Pages:
Author

Topic: BitCrack - A tool for brute-forcing private keys - page 60. (Read 76850 times)

newbie
Activity: 11
Merit: 0
I am looking for random version, so every key is is generated random, is there any version.

@escobol told me off-forum that he had someone make such a version for him so you might want to PM him for access to that.

How do I contact him facebook, twitter, telegram
full member
Activity: 1162
Merit: 237
Shooters Shoot...


K((z1*s2 - z2*s1)/(r*(s1-s2)))

Hi. Sach formulas work especialy with vulnerable sighnatures  for ex with nonce

right this formula very hard to use I see a lot of talk with this formula  on this forum still not success to use

Cobras struggles with the formula, many people do. The fact is, their are bots monitoring for these types of things and the funds will be snatched up immediately if a vulnerable signature is found.
member
Activity: 406
Merit: 47


K((z1*s2 - z2*s1)/(r*(s1-s2)))

Hi. Sach formulas work especialy with vulnerable sighnatures  for ex with nonce

right this formula very hard to use I see a lot of talk with this formula  on this forum still not success to use
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
Done bitcrack do brute-forcing with use algorithm like this

~

The brute forcing here is just incrementing the private key and using ECC to turn it into a public key and then a SHA256 hash.

I think bitcrack random private key first and convert to address and check meet target or not right?
(may be random hex 64 digits)

It really depends on the RNG, I think searching linearly sucks because nobody's going to have a private key that's between 0 and say 2^200 and this is the range being searched first which is a gigantic waste of time, of course you can use the keyspace option to exclude that range but then you have 2^200 more ranges of numbers in different places in he middle that can't be excluded like that.

Random is the best way to get keys, seeded with the current time and some other stuff at least. It does not have to be cryptographically secure. It needs to be a fast pseudo-random generator because it will be called on each iteration (or caches every 1,000,000 random numbers)

bitcrack private keys with use Pollard's kangaroo calculate and jump number on key space
may be can like kangaroo curve and move
may be just use some part but not use wild tame meet

bitcrack private keys with use Baby Step Giant Step calculate and move step number on key space

I am wary of using Pollard's Kangaroo here because the point of this program is to find private keys in the entire range and not a closed range. Pollard's Rho is like Kangaroo but it does search the whole range (and is faster than BSGS but obviously slower than Kangaroo).

bitcrack private keys with use pub key convert to x y and use it multiply to on key space

This is pretty much what it does already.

bitcrack private keys with use formula like  K((z1*s2 - z2*s1)/(r*(s1-s2))) or other formula and scan around

There are some signatures with reused r-values so that could be taken into account to make some kind of equation (or at least an approximation) for the private key that also searches keys around it.

We also already have equations that find a private key that is related to another by mK+n, I am certain there is one for higher orders too but I haven't had time to find them.

K((z1*s2 - z2*s1)/(r*(s1-s2)))

Hi. Sach formulas work especialy with vulnerable sighnatures  for ex with nonce
legendary
Activity: 1568
Merit: 6660
bitcoincleanup.com / bitmixlist.org
Done bitcrack do brute-forcing with use algorithm like this

~

The brute forcing here is just incrementing the private key and using ECC to turn it into a public key and then a SHA256 hash.

I think bitcrack random private key first and convert to address and check meet target or not right?
(may be random hex 64 digits)

It really depends on the RNG, I think searching linearly sucks because nobody's going to have a private key that's between 0 and say 2^200 and this is the range being searched first which is a gigantic waste of time, of course you can use the keyspace option to exclude that range but then you have 2^200 more ranges of numbers in different places in he middle that can't be excluded like that.

Random is the best way to get keys, seeded with the current time and some other stuff at least. It does not have to be cryptographically secure. It needs to be a fast pseudo-random generator because it will be called on each iteration (or caches every 1,000,000 random numbers)

bitcrack private keys with use Pollard's kangaroo calculate and jump number on key space
may be can like kangaroo curve and move
may be just use some part but not use wild tame meet

bitcrack private keys with use Baby Step Giant Step calculate and move step number on key space

I am wary of using Pollard's Kangaroo here because the point of this program is to find private keys in the entire range and not a closed range. Pollard's Rho is like Kangaroo but it does search the whole range (and is faster than BSGS but obviously slower than Kangaroo).

bitcrack private keys with use pub key convert to x y and use it multiply to on key space

This is pretty much what it does already.

bitcrack private keys with use formula like  K((z1*s2 - z2*s1)/(r*(s1-s2))) or other formula and scan around

There are some signatures with reused r-values so that could be taken into account to make some kind of equation (or at least an approximation) for the private key that also searches keys around it.

We also already have equations that find a private key that is related to another by mK+n, I am certain there is one for higher orders too but I haven't had time to find them.
member
Activity: 406
Merit: 47
I am not programmer

hope so someone forked bitcrack to have more option or upgrade to next generation bitcrack


now bitcrack is do brute force straight directly by random

I think bitcrack random private key first and convert to address and check meet target or not right?
(may be random hex 64 digits)

What version think may be better?

bitcrack private keys with random split key space to small under limited size 2^41 to small
like from large areal split to small area and scan one by one or random area and finish one by one may be each area use time 1 hour each (or max 5 hour)

bitcrack private keys with use Pollard's kangaroo calculate and jump number on key space
may be can like kangaroo curve and move
may be just use some part but not use wild tame meet

bitcrack private keys with use Baby Step Giant Step calculate and move step number on key space

bitcrack private keys with use pub key convert to x y and use it multiply to on key space

bitcrack private keys with use formula like  K((z1*s2 - z2*s1)/(r*(s1-s2))) or other formula and scan around

not yet think about on detail and how can possible to do, just think an idea only.
just think about how can upgrade bitcrack to better

may be need to make it split to new one program not incudes with standard version

high bits is area that very large too much it is need to calculate key space before search


other idea
if not modify bitcrack direcly
make some program algorithm or strategy search to call bitcrack to work (may be make it slow works use two program work)
but bitcrack build-in system may be work faster than
or put new algorithm to bitcrack require to modify

full member
Activity: 1162
Merit: 237
Shooters Shoot...

Can I compile bitcrack use on visual studio 2019 community edition?

what module on visual studio 2019 need to be install

just world like to try compiled bitrack new one on windows 10
Yes, that is the Visual Studio I use and I have compiled bitcrack using it. You may have to change the CUDA props in the .vcxproj file; I can't remember but if you get an error stating it can only be compiled with an older version of VS, then change the props to say 10.2; I know that one works.  
There will be two lines that you need to change the CUDA props, example looks like this:
Code:
Import Project="$(VCTargetsPath)\BuildCustomizations\CUDA 10.2.targets"

With that said, you will have to download the applicable CUDA, i.e. 10.2, 10.1, 11.0, etc. for whichever CUDA you decide to compile with.
member
Activity: 406
Merit: 47

Can I compile bitcrack use on visual studio 2019 community edition?

what module on visual studio 2019 need to be install

just world like to try compiled bitrack new one on windows 10
jr. member
Activity: 64
Merit: 1
is it possible to run the software with a AMD card? Or exist a kind if this software that is working with ADM driver / cards?
You'd have to run it with the clBitcrack (versus the cuBitcrack) but I have seen mixed reviews on it's ability to find key; I know the latest release (31, I think, doesn't seem to work with clBitcrack; I would try one version down from the latest one, and try to find a key in a small range first, to make sure it works.
I tried and it works perfect on 0.30 clbitcrack, but not on 0.31. 0.31 only can find the first couple puzzle keys. I have tested both 63 and 62, it will miss the private key with Reached End of Keyspace.
full member
Activity: 1162
Merit: 237
Shooters Shoot...
is it possible to run the software with a AMD card? Or exist a kind if this software that is working with ADM driver / cards?
You'd have to run it with the clBitcrack (versus the cuBitcrack) but I have seen mixed reviews on it's ability to find key; I know the latest release (31, I think, doesn't seem to work with clBitcrack; I would try one version down from the latest one, and try to find a key in a small range first, to make sure it works.
legendary
Activity: 3500
Merit: 2792
Enjoy 500% bonus + 70 FS
is it possible to run the software with a AMD card? Or exist a kind if this software that is working with ADM driver / cards?
jr. member
Activity: 64
Merit: 1

