Next scheduled rescrape ... never
Version 2
Last scraped
Scraped on 03/08/2025, 13:45:24 UTC
When wallet encryption was first introduced I created a bunch of fake encrypted wallets which purported to own various mixes of high value addresses and seeded edonkey and other similar file sharing tools with them.

Every once in a while I remember this and cackle with a bit of glee thinking about the pathetic would be thieves wasting their time grinding away at something which will never yield, and the real wallets they ignore in favor of the trap wallets.

I'm not sure why any fake wallet would have below minimum counts, I even think in some of mine I set extremely high counts at the upper limits of plausibility in order to maximize time wastage.  Perhaps there have been some versions which didn't impose a minimum limit subsequent to the original, perhaps knots or some other fork of the software that gets off on the practice of giving users configuration options that enable self-sabotage.
Version 1
Scraped on 03/08/2025, 13:20:07 UTC
When wallet encryption was first introduced I created a bunch of fake encrypted wallets which purported to own various mixes of high value addresses and seeded edonkey and other similar file sharing tools with them.

Every once in a while I remember this and cackle with a bit of glee ofthinking about the pathetic would be thieves wasting their time grinding away at something which will never yield, and the real wallets they ignore in favor of the trap wallets.

I'm not sure why any fake wallet would have below minimum counts, I even think in some of mine I set extremely high counts at the upper limits of plausibility in order to maximize time wastage.  Perhaps there have been some versions which didn't impose a minimum limit subsequent to the original.

Original archived Re: Can Iteration less than 25000 be Real Wallet.dat ? What about Timestamp ?
Scraped on 03/08/2025, 13:15:46 UTC
When wallet encryption was first introduced I created a bunch of fake encrypted wallets which purported to own various mixes of high value addresses and seeded edonkey and other similar file sharing tools with them.

Every once in a while I remember this and cackle with a bit of glee of pathetic would be thieves wasting their time grinding away at something which will never yield, and the real wallets they ignore in favor of the trap wallets.