Shoot...
It will be interesting to see/read about the wif500 and if they solve it.
I think it's just a clever scam.
The author claims that the photo is from a burnt diary in 2017, but the Ethereum address in the same photo was used in 2021, and just one day.
Why write this address and key in a diary if there was no balance on it at the time?
And even more so to use it after so many years..

0x428d88b326748ebd55c4a7f89fd3bc08378dc0d2
Well, outside looking in, whoever's address, they could still use it because they had the full private key and normally you create a wallet before there is a balance on it, whereas the btc address in question is missing the first part of the wif private key. I dunno...it will be interesting to see if the coins move anytime soon. As well as #64 and #120 Smiley
jr. member
Activity: 33
Merit: 7
It will be interesting to see/read about the wif500 and if they solve it.
I think it's just a clever scam.
The author claims that the photo is from a burnt diary in 2017, but the Ethereum address in the same photo was used in 2021, and just one day.
Why write this address and key in a diary if there was no balance on it at the time?
And even more so to use it after so many years..

0x428d88b326748ebd55c4a7f89fd3bc08378dc0d2
full member
Activity: 1232
Merit: 242
Shooters Shoot...
If his tools work, they work. If the challenge is fake or if you think its fake just don't participate in it.

There is no single tool which he is the author. There is no one single program written by him.
If you want reliability - go and find the original version, from the tool's author, not from that xero guy.
Maybe he has small dick or other complexes and that's why he is not using "fork" option on source repos, he wants projects to look like they were made by him?

copyoriginal
https://github.com/phrutis/Rotor-Cuda https://github.com/kanhavishva/KeyHunt-Cuda
https://github.com/phrutis/Fialkaagain https://github.com/kanhavishva/KeyHunt-Cuda
https://github.com/phrutis/WifSolverCudahttps://github.com/PawelGorny/WifSolverCuda
https://github.com/phrutis/Minikeyshttps://github.com/PawelGorny/MinikeyCuda
https://github.com/phrutis/Colliderhttps://github.com/Etayson/BSGS-cuda
https://github.com/phrutis/VanitySearch2https://github.com/phrutis/VanitySearch2
https://github.com/phrutis/BSGShttps://github.com/Mezantrop74/BSGS
https://github.com/phrutis/BIPsImplementationhttps://github.com/BilawalAhmed0900/BIPsImplementation
https://github.com/phrutis/PubHunthttps://github.com/kanhavishva/PubHunt

I respect him for amount of time he must spend to monitor source repos and copy/paste diffs  Cheesy
So guys, you do not need to worry about virus or other bug hidden in his closed wif500 program, he is not able to do something like that.

I've looked at two of his repos; they are different than the originals and he gave credit to original programmer.
If you take an existing program and change it to different things, is that a fork or a new master? I do not know...I imagine you could fork and make changes.
It will be interesting to see/read about the wif500 and if they solve it.
member
Activity: 170
Merit: 58
If his tools work, they work. If the challenge is fake or if you think its fake just don't participate in it.

There is no single tool which he is the author. There is no one single program written by him.
If you want reliability - go and find the original version, from the tool's author, not from that xero guy.
Maybe he has small dick or other complexes and that's why he is not using "fork" option on source repos, he wants projects to look like they were made by him?

copyoriginal
https://github.com/phrutis/Rotor-Cuda https://github.com/kanhavishva/KeyHunt-Cuda
https://github.com/phrutis/Fialkaagain https://github.com/kanhavishva/KeyHunt-Cuda
https://github.com/phrutis/WifSolverCudahttps://github.com/PawelGorny/WifSolverCuda
https://github.com/phrutis/Minikeyshttps://github.com/PawelGorny/MinikeyCuda
https://github.com/phrutis/Colliderhttps://github.com/Etayson/BSGS-cuda
https://github.com/phrutis/VanitySearch2https://github.com/phrutis/VanitySearch2
https://github.com/phrutis/BSGShttps://github.com/Mezantrop74/BSGS
https://github.com/phrutis/BIPsImplementationhttps://github.com/BilawalAhmed0900/BIPsImplementation
https://github.com/phrutis/PubHunthttps://github.com/kanhavishva/PubHunt

I respect him for amount of time he must spend to monitor source repos and copy/paste diffs  Cheesy
So guys, you do not need to worry about virus or other bug hidden in his closed wif500 program, he is not able to do something like that.
full member
Activity: 706
Merit: 111
You can use this too for Hash160 https://github.com/phrutis/Rotor-Cuda you can use a GPU with this.

Use whatever you want, just not from that russian thief. All he does is copy/paste from other repos (not fork), he changes name and says like it belongs to him.

I also cannot recommend his tools, especially when he ran shady brute-force challenge[1]. But i'm not sure he can be called thief when AFAIK he don't violate original repository license. Although i can understand uneasiness that he don't use GitHub fork feature when the original source code also hosted on GitHub.

[1] https://bitcointalksearch.org/topic/challenge-or-scam-or-nothing-5394745

If his tools work, they work. If the challenge is fake or if you think its fake just don't participate in it.
member
Activity: 170
Merit: 58
@fxsniper
Hello
You won't notice much speed difference on this case.
Only thing pubkey bruteforce fastest is BSGS, because it's come after only 1 step(value*G). no need double SHA2,RIPEMD160,BASE8
address or RIPEMD160 won't make much noticeable difference in bruteforce.


OK, I just think simple maybe calculate SHA-256 and RIPEMD160 it is maybe fast that Elliptic curve point calculate
I think with 1 step(value*G). it is calculated 256 times (loop) for each bit  maybe make full key brute-force slow

You can use this too for Hash160 https://github.com/phrutis/Rotor-Cuda you can use a GPU with this.

Use whatever you want, just not from that russian thief. All he does is copy/paste from other repos (not fork), he changes name and says like it belongs to him.
full member
Activity: 706
Merit: 111
@fxsniper
Hello
You won't notice much speed difference on this case.
Only thing pubkey bruteforce fastest is BSGS, because it's come after only 1 step(value*G). no need double SHA2,RIPEMD160,BASE8
address or RIPEMD160 won't make much noticeable difference in bruteforce.


OK, I just think simple maybe calculate SHA-256 and RIPEMD160 it is maybe fast that Elliptic curve point calculate
I think with 1 step(value*G). it is calculated 256 times (loop) for each bit  maybe make full key brute-force slow

You can use this too for Hash160 https://github.com/phrutis/Rotor-Cuda you can use a GPU with this.
member
Activity: 406
Merit: 47
@fxsniper
Hello
You won't notice much speed difference on this case.
Only thing pubkey bruteforce fastest is BSGS, because it's come after only 1 step(value*G). no need double SHA2,RIPEMD160,BASE8
address or RIPEMD160 won't make much noticeable difference in bruteforce.


OK, I just think simple maybe calculate SHA-256 and RIPEMD160 it is maybe fast that Elliptic curve point calculate
I think with 1 step(value*G). it is calculated 256 times (loop) for each bit  maybe make full key brute-force slow
member
Activity: 70
Merit: 53
@fxsniper
Hello
You won't notice much speed difference on this case.
Only thing pubkey bruteforce fastest is BSGS, because it's come after only 1 step(value*G). no need double SHA2,RIPEMD160,BASE8
address or RIPEMD160 won't make much noticeable difference in bruteforce.
Pages:
Jump to: