It has already been answered by kowala (winner of 67/68) and other friends on the forum, just look there.
May I ask how the solvers of puzzle # 67 and # 68 bypass the public memory pool to prevent transactions from being revoked by others?
Did they use their own machines to mine? Do they have that much computing power?
Which experts can explain the principles and processes in detail? thank you!