tx_hash1 = "223d80bffcb8cc519f23d6e7795693c5c0b25a1f3c477a96632f875c067d2439"
tx_hash2 = "8b044016b8307dd8aefe5dcb61cfac97c01122f578fc7e4192472c45405e0a74"
-snip-
# Convert transaction hashes to integers
z1 = int(tx_hash1, 16)
z2 = int(tx_hash2, 16)
This wont fix the core issue but just a pointer:
Those "
tx_hash" aren't the Transaction IDs of the inputs that has the same R-value.
Since the code is pertaining to those as "
z1" and "
z2", it's meant to be the "
message hash" (
Z-value) of each transaction.
Thanks for looking! I can see that the address in question isn't as input but rather output; however, I am a bit at loss here since this address was reported as compromised back when the vulnerability was discovered. So far, it repeated the R value from another address where the address in question was as output. Not sure what specific transactions they may have used then, to report this one as compromised.