Pages:
Author

Topic: Collection of 18.509 found and used Brainwallets - page 6. (Read 30938 times)

legendary
Activity: 2268
Merit: 1092
BTW, wallet software is pretty centralized anyway, right? Smiley I would actually appreciate if a wallet popped up a warning that my funds were likely to be lost.
I see no point in this. If I'm paying someone who sent me a compromized address, he could just as well scam me by using a brand new address so this doesn't help.

I don't understand your point. Why would a scammer invite you to send money to an address where the private key is known by multiple people?

This is nothing to do with scamming - it's about preventing mistakes. Like people sending to the brainwallet "password", or software having a brain fart and sending to the hash of a blank string.

Original post for more context: https://bitcointalksearch.org/topic/m.52494961
legendary
Activity: 3290
Merit: 16489
Thick-Skinned Gang Leader and Golden Feather 2021
BTW, wallet software is pretty centralized anyway, right? Smiley I would actually appreciate if a wallet popped up a warning that my funds were likely to be lost.
I see no point in this. If I'm paying someone who sent me a compromized address, he could just as well scam me by using a brand new address so this doesn't help. If my own wallet generates a new address, proper random generation should ensure it's not part of such a list. You could easily create and publish billions of private keys, I don't want such a database bloating my wallet.
If you're manually creating such an address using dumb methods, you're on your own Tongue
legendary
Activity: 2268
Merit: 1092
I think it would be a good idea if wallet software included a blacklist of such addresses, as well as known weak brainwallets, showing an additional dialog with a strong warning that funds may be permanently lost (or stolen) if the transaction proceeds. Checking any generated (inbound) addresses against the list would also help catch any glaring address generation bugs. (An assert that the result must not equal after each call to sha256 or ripemd160 would have caught this error.)

centralized database of bad addys?

may sound good on 1st glance but nope for me.

maybe check against some private, local blacklist maintained by the user but thats up the user.

EDIT: saw that post was 7 months old oops



The blacklist check doesn't need to block the transaction, just strongly advise that it's a known compromised/problem address and to double check that everything is correct before clicking on OK.

It's not a general blacklist, just specifically for addresses where the keys are widely known (SHA256 dictionary words, low range private keys) or they are 99.99999999% likely to be unspendable (address of 0, RIPEMD160 hash of dictionary words, RIPEMD160 hash of empty string).

Perhaps you think I was suggesting that there should be some global "this person ripped me off so I want to add their address" kind of thing... no.

BTW, wallet software is pretty centralized anyway, right? Smiley I would actually appreciate if a wallet popped up a warning that my funds were likely to be lost.
member
Activity: 180
Merit: 38
I thought this was a little cute

Code:
printf '\xF0\x9F\x92\xA9' | sha256sum
34722ef0267ceda14f0e2b756b83e85d6e79e458967895e72b07f87da7c0e275
5JDPFAB3Nt52bb2kQ4Sw2vi5JCi5LvPYdxtZu9LysDT52R2HBzh
1CNmL3ECHtAPxb9QZWrW29bq4t9T4SDUR4

https://www.blockchain.com/btc/address/1CNmL3ECHtAPxb9QZWrW29bq4t9T4SDUR4

Since it is (pseudocode): SHA256(poop emoji)

(Reference: https://www.fileformat.info/info/unicode/char/1f4a9/index.htm)

Conclusion: Add emojis to your wordlists  Smiley


Dear Sir,
You are really great. But i have a question that the value of '\xF0\x9F\x92\xA9' how to find and where from found......

Hi please see emoji bytecode here https://apps.timwhitlock.info/emoji/tables/unicode  Smiley
legendary
Activity: 4312
Merit: 3517
what is this "brake pedal" you speak of?
I think it would be a good idea if wallet software included a blacklist of such addresses, as well as known weak brainwallets, showing an additional dialog with a strong warning that funds may be permanently lost (or stolen) if the transaction proceeds. Checking any generated (inbound) addresses against the list would also help catch any glaring address generation bugs. (An assert that the result must not equal after each call to sha256 or ripemd160 would have caught this error.)

centralized database of bad addys?

may sound good on 1st glance but nope for me.

maybe check against some private, local blacklist maintained by the user but thats up the user.

EDIT: saw that post was 7 months old oops

newbie
Activity: 24
Merit: 0
I thought this was a little cute

Code:
printf '\xF0\x9F\x92\xA9' | sha256sum
34722ef0267ceda14f0e2b756b83e85d6e79e458967895e72b07f87da7c0e275
5JDPFAB3Nt52bb2kQ4Sw2vi5JCi5LvPYdxtZu9LysDT52R2HBzh
1CNmL3ECHtAPxb9QZWrW29bq4t9T4SDUR4

https://www.blockchain.com/btc/address/1CNmL3ECHtAPxb9QZWrW29bq4t9T4SDUR4

Since it is (pseudocode): SHA256(poop emoji)

(Reference: https://www.fileformat.info/info/unicode/char/1f4a9/index.htm)

Conclusion: Add emojis to your wordlists  Smiley


Dear Sir,
You are really great. But i have a question that the value of '\xF0\x9F\x92\xA9' how to find and where from found......
copper member
Activity: 193
Merit: 234
Click "+Merit" top-right corner
I thought this was a little cute

Code:
printf '\xF0\x9F\x92\xA9' | sha256sum
34722ef0267ceda14f0e2b756b83e85d6e79e458967895e72b07f87da7c0e275
5JDPFAB3Nt52bb2kQ4Sw2vi5JCi5LvPYdxtZu9LysDT52R2HBzh
1CNmL3ECHtAPxb9QZWrW29bq4t9T4SDUR4

https://www.blockchain.com/btc/address/1CNmL3ECHtAPxb9QZWrW29bq4t9T4SDUR4

Since it is (pseudocode): SHA256(poop emoji)

(Reference: https://www.fileformat.info/info/unicode/char/1f4a9/index.htm)

Conclusion: Add emojis to your wordlists  Smiley
copper member
Activity: 193
Merit: 234
Click "+Merit" top-right corner
I have discovered what I called "perturbed SHA256 hashes". Like this:

SHA256("398") leads to

Code:
188c1fdca79d927f6e812133173fc41d3a4e57074de521020274caa9bb29af7d (found in "all" hash databases)
5J16cPLSHRR7CLQuKRWzCWDeXfrzDWYRUksjaTSH86x349BxuUk
17XNdhPkz8eSWibrMRjYY292Y9B6uRFvir

which is probably in every bot's database. However, check this out

Code:
188c1fdca79d927f6e812133173fc41d3a4e57074de521020274caa9bb29ae57 (found in "no" hash databases)
5J16cPLSHRR7CLQuKRWzCWDeXfrzDWYRUksjaTSH86x2Uzb2iY9
19rDLwxcP9Y3hEjXAkpkuMamKjLs1dgtiA

Both are found on the blockchain. Notice the pattern? The two differ only by a few bytes at the end of the hexadecimal string. The latter one is with an extraordinarily high certainty not the SHA256 hash of a known input.

Looks like someone took a known hash and changed it just a little. Clever!

My recommendation is perturbing well-known hashes.
legendary
Activity: 2268
Merit: 1092
A couple of months ago someone sent 3.4 BTC to a brainwallet

Funds were appropriated immediately; sweep transaction was included in the same block as the funding transaction.

https://www.blockchain.com/btc/address/13QZd78daoq3HaMKN9KAdFsVY9iYLKLfbm

Since it's so recent I won't post the passphrase, but it seems to be just a simple saying, perhaps also referring to a book title.

3.4 BTC!!!
hero member
Activity: 630
Merit: 767
BTC⇆⚡⇄BTC
Hello there,

I started (some years ago) a list that's a compilation of (open-source) Brainwallet projects (for study and improvement purposes only) here: https://bitcointalksearch.org/topic/list-compilation-of-open-source-brainwallet-projects-1164163

Enjoy!
legendary
Activity: 2268
Merit: 1092
WOW big transaction to a brainwallet:
0,50000000 16qVRutZ7rZuPx7NMtapvZorWYjyaME2Ue -> 400453AC5E19A058EC45A33550FDC496E0B26AD0 / 5E884898DA28047151D0E56F8DC6292773603D0D6AABBDD62A11EF721D1542D8 / Brainwallets
 Huh Huh Huh

brainwallet "password"

It seems that sombody "was listening" to this brainwallet address because the outgoing 0.5BTC transaction was included in the same block as incoming transaction (block 608894)

Very likely. Some block explorers show double spend attempts. Some of the earlier messages in this thread include links to show that double spends happened multiple times shortly after a known brainwallet was funded. Presumably the double spend attempts are by several different "brainwallet stealer" bots.

I've even seen funds sent to dictionary word brainwallets on testnet vanish instantly.

Wonder if the person who lost 0.5 BTC used a brainwallet generator that helpfully prefilled the password field with the word "password", intending the user to replace it with their own text?
sr. member
Activity: 443
Merit: 350
WOW big transaction to a brainwallet:
0,50000000 16qVRutZ7rZuPx7NMtapvZorWYjyaME2Ue -> 400453AC5E19A058EC45A33550FDC496E0B26AD0 / 5E884898DA28047151D0E56F8DC6292773603D0D6AABBDD62A11EF721D1542D8 / Brainwallets
 Huh Huh Huh

brainwallet "password"

It seems that sombody "was listening" to this brainwallet address because the outgoing 0.5BTC transaction was included in the same block as incoming transaction (block 608894)
sr. member
Activity: 490
Merit: 258
WOW big transaction to a brainwallet:
0,50000000 16qVRutZ7rZuPx7NMtapvZorWYjyaME2Ue -> 400453AC5E19A058EC45A33550FDC496E0B26AD0 / 5E884898DA28047151D0E56F8DC6292773603D0D6AABBDD62A11EF721D1542D8 / Brainwallets
 Huh Huh Huh

brainwallet "password"
shit, true stroy! I don't save this in my database...
why should somebody do this :O
newbie
Activity: 54
Merit: 0
WOW big transaction to a brainwallet:
0,50000000 16qVRutZ7rZuPx7NMtapvZorWYjyaME2Ue -> 400453AC5E19A058EC45A33550FDC496E0B26AD0 / 5E884898DA28047151D0E56F8DC6292773603D0D6AABBDD62A11EF721D1542D8 / Brainwallets
 Huh Huh Huh

brainwallet "password"
sr. member
Activity: 490
Merit: 258
WOW big transaction to a brainwallet:
0,50000000 16qVRutZ7rZuPx7NMtapvZorWYjyaME2Ue -> 400453AC5E19A058EC45A33550FDC496E0B26AD0 / 5E884898DA28047151D0E56F8DC6292773603D0D6AABBDD62A11EF721D1542D8 / Brainwallets
 Huh Huh Huh
sr. member
Activity: 443
Merit: 350
I still beleive that the most brain wallets are not serious wallets, and used for test/education/fun transactions. For these transactions (as well as for some quick transit transactions) no need to create the crypto secured wallet, and the brain wallet is used.

Of course there are some real wallets generated in "brain wallet way", but such wallets can be counted on one hand.

By the way, what do you think about time locked wallets based on easy brain wallets? Let's say we take the easy passphrase "bitcoin", hence the corresponding brain compressed address to it is 18VkRiDhFu2Z17AvtpU3vL2LbTXDzCvDVo (this address has already been used of course).

However, we take the public key of this address (02218ad6cdc632e7ae7d04472374311cebbbbf0ab540d2d08c3400bb844c654231) and create the time locked wallet (for example with the help of this tool: https://coinb.in/#newTimeLocked), let's say with time lock 31 December 2019:

https://coinb.in/?verify=0450650a5eb1752102218ad6cdc632e7ae7d04472374311cebbbbf0ab540d2d08c3400bb844c654231ac#verify

We receive the P2SH address 3NTavRnFZHkMmSFYVMz5PPb48WsNyVszDW, which could be accessed only by both redeem script and private key/signature from that easy address (18VkRiDhFu2Z17AvtpU3vL2LbTXDzCvDVo). The redeem script will not by available in blockchain till the funds are released from the address.

legendary
Activity: 2268
Merit: 1092
Using the bitaddress.org donations address ( 1NiNja1bUmhSoTXozBRBEtR8LeF9TGbZBN ) on the passphrase field of the brainWallet generate the address ( 1Ns55SngRhshA8kEnyuQ9ELZZPN7ubYfQJ ) wich contain some small transactions !  Shocked

There's also two similar passphrases I've found (original address in bold) :

h1NiNja1bUmhSoTXozBRBEtR8LeF9TGbZBNz
g1NiNja1bUmhSoTXozBRBEtR8LeF9TGbZBNy


"Nick Szabo is Satoshi Nakamoto"

There are people who believe this stuff is real,and it is therefore not surprising that someone of them has incorporated that statement into his BTC transaction.

No such entry for Craight Wright, though.  Cheesy
hero member
Activity: 1358
Merit: 635
A small amount sent by someone making a statement:

https://www.blockchain.com/btc/address/15h4F5yxeJHDgDJR5dnJwsNbETpktMnQzm

"Nick Szabo is Satoshi Nakamoto"

There are people who believe this stuff is real,and it is therefore not surprising that someone of them has incorporated that statement into his BTC transaction.
legendary
Activity: 2576
Merit: 1248
#SWGT CERTIK Audited
 Using the bitaddress.org donations address ( 1NiNja1bUmhSoTXozBRBEtR8LeF9TGbZBN ) on the passphrase field of the brainWallet generate the address ( 1Ns55SngRhshA8kEnyuQ9ELZZPN7ubYfQJ ) wich contain some small transactions !  Shocked
legendary
Activity: 2268
Merit: 1092
A small amount sent by someone making a statement:

https://www.blockchain.com/btc/address/15h4F5yxeJHDgDJR5dnJwsNbETpktMnQzm

"Nick Szabo is Satoshi Nakamoto"
Pages:
Jump to: