Pages:
Author

Topic: The Legend of Satoshi Nakamato, FINAL STEP PUBLISHED.... 4.87 BTC GRAND PRIZE! - page 54. (Read 108519 times)

hero member
Activity: 602
Merit: 501
Thanks for the bump, i love puzzles!!
staff
Activity: 3500
Merit: 6152
What the actual hell , there is no way in hell someone will get the private key from this painting , just noway . Not even sure if they are written or painted them selfs maybe some NSA program you could get the private key  Roll Eyes
Let it go people, just wasting your time because I'am not sure what you guys but all I see is birds Shocked
sr. member
Activity: 382
Merit: 250
donator
Activity: 1057
Merit: 1021
http://www.chessgames.com/perl/chessgame?gid=1028107

Chess game played in 1886 named "Bird without a nest"

It lasted 17 moves.  There are 17 leaves on the vine.  

Coincidence?

hero member
Activity: 490
Merit: 500
Captain
Seriously...... really ?
People is still trying to solve this riddle?
It is obviously a hoax, just let it go.
legendary
Activity: 3038
Merit: 1032
RIP Mommy
Only autistic savants need apply to solve bitcoin-reward puzzles.
legendary
Activity: 1092
Merit: 1001
anybody claimed the 4.87 BTC yet?  Huh looks pretty complicated...

Not yet. https://blockchain.info/address/1FLAMEN6rq2BqMnkUmsJBqCGWdwgVKcegd
Complicated indeed. It is either extremely over my head, or so simplistic no one is able to see the way.
From reading all about the last one, it is probably over my head.  Cheesy
sr. member
Activity: 606
Merit: 273
There's a stego tool called Rizzy, also, written in python, but you still need a key or keyfile. I got this warning when I input "Ca/Q" as a possible password:

Input strings must be a multiple of 16 in length


I think if you really want to look at steganographic analysis of this thing, you may actually have to get into stego theory and manipulating raw bits in the image file. It's not clear which toolset may have been used to encode the data, if any actually was, at this point, and without a key, it's a brute-force thing with little luck so far. I was sure the Bacon cypher thing would turn up something.
newbie
Activity: 9
Merit: 0
Hmmmm, I wasn't able to replicate this result. What version of stegbreak are you using, I could only use 4.0, couldn't get 6.0 to build for the life of me. Apparently stegdetect is known for false positives, telling you there's a jphide message even if there is not, if you turn sensitivity high enough.

I'm using stegbreak 0.4.
I also think its a false positive caused by upping the sensitivity to around 1.4
The only thing that confused me was, that stegbreak didn't output any file on that.. i'd have expected some gibberish file to come out of a false positive
sr. member
Activity: 606
Merit: 273
Hmmmm, I wasn't able to replicate this result. What version of stegbreak are you using, I could only use 4.0, couldn't get 6.0 to build for the life of me. Apparently stegdetect is known for false positives, telling you there's a jphide message even if there is not, if you turn sensitivity high enough.
newbie
Activity: 10
Merit: 0
newbie
Activity: 9
Merit: 0
I used stegdetect and it did think there was a jphide message hiding in there, with the sensitivity turned up high enough. However, I've tried over 300,000 passwords with stegbreak, including every odd word or phrase mentioned in any of the threads here. Nothing so far. I'd be surprised if this was a brute force cracking problem, anyhow.

Here are my results from that:
OSpEZtA.jpg : jsteg(Ca/Q) Processed 1 files, found 1 embeddings. Time: 92459 seconds: Cracks: 450945859
so stegdetect claims that Ca/Q was a valid password, but no file was output
sr. member
Activity: 606
Merit: 273
I used stegdetect and it did think there was a jphide message hiding in there, with the sensitivity turned up high enough. However, I've tried over 300,000 passwords with stegbreak, including every odd word or phrase mentioned in any of the threads here. Nothing so far. I'd be surprised if this was a brute force cracking problem, anyhow.
newbie
Activity: 2
Merit: 0
I haven't read through ALL 22 pages, just the beginning and ending pages and thought I'd throw this idea out and see if it benefits anyone.

If you use this (example image) and drop it on this page http://mozaiq.org/decrypt
The password is: alice

You should get a message that = the bitcoin address


This is hiding a message inside an image (AKA steganography). Some require passwords, some don't. So if you know the password, you could unlock the hidden message in the image.

Might be useable with the original photo. If you figure out the password, you may could unlock the real hidden message in the photo. Cheers! Send me a tip if you find this useful  Grin

My Bitcoin Address: 1B2tpddvJbdqQUvivw2XvqGVLdxdnoUXom
legendary
Activity: 1540
Merit: 1001
Crypto since 2014
I scanned the painting with a tricorder. It detected subpace vacuoles with a covariant triaxilating frequency. I'm still waiting for the computer to finish a multipolar analysis.
I have no idea what you just said, but it sounds so advanced. Like something from a sci-fi move.

...Ok I just googled it... It turns out it is from a sci-fi movie...
http://en.m.wikipedia.org/wiki/Tricorder

welp.
sr. member
Activity: 606
Merit: 273
Anyone have any new ideas on this thing? New hints still popping up anywhere?
sr. member
Activity: 606
Merit: 273
Yeah but Geordi inverted the polarity. He always does that.
legendary
Activity: 1092
Merit: 1001
I scanned the painting with a tricorder. It detected subpace vacuoles with a covariant triaxilating frequency. I'm still waiting for the computer to finish a multipolar analysis.

Geordi and Data had already performed that analysis, in a previous post.
They determined it was just subspace distortion related to a Romulan Warbird being cloaked near by.
Pages:
Jump to: