Pages:
Author

Topic: Large Bitcoin Collider (Collision Finders Pool) - page 18. (Read 193426 times)

legendary
Activity: 1120
Merit: 1037
฿ → ∞
24h Pool Performance: 2048.75 Mkeys/s

I currently have 2129Mkeys Cheesy


the pool is slower than me :>

 Smiley You might want to look at the green line too. (1h avg: 2312 Mkeys/s)

Although - yes - you provide 90% of the pool speed. With CPUs. It's insane. It's like almost 4000 CPU (modern) cores.
Or the equivalent of 100 of my notebooks (with GPU).

If I didn't know better I'd suspect you are testing some ASIC prototype.  Cool


Rico
member
Activity: 62
Merit: 10
24h Pool Performance: 2048.75 Mkeys/s

I currently have 2129Mkeys Cheesy


the pool is slower than me :>
member
Activity: 86
Merit: 10
the number of strings that we cannot get is then:

                                                                            k (1-1/k) ^n

where n=2^257 (input) and k = 2^256 (output).

The result is: 2^256 * (1 - 1/2^256) ^ (2^257) =  2^256 * ((1 - 1 / 2^256)^(2^256))^(2) = 2^256 * ((1/e)^2) = 0,135 * 2^256      so we can get at this stage the 86,5% of all the 256 bit strings.

I would have appreciated if we could have given this more time (especially me to wrap my head around it) - but sure, maybe someone else can chime in with some insight.

All these models assume a hash function to behave like a random (or pseudo-random) number generator. Normally, a good hash function - by design - tries to
Quote
map the expected inputs as evenly as possible over its output range.

see https://en.wikipedia.org/wiki/Hash_function#Uniformity

Also

Quote
Note that this criterion only requires the value to be uniformly distributed, not random in any sense. A good randomizing function is (barring computational efficiency concerns) generally a good choice as a hash function, but the converse need not be true.

I had a look at the referenced paper, but I'm still not convinced about the premises to model a hash function as a pseudo-random generator. Please don't forget, that I've been looking at the SHA256 and RIPEMD160 implementation for months! They are both very similar (RIPEMD160 being way more "light-weight") and I cannot see how these would qualify as pseudorandoms.

...

Rico
Hi rico, hi arulbero,

to check wether sha256 and ripemd160 behave like a PNG and meet the expectations regarding the formula  k (1-1/k) ^n one could do that:
Hash all possible 2^33 bit values with sha256 and XOR the first half of the bits with the second half. The 128 result is xored in the same manner. The 64 bit result as well. Thus we get a 32 bit output from the 2^33 input. Check how many values of all possible 32bit expression could not be generated. If k (1-1/k) ^n is applicable to sha256 than the result should equal arulbero´s 13,5%.  If this is true, than this small model can be used to investigate futher assumptions regarding distribution and prohabilities.
For Ripemd160 the same can be done with a 2^21 input and 2^20 output.
Due to the neutral behavior of XOR it should be possible to scale the 160 respectively 256 bit problem down to a manageable size.

Regards,
Janu$$
member
Activity: 62
Merit: 10
im too lazy to check those clients for 0.01 btc :>
legendary
Activity: 1120
Merit: 1037
฿ → ∞
last address found 14 hours ago ... I guess someone else found something ..

In a gesture of trust, SlarkBoy gave me all the private keys to all the Bounties he planted.

So I could find out, that the unclaimed bounty of https://blockchain.info/address/1L1TjHQQM75mLYVn9QoFuBvWN7rPPTaio
was in fact given in a block to one of your clients. It seems this client is running an old version of LBC and therefore I assume its BLF file was not up-to-date also.

This client returned PoW for the block interval he should have found something. If you were not informed, either the hook-find is not working (unlikely) or outdated BLF (more likely).

I will not tell the concrete client and block interval, just as a hint you might want to update all your clients (1.067 and current BLF) if you don't want some bounties to escape you.

Sure, an older BLF will still see the 2014 dormant 10.000 BTC address you're looking after.  Wink


I may reschedule the block(s) in question as the LBC easter egg hunt.


Rico

edit: Other than that, it seems we are finding everything we are supposed to find, although some people do not/cannot report their finds immediately.

edit2: @unknownhostname same applies for the unclaimed bounty https://blockchain.info/address/17VAHtuREREixUm1ZqextyEt4VWNv86E5Z
old client...
legendary
Activity: 1120
Merit: 1037
฿ → ∞
last address found 14 hours ago ... I guess someone else found something ..

Looks like RealDuke - he will handle it in a couple hours.
member
Activity: 62
Merit: 10
last address found 14 hours ago ... I guess someone else found something ..
legendary
Activity: 1120
Merit: 1037
฿ → ∞
only 4 addresses have been taken. where the rest?
I'm going to wait until 25 april, then moved to this address 1LBCPotwPzBvBcTtd7ADGzCWPXXsZE19j6

I think the addresses have been placed so we find about 1 a day. The pool has gained speed since then, so we find one each 7-8 hours. Right? Most people who have no hook-find setup check their FOUND.txt only once 24-48 hours, so I expect some finds to pop up in time.

But I agree: April, 25th should be a sufficient deadline.


