Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
Psychedelic Susa
on 07/08/2025, 07:14:14 UTC
Don't trust online claims, especially in the digital currency space, where scammers are everywhere.

Puzzle 71 has been the subject of three or four months of global effort since the solution of Puzzle 69, but the private key hasn't been cracked. Can you believe your funds could be stolen by a so-called bot within a minute of your transfer? Bitcoin's most important principle is decentralization. Even if you're transferring funds publicly, as long as you use the highest transaction fee, miners around the world will rush to confirm your transaction. This is the essence of Bitcoin's decentralization and security. What's there to worry about? You can claim your winnings in under a minute. If Bitcoin were so easily hackable, it would have collapsed long ago.

Remember, anyone who asks you to submit your transactions to a private mining pool is likely a scammer. Even if the private mining pool is a large company, what about their employees? Anyone who handles your transaction information could try to steal your winnings. Think for yourself.


Buddy, I sincerely hope you solve this puzzle faster than the others and then see your angry posts on this forum. 
Now, back to reality—take a couple of steps to understand the small range problem: 
1. Grab the open public key for #70 (hint: it’s 0290e6900a58d33393bc1097b5aed31f2e4e7cbd3e5466af958665bc0121248483). 
2. Open any public key solver (let’s say RCKangaroo or Kangaroo by JLP). 
3. Check how many seconds it takes to crack it (on your hardware). 
(Next, it’s best to work with wallets that have funds.) 
4. Use the nomachine script from page 569 of this thread. If needed, you can rewrite it for hex instead of WIF or whatever suits your soul. 
5. Open slipstream.mara.com and input the values for broadcasting. 
6. You’ve done everything correctly. 

Now imagine all these steps could be pre-prepared into a single script, written properly in C++, paired with some solid hardware, and then just run and wait. 
In this scenario, if your bot is faster than the others and makes the first valid outgoing transaction, you could steal bitcoins. 
P.S. There are plenty of such bots out there, and the odds aren’t always in your favor. 

The small range problem is that you can find the private key in a few seconds before miners confirm the transaction, knowing the public key that goes into the public mempool.