I was thinking the same thing however, my Vega 7s get no where close to that speed nor my 1660Tis. Who knows...

Yeah, his speed is like 4 times the speed my 3080s do and afaik these do top-speed atm on opencl version.
But I mean, AMD & openCL do work better together. But THIS good?  Undecided

I guess ROG Zephyrus G14 he had mentioned with 1660 Tis is GA401l-U, which also using Vega 7 except GA401l-V with 2060 is Vega 8. But 5900++ mkey/sec are just insane number. Even clbitcrack 0.31 that couldn't find key will not show that kind of speed. Not sure what he shown were accurate speed. If it does, then really worth buying. I don't think AMD with openCL that good, I have both Nvidia and AMD card, pretty sure that cubitcrack outperform clbitcrack even with lower performance Nvidia card.

Anyone have the same laptop to test it out? I am considering to buy a new laptop, so if the speed he shown were accurate, then I can consider to buy it. From what I know on clbitcrack 0.31, the speed were accurate as 0.30 but it can't find keys, especially if you use --continue flag, it will shows you different keyspace that has completed way ahead from where you stop. I did the math according to his search time since he didn't stop at all, indeed it was 5900++ Mkey/sec and not faulty keyspace meter.
jr. member
Activity: 64
Merit: 1

I was thinking the same thing however, my Vega 7s get no where close to that speed nor my 1660Tis. Who knows...

Yeah, his speed is like 4 times the speed my 3080s do and afaik these do top-speed atm on opencl version.
But I mean, AMD & openCL do work better together. But THIS good?  Undecided

I guess ROG Zephyrus G14 he had mentioned with 1660 Tis is GA401l-U, which also using Vega 7 except GA401l-V with 2060 is Vega 8. But 5900++ mkey/sec are just insane number. Even clbitcrack 0.31 that couldn't find key will not show that kind of speed. Not sure what he shown were accurate speed. If it does, then really worth buying. I don't think AMD with openCL that good, I have both Nvidia and AMD card, pretty sure that cubitcrack outperform clbitcrack even with lower performance Nvidia card.
member
Activity: 406
Merit: 47
2. What is the simple mathematical problem? Finding private key if someone reuse k value?

What is that? Is it similar to this: https://allprivatekeys.com/random-vulnerability

Exactly same with link you share. Here's similar topic which mention k value, https://bitcoin.stackexchange.com/q/35848

Then don't worry. Last month I've checked all of bitcoin addresses for this and found like 1000 addresses with this vulnerability and only 3 with balances. All 3 <500 sats. So, you won't find anything new...

I know, it's just problem with the implementation, not the cryptography itself.

a lot of people know how to from this article already 9a lot of people copy article it can found on google search multiple blog)

check sample transaction have r s z value, all zero balance already

Unfortunately all address list on puzzle can not find z value or have only 1 z value, not enough to useful
still very hard to calculate with that method

however good article and knowledge



member
Activity: 406
Merit: 47

how to find those address ?? .....
16jY7qLJ*********************
all in range 8000000000000000:10000000000000000
I think you solved it  #64
 


 
still very high rank

I try focus to below 1 trillion in rank

too high

Code:
16jY7qLJnN4eqD1eArr9vRVABixvcbLyXY,09A97E3E4A6A15391,11139622774511850385
16jY7qLJNSJnur5KVhoaKC25ZVyP2LpGuj,09CA0EFE4DC9C4B72,11286284432423275378
16jY7qLJuZ4WrwBbbAoHSsd9tf74x55oCG,0A199E4EEF9FABBB7,11644590026590436279
16jY7qLJpeQTfzX1SYgoNWDmqwsq9kCeJ1,0A3ABFF4956D1E3CF,11793800739654067151
16jY7qLJzxMfbfrxVjdzKVcMYuABMT3JUg,0A447E8DC181F71AF,11837686177561801135
16jY7qLJFMG4uGLQ6p2NK71KSMn1ZsHnR1,0A792E0E2AB63BC53,12074960815076392019
16jY7qLJ1itzy2eqPDW3EnDrFAMi94pkRw,0A9F727369AB8A72C,12247300827134863148
16jY7qLJ48zRMcRFt25ZgMwaLGUS4xnGp9,0B1E3FF83D3C2CADA,12818369906085120730
16jY7qLJ2aBYPJHvYZCexMtX9As7YXKTXa,0B22925E55D30526E,12837833879837495918
16jY7qLJf5WRNQsr4M7PHw3CcdUkjjiTcD,0B24147E4FA620801,12844626661016209409
16jY7qLJyE4Cspx2xJZimnKFDu1mA5v8q4,0BC9264E45AB665AF,13588033957667431855
16jY7qLJfn6u2bhsqryEBfJrUqmyYtwvMw,0BCADEFE466EB45B3,13595786614359672243
16jY7qLJD6fvZebckbnmBCqyu2uDwRqii6,0BE0F6652B041E9C5,13695277497187428805
16jY7qLJwdUDparg4Y3EgFpAhZNHTSkPFt,0C06D61514D867204,13865845829564527108
16jY7QLjn6MEodyvdGc1w1oiKSBoC4beMa,0C16D9AFCE49A235B,13937966832739296091
16jY7qLJSYVeyhvHbEC7LwgFQnVgPai56w,0C447A5E4210BCE22,14143455554005880354
16jY7qLJ8BQQDJJjRUop7FEiEyJJCR2ZE9,0C44875E4EF637660,14143684255886308960
16jY7qLJn19vvyctGxbtBuJrrpRCt5er9H,0C44B91E42375905B,14144559463720652891
16jY7qLJpG8FVrMLbk6NBtWMiejrKgEd5q,0C653BCE4B4967446,14290973733045040198
16jY7qLJxw7aXRjDTLutu7BC5Wp1LqKBPc,0C87506E4F8BA10EC,14444458960355987692
16jY7qLJzqL7qGrCz9joUf3qkTqUwygnez,0C8E6ACD0039891A4,14476448061642543524
16jY7qLJiGvJJajVN5anM8wbkW2x6JDsbx,0C9C883940AF8DF68,14540016068828127080
16jY7qLJUV3uavsiC9F69PtoCvXzcnrQpw,0CC910FE39C32DC0B,14740580525612915723
16jY7qLJSabEVThGZ58M6KmuKvaYKbkJqJ,0CC931AE3E13C6F30,14741155571352497968
16jY7qLJavMWDu8C9AGuH9LXHFyJVZHSMy,0CC9525E3226024A4,14741730612731716772
16jY7qLJpBTbteT7BCKPPrdtgwRbd2g6xe,0CC9633E407F8086A,14742027484723153002
16jY7qLJsaainy7EAxWCmsDGg934UdQujU,0CC98E9E362CC4542,14742790543021720898
16jY7qLJbYbK2DTYqDih9d1fhui4eELaBr,0CD51EFE3E898CE22,14794870013027733026
16jY7qLJjWKajipMwHwgFd7R5gYWDRVxvX,0CEAEFDE46E720BA0,14893120175308147616
16jY7qLJHmJ1N3frmsNRJhXYwXk4pz9dBP,0D64F13C3A8A5A56C,15442583378345698668
16jY7qLJrGLxGSzddR5KcJHe8wMXPKvoZ5,0D6DF549B417D5F5F,15483187069718454111
16jY7qLJeBU1dWv6Gw7cNFdpEfssB6nM6p,0D7C3610CACD10E2F,15547377045679967791
16jY7qLJ3ueYvr33g8f3WMxMUKubDfyTYt,0DBB6EEE24AF250E0,15832104195754971360
16jY7qLJySCNV747Z89CXnYnhC8sBETpAq,0DC7A6954459982B4,15887126446168703668
16jY7qLJtSouCs3cVpeZFMynfCZcUYhBJL,0E2C7BCE4D98A1CEF,16341237464025406703
16jY7qLJg8UVMsNVgmDkU5LYfnUvcHFgHE,0E7734AEB1A2C68A4,16677756218699966628
16jY7qLJbpczaisuZfaGAwGtmyYgpyikCa,0E859E5E2400E0E2D,16742665849626562093
16jY7qLJZRNXy8sYPcy8icoaHTszZzrmxY,0E9ACEEE0A95849D1,16838095755512662481
16jY7qLJceFLCRJ3W5VDvFfBagQVpde5Pj,0ECA0EFE42AB81E7D,17050891952472989309
16jY7qLJceFLCRJ3W5VDvFfBagQVpde5Pj,0ECA0EFE42AB81E7D,17050891952472989309
16jY7qLJTeYW5FumLwXdjQVG9siirnups8,0ECA7EFE46C1094D9,17052862278406280409
16jY7qLJ6AkxWNMXHHiWL6nQS8sAfijdjm,0F04C4D5648DC1F94,17315299700317626260
16jY7qLJmHoEkEbsaw8rMXUKT6VxJ6tCV1,0F07A6E5B3C4671AA,17328283854393733546
16jY7qLJZTyb8ammZufMPy1gTktDm6tKSx,0F257E7D91DC58530,17462680999845791024
16jY7qLJ7xMpwdjzoW3zsaESTwy9tekRxA,0F2624F96E4B0F443,17465609814396695619
16jY7qLJnNtLkE51fgNsMqYAZ5i6LqURJm,0F262E8D54F236F43,17465778307749605187
16jY7qLJBSqbwDwVa11q4HFr4237sEypfZ,0F2CDEF415A50F2BC,17495903191371412156
16jY7qLJJa2D8Q7aNSt818G47epM2rwsou,0F618E4E0BEFB65C1,17733175186699281857
16jY7qLJevsjxqTvRGUfjEhSKjnceRew5h,0FB72665B09D2E273,18118656792057799283
16jY7qLJWQnhf9uUKSyAW1WbgGVYvBmLgy,0FE9264E43F208CCF,18343835163707870415
16jY7qLJeSKNp2iZDStRSn4Vq9Qp9N76cR,0FF854CE413430A01,18412207194033555969
16jY7qLJxeuWjZKR25E4v8ZBnEPvxwg3hu,0FFBD79E6D341D584,18428019282563683716
16jY7qLJAi1LdLnfSX6BPkntA4NypEXnZr,0F02DB8E20CFB42B0,17306692224074597040