Rico
member
Activity: 114
Merit: 11
only 4 addresses have been taken. where the rest?
I'm going to wait until 25 april, then moved to this address 1LBCPotwPzBvBcTtd7ADGzCWPXXsZE19j6
member
Activity: 62
Merit: 10
9c297c7914d3a0d212abe54dfcf3300683d039ab:c:priv:0000000000000000000000000000000000000000000000000008c184912ff001 + 0xf9e
legendary
Activity: 1284
Merit: 1042
Hi I have a off-topic but LBC related question:

If one addess generated from BIP32-Seed is compromised, are the remaining addresses save or is the whole BIP32-Wallet compromised then?

I am no BIP32 expert, but as far as I understand the specification, you would have to

a) find a BIP32 private key (can happen)
b) You'd have to know it is a BIP32 privkey (LBC cannot know that, but we could assume so)
and finally
c) You'd have to know the master seed to derive any children.

Obviously, c) is the KO-criterion, maybe even the only necessary criterion to break BIP32-Seeds and such a master seed is nothing within the reach of the LBC. LBC just looks at private keys and the hash160 they resolve to.

AFAICS the answer is therefore: no


Rico


THX !
legendary
Activity: 1120
Merit: 1037
฿ → ∞
Hi I have a off-topic but LBC related question:

If one addess generated from BIP32-Seed is compromised, are the remaining addresses save or is the whole BIP32-Wallet compromised then?

I am no BIP32 expert, but as far as I understand the specification, you would have to

a) find a BIP32 private key (can happen)
b) You'd have to know it is a BIP32 privkey (LBC cannot know that, but we could assume so)
and finally
c) You'd have to know the master seed to derive any children.

Obviously, c) is the KO-criterion, maybe even the only necessary criterion to break BIP32-Seeds and such a master seed is nothing within the reach of the LBC. LBC just looks at private keys and the hash160 they resolve to.

AFAICS the answer is therefore: no


Rico
legendary
Activity: 1284
Merit: 1042
Hi I have a off-topic but LBC related question:

If one addess generated from BIP32-Seed is compromised, are the remaining addresses save or is the whole BIP32-Wallet compromised then?
legendary
Activity: 1120
Merit: 1037
฿ → ∞
+1 70704beeb84326fa6e6240df15b6ca01ff084e40:c:priv:000000000000000000000000000000000000000000000000000891b476cff001 + 0xfba

This bounty program is titled "SlarkBoy wants to give some BTC to Unknownhostname"  Smiley

@SlarkBoy - I know you turned off your 150 Mkeys/s machine to not find your own bounties, but you're Number 2 and in case you'd find something - push it to

1LBCPotwPzBvBcTtd7ADGzCWPXXsZE19j6

This is the "LBC Pot" meant to distribute public bounties to all pool members according to their Gkeys weight.
Oh wait - Unknownhostname has 65% of these too  Tongue



Rico
member
Activity: 62
Merit: 10
+1 70704beeb84326fa6e6240df15b6ca01ff084e40:c:priv:000000000000000000000000000000000000000000000000000891b476cff001 + 0xfba
legendary
Activity: 1120
Merit: 1037
฿ → ∞
+2 from https://blockchain.info/tx/9e781cdb4a4b4782594098c43cbaf7dd4619ded7f4acb27ad28af7ab4628115a

Yesterday at 8:42 PM         0a52d50d43c0289dde60c5776c175c54d23d2b0c

Today at 5:16 AM              828e1b5cad75725c2ef95da448242015f8be4657

You can post the privkeys directly. These bounties are just for fun and will not go on the trophies page.

Code:
0a52d50d43c0289dde60c5776c175c54d23d2b0c:c:priv:000000000000000000000000000000000000000000000000000830c199efffc2
828e1b5cad75725c2ef95da448242015f8be4657:u:priv:00000000000000000000000000000000000000000000000000086109578ffff6

So 28 to go.

@SlarkBoy: Did I understand correctly, that these two were not the 1st ones?
member
Activity: 62
Merit: 10
+2 from https://blockchain.info/tx/9e781cdb4a4b4782594098c43cbaf7dd4619ded7f4acb27ad28af7ab4628115a

Yesterday at 8:42 PM         0a52d50d43c0289dde60c5776c175c54d23d2b0c

Today at 5:16 AM              828e1b5cad75725c2ef95da448242015f8be4657
legendary
Activity: 1120
Merit: 1037
฿ → ∞

No one found them? No one wants them?
If I understand correctly, the bounties were placed to be found about once a day, but we have a faster search speed since then.
You must have the newest BLF file or your client will not see them.

Also in the News: Welcome "Its_a_Meeeee" in the top30. Your gpuauth has been delivered.  Smiley


Rico
legendary
Activity: 1120
Merit: 1037
฿ → ∞
The pool shows now a 2h average per user as this is "smoother" than the hourly average.
Given ideal round times of 30-60 minutes, with 1h avg I saw the chart oscillating too much...

The per-user charts are available for everyone who was active in the past week - not just those in the top30.

Just enter in your browser

https://lbc.cryptoguru.org/stats/

and you should see the chart. Contrary to this, even those in the top30 who haven't been active in the past week -> "No data" ofc.


Rico
legendary
Activity: 1120
Merit: 1037
฿ → ∞
Who found this address 1L1TjHQQM75mLYVn9QoFuBvWN7rPPTaio ?
There is other 29 bounty for fun haha

https://blockchain.info/tx/9e781cdb4a4b4782594098c43cbaf7dd4619ded7f4acb27ad28af7ab4628115a

#52 search space entered.


0.3 in 30 x 0.01 from SlarkBoy
and the 0.052 for #52

Good Luck!


Rico
Pages:
Jump to: