This is a typical example. It was broken in several steps:
1LT8zYr6WW5zcnWiYr5gbLT621rPhPGyP2 has two signatures with R-value 2a6f8c926...
This gives us the corresponding k value.
Using this k value, we can now break 1NaMT8A9FysDGRXEL1YdY6VCJUwvXEUedz that uses the same R value.
This key has another signature with R value 460ba0d.... so we can compute the k value for this.
Using this k value, we can break 1Ep4E6WF6jZRhnLCBrFF96fQ8ocvNX728C,
Similarly we get the k value for R value f3b5c9...., that is used with the 1Ep4 key.
This gives us the private key for 1FRDgmxVrUUNiiB7GN3NNcJDEEXtFB22rm.
Finally this has a signature with the R value 6bcc247f1... that was also used to sign with 19owWJc.
Many keys require this multi-step reasoning. This is probably why the bots couldn't break the keys. My tool follows these chains. I think this is why I was the first who could swipe the keys despite doing it manually.
This is the chain my program chooses now. I'm not sure if all these signatures were present when I broke the key the first time. But there are other chains leading to this key. I shouldn't say may program chooses chains. It just computes K values and private keys until it cannot compute any new K value or private key.