Code:
11139622774511850385,16jY7qLJnN4eqD1eArr9vRVABixvcbLyXY,09A97E3E4A6A15391
11286284432423275378,16jY7qLJNSJnur5KVhoaKC25ZVyP2LpGuj,09CA0EFE4DC9C4B72
11644590026590436279,16jY7qLJuZ4WrwBbbAoHSsd9tf74x55oCG,0A199E4EEF9FABBB7
11793800739654067151,16jY7qLJpeQTfzX1SYgoNWDmqwsq9kCeJ1,0A3ABFF4956D1E3CF
11837686177561801135,16jY7qLJzxMfbfrxVjdzKVcMYuABMT3JUg,0A447E8DC181F71AF
12074960815076392019,16jY7qLJFMG4uGLQ6p2NK71KSMn1ZsHnR1,0A792E0E2AB63BC53
12247300827134863148,16jY7qLJ1itzy2eqPDW3EnDrFAMi94pkRw,0A9F727369AB8A72C
12818369906085120730,16jY7qLJ48zRMcRFt25ZgMwaLGUS4xnGp9,0B1E3FF83D3C2CADA
12837833879837495918,16jY7qLJ2aBYPJHvYZCexMtX9As7YXKTXa,0B22925E55D30526E
12844626661016209409,16jY7qLJf5WRNQsr4M7PHw3CcdUkjjiTcD,0B24147E4FA620801
13588033957667431855,16jY7qLJyE4Cspx2xJZimnKFDu1mA5v8q4,0BC9264E45AB665AF
13595786614359672243,16jY7qLJfn6u2bhsqryEBfJrUqmyYtwvMw,0BCADEFE466EB45B3
13695277497187428805,16jY7qLJD6fvZebckbnmBCqyu2uDwRqii6,0BE0F6652B041E9C5
13865845829564527108,16jY7qLJwdUDparg4Y3EgFpAhZNHTSkPFt,0C06D61514D867204
13937966832739296091,16jY7QLjn6MEodyvdGc1w1oiKSBoC4beMa,0C16D9AFCE49A235B
14143455554005880354,16jY7qLJSYVeyhvHbEC7LwgFQnVgPai56w,0C447A5E4210BCE22
14143684255886308960,16jY7qLJ8BQQDJJjRUop7FEiEyJJCR2ZE9,0C44875E4EF637660
14144559463720652891,16jY7qLJn19vvyctGxbtBuJrrpRCt5er9H,0C44B91E42375905B
14290973733045040198,16jY7qLJpG8FVrMLbk6NBtWMiejrKgEd5q,0C653BCE4B4967446
14444458960355987692,16jY7qLJxw7aXRjDTLutu7BC5Wp1LqKBPc,0C87506E4F8BA10EC
14476448061642543524,16jY7qLJzqL7qGrCz9joUf3qkTqUwygnez,0C8E6ACD0039891A4
14540016068828127080,16jY7qLJiGvJJajVN5anM8wbkW2x6JDsbx,0C9C883940AF8DF68
14740580525612915723,16jY7qLJUV3uavsiC9F69PtoCvXzcnrQpw,0CC910FE39C32DC0B
14741155571352497968,16jY7qLJSabEVThGZ58M6KmuKvaYKbkJqJ,0CC931AE3E13C6F30
14741730612731716772,16jY7qLJavMWDu8C9AGuH9LXHFyJVZHSMy,0CC9525E3226024A4
14742027484723153002,16jY7qLJpBTbteT7BCKPPrdtgwRbd2g6xe,0CC9633E407F8086A
14742790543021720898,16jY7qLJsaainy7EAxWCmsDGg934UdQujU,0CC98E9E362CC4542
14794870013027733026,16jY7qLJbYbK2DTYqDih9d1fhui4eELaBr,0CD51EFE3E898CE22
14893120175308147616,16jY7qLJjWKajipMwHwgFd7R5gYWDRVxvX,0CEAEFDE46E720BA0
15442583378345698668,16jY7qLJHmJ1N3frmsNRJhXYwXk4pz9dBP,0D64F13C3A8A5A56C
15483187069718454111,16jY7qLJrGLxGSzddR5KcJHe8wMXPKvoZ5,0D6DF549B417D5F5F
15547377045679967791,16jY7qLJeBU1dWv6Gw7cNFdpEfssB6nM6p,0D7C3610CACD10E2F
15832104195754971360,16jY7qLJ3ueYvr33g8f3WMxMUKubDfyTYt,0DBB6EEE24AF250E0
15887126446168703668,16jY7qLJySCNV747Z89CXnYnhC8sBETpAq,0DC7A6954459982B4
16341237464025406703,16jY7qLJtSouCs3cVpeZFMynfCZcUYhBJL,0E2C7BCE4D98A1CEF
16677756218699966628,16jY7qLJg8UVMsNVgmDkU5LYfnUvcHFgHE,0E7734AEB1A2C68A4
16742665849626562093,16jY7qLJbpczaisuZfaGAwGtmyYgpyikCa,0E859E5E2400E0E2D
16838095755512662481,16jY7qLJZRNXy8sYPcy8icoaHTszZzrmxY,0E9ACEEE0A95849D1
17050891952472989309,16jY7qLJceFLCRJ3W5VDvFfBagQVpde5Pj,0ECA0EFE42AB81E7D
17050891952472989309,16jY7qLJceFLCRJ3W5VDvFfBagQVpde5Pj,0ECA0EFE42AB81E7D
17052862278406280409,16jY7qLJTeYW5FumLwXdjQVG9siirnups8,0ECA7EFE46C1094D9
17306692224074597040,16jY7qLJAi1LdLnfSX6BPkntA4NypEXnZr,0F02DB8E20CFB42B0
17315299700317626260,16jY7qLJ6AkxWNMXHHiWL6nQS8sAfijdjm,0F04C4D5648DC1F94
17328283854393733546,16jY7qLJmHoEkEbsaw8rMXUKT6VxJ6tCV1,0F07A6E5B3C4671AA
17462680999845791024,16jY7qLJZTyb8ammZufMPy1gTktDm6tKSx,0F257E7D91DC58530
17465609814396695619,16jY7qLJ7xMpwdjzoW3zsaESTwy9tekRxA,0F2624F96E4B0F443
17465778307749605187,16jY7qLJnNtLkE51fgNsMqYAZ5i6LqURJm,0F262E8D54F236F43
17495903191371412156,16jY7qLJBSqbwDwVa11q4HFr4237sEypfZ,0F2CDEF415A50F2BC
17733175186699281857,16jY7qLJJa2D8Q7aNSt818G47epM2rwsou,0F618E4E0BEFB65C1
18118656792057799283,16jY7qLJevsjxqTvRGUfjEhSKjnceRew5h,0FB72665B09D2E273
18343835163707870415,16jY7qLJWQnhf9uUKSyAW1WbgGVYvBmLgy,0FE9264E43F208CCF
18412207194033555969,16jY7qLJeSKNp2iZDStRSn4Vq9Qp9N76cR,0FF854CE413430A01
18428019282563683716,16jY7qLJxeuWjZKR25E4v8ZBnEPvxwg3hu,0FFBD79E6D341D584

legendary
Activity: 1568
Merit: 6660
bitcoincleanup.com / bitmixlist.org
I am looking for random version, so every key is is generated random, is there any version.

@escobol told me off-forum that he had someone make such a version for him so you might want to PM him for access to that.
newbie
Activity: 11
Merit: 0
I am looking for random version, so every key is is generated random, is there any version.
full member
Activity: 706
Merit: 111
2. What is the simple mathematical problem? Finding private key if someone reuse k value?

What is that? Is it similar to this: https://allprivatekeys.com/random-vulnerability

Then don't worry. Last month I've checked all of bitcoin addresses for this and found like 1000 addresses with this vulnerability and only 3 with balances. All 3 <500 sats. So, you won't find anything new...

Might as well go after addresses with exposed public keys then.
newbie
Activity: 18
Merit: 1
2. What is the simple mathematical problem? Finding private key if someone reuse k value?

What is that? Is it similar to this: https://allprivatekeys.com/random-vulnerability

Then don't worry. Last month I've checked all of bitcoin addresses for this and found like 1000 addresses with this vulnerability and only 3 with balances. All 3 <500 sats. So, you won't find anything new...
Pages:
Jump to: