Next scheduled rescrape ... never
Version 1
Last scraped
Edited on 05/07/2025, 09:28:34 UTC
sorry......I can't recovery private key for this 2 rsz
my result:
k1 = 0
k2 = 1

Recovered Bitcoin public key: 028629507d9eef1748ec67ca2c4ab641fa0951d7f0bb0cf226f1c0f465a4e29404
Bitcoin Address: 1Ln1NYjtCamBG2UZDTKcHqcaNLP8TUrKFe

Recovered Bitcoin public key: 0395c632a7af384a67104afd5b6a4a5d882e782d232519c59084f0744d08093876
Bitcoin Address: 1P5TaCC8ZQohntb3NwRXQE5zFzB2De2Dvz

show your private key .. ??


both msg sign from the same pubkey :  ( 0x8629507d9eef1748ec67ca2c4ab641fa0951d7f0bb0cf226f1c0f465a4e29404 , 0x2237204a53021490adfec9f0b3f0732f5024181d50fde2dcfc7a428c992b8d70 )
r2 = r1 + G

Signatures are valid ✅
Nonces follow k2 = k1 + 1 ✅
Public key is valid and known ✅
Algebraic recovery fails due to zero denominator ❌
Lattice attack returns zero polynomial or errors ❌
Interesting.. Wink


nonce found, but in theory knowing this value - it is possible to restore the private key from each address: x = (s*k-m)/r, but this is not true at all. for all three signatures it is impossible to restore the correct keys to the addresses.
If the nonce is found, it means you already have access to the genesis wallet, why bother with recovering another private key  Wink
Original archived Re: R,S,Z , K nonce and public key Signature samples
Scraped on 28/06/2025, 09:29:00 UTC
sorry......I can't recovery private key for this 2 rsz
my result:
k1 = 0
k2 = 1

Recovered Bitcoin public key: 028629507d9eef1748ec67ca2c4ab641fa0951d7f0bb0cf226f1c0f465a4e29404
Bitcoin Address: 1Ln1NYjtCamBG2UZDTKcHqcaNLP8TUrKFe

Recovered Bitcoin public key: 0395c632a7af384a67104afd5b6a4a5d882e782d232519c59084f0744d08093876
Bitcoin Address: 1P5TaCC8ZQohntb3NwRXQE5zFzB2De2Dvz

show your private key .. ??


both msg sign from the same pubkey :  ( 0x8629507d9eef1748ec67ca2c4ab641fa0951d7f0bb0cf226f1c0f465a4e29404 , 0x2237204a53021490adfec9f0b3f0732f5024181d50fde2dcfc7a428c992b8d70 )
r2 = r1 + G

Signatures are valid ✅
Nonces follow k2 = k1 + 1 ✅
Public key is valid and known ✅
Algebraic recovery fails due to zero denominator ❌
Lattice attack returns zero polynomial or errors ❌
Interesting.. Wink