Search content
Sort by

Showing 20 of 53 results by AbadomRSZ
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
AbadomRSZ
on 07/08/2025, 15:39:17 UTC
Sorry, guys, but unfortunately I have to ask my question for the third time, as Im still curious. SimonNeedsBitcoin steered the conversation in a completely different direction that’s already been discussed multiple times here and whether that path is right or wrong doesn’t concern me. What SimonNeedsBitcoin decided to explain was an answer to a question I never asked. So… once again, I had like to ask my question, and if anyone can answer, I will really appreciate it. I don’t understand what difference the puzzle number makes - whether it’s #61, #71, #82, etc. And specifically, what makes the puzzles that are multiples of 5 special — like #85, #100, #105? Or in the end, since no one is giving an answer, does that just mean this thing has no significance at all?

The public keys of multiple 5 puzzles were intentionally revealed, which opens the way to the possibility of using kangaroo, which allows for a faster solution of the problem, something that is not possible with puzzles 71, 72... that do not end in 5 or 0, which makes them difficult to solve because only conventional (slow) brute force can be applied. However, if for example you solve puzzle 71 and do not use the Mara service, when sending the transaction, you are exposing its public key to the world, which will cause bots to use kangaroo and replace your transaction, taking away your prize, since the difficulty of puzzle 71 lies in the fact that the public key is hidden, but once an attempt is made to spend it and it is included in the mempool, the public key is leaked.

For this reason you should use mara Slipstream for these puzzles, because mara does not broadcast the transaction publicly, which means it does not reveal the public key until the transaction is confirmed (included in a block) and at this point, this is not reversible, so you will have collected the reward without problems.

Thank you for the answer! The explanation was simple, but I just didn't pay attention. I thought there were several puzzles with known public keys, but I hadn’t noticed that it's specifically the ones that are multiples of 5.

I personally have no trust in intermediary sites like Slipstream Mara. These are all delusional thoughts that are expressed. Anyone who can solve Puzzle 71 can create a transaction with a gift of 1 million Satoshi and broadcast it on the network. Rest assured, with this reward, miners will not hesitate for a moment to accept it. Your transaction will be confirmed and there is no need to worry until the robots try to reach the public key from the private key.


You just know how to bark like stray dogs falling on the side of the road! And you don't solve anything, what a pain.
Post
Topic
Board Bitcoin Discussion
Re: CasasciusBTC (Brutus of Bitcoin mini keys)
by
AbadomRSZ
on 06/08/2025, 17:29:19 UTC
Random brutus of 22 digit mini keys (GPU version)

The database contains 4524 addresses, each of which belongs to Series 1.
https://bitcoinpuzzle.ru/btc.txt

If a mini-key is found, the information about it will be saved to a file. FOUND.txt .

In ARGS.txt arguments can be passed

https://bitcoinpuzzle.ru/upload/000/u1/f/6/f6602451.png

The -t and -b arguments:

These values depend on your graphics card.
Start with -t 128 and -b 500, then experiment. On the RTX 3060, for example, -t 256 -b 1000 gives the best result.
Monitor the loading of video memory (GPU-Z or nvidia-smi).
The argument is bits:

The value of 12 is reasonable: the table will have a size of 2^12 = 4096 cells.
You can increase it to 14-16 if there is enough memory and you see a lack of caching.
If the value increases, you will have to wait a bit.
The argument is alfabet:

It is used to generate random keys.
Do not change it until the test key is found!
Test key found! All working correctly...
When configuring arguments, check… Whether or not the test key is found in the database.

"What, is the antivirus swearing?"

There is protection in this software

Download here
https://bitcoinpuzzle.ru/casasciusbtc.rar
https://www.virustotal.com/gui/file-analysis/NWE5MDg2ZDY5Y2MyNTc4MmRkZGJjMjViMzc0OTcyZDE6MTc0ODM1NzYzMA==




There are only advanced users here! No one here is an idiot to run an .exe executable on their machine without the open source code! Your account will be banned if you continue posting garbage here!
Post
Topic
Board Development & Technical Discussion
Re: Proof of Work transaction puzzle, based on DER signature size
by
AbadomRSZ
on 05/08/2025, 16:24:25 UTC
yo\(~

57-bit DONE after 8 days!

The found S actually had 58 leading bits of 0 (57 were enough).

Code:
MSG = 020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001280bc5682e0cbe78108912437ab583daa49a8fe66e995001a22a44aec2a3ab06000000288201369f69210279be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798acf0d20000000000003d74fbff045b0f32c7adb53ce93b424e7ba280a4328ef880b60058c771b3ef599f9e95840000000081000000
Z = ffffffffffffffedfe243987a5dfa917a1bba0978fd5ce30e6df1b23cf1d8fc4
S = 000000000000002403b78c79c2a4014f1ea49d7614fa4fc457cb59250f722a34

https://talkimg.com/images/2025/08/04/UH9t4a.png

Server logs...

Code:
New key: 0x524f8523a3e703801c
baseKey: 524f85230000000000
GPU GE1 idx: 41877
Extracted k for OP_RET: 524f8523a3e6ca801c launches: 5
OP_RET = 796f145c28bad77e = 8750234987057043326
Found nSequence: 4294669373 at iteration 297922 / 933888
SIG: 303202153b78ce563f89a0ed9414f5aa28ad0d96d6795f9c6302192403b78c79c2a4014f1ea49d7614fa4fc457cb59250f722a34
Z: ffffffffffffffedfe243987a5dfa917a1bba0978fd5ce30e6df1b23cf1d8fc4
Fast S1: ffffffffffffffdbfc4873863d5bfeaf9c0a3f709a4e507768070567c0c4170d
Fast S2: 000000000000002403b78c79c2a4014f1ea49d7614fa4fc457cb59250f722a34
Sig len: 52 (+1)
S1 score: 0
S2 score: 58

And total running stats....

Code:
     Total jobs: 30314
    Scanned keys: 29606598993248256 = 29606 trillion
   Total results: 117

So that was around 59212 trillion signatures.

Total costs: 110 $

This was emotional. Up to the lucky hit, the best results that I got were all 54 bits or less, and I was starting to wonder whether the risk is worth it. Then 58 hit hard to compensate for the unexpected bad results Smiley


Did you create the repository for the application used?
Post
Topic
Board Bitcoin Discussion
Re: I would like to ask a question about the puzzles 67 and 68
by
AbadomRSZ
on 06/07/2025, 14:07:04 UTC
May I ask how the solvers of puzzle # 67 and # 68 bypass the public memory pool to prevent transactions from being revoked by others?

Did they use their own machines to mine? Do they have that much computing power?

Which experts can explain the principles and processes in detail? thank you!






This topic has been discussed here several times! You're just a dumb idiot trying to get attention, you useless worm.
Post
Topic
Board Development & Technical Discussion
Re: Mark1 - pollard rho implementation (38 minutes for 80 bits solving on CPU)
by
AbadomRSZ
on 22/06/2025, 18:34:06 UTC
Hello guys!
My implementation of Pollard-rho algo:
https://github.com/Dookoo2/Mark1
38 minutes for solving 80 bits puzzle with half billion of DP, 14 minutes for solving 70 bits with 200 millions of dp (after phase 1 for collecting and storing DP).
AVX2 bloom filter, compact DP table, Brent loop detection and others features.
May be useful for somebody.
Have a nice day:)



rubbish waste of time
Post
Topic
Board Development & Technical Discussion
Re: A few words about minikeys
by
AbadomRSZ
on 29/05/2025, 18:43:07 UTC
Has anyone downloaded this repository? https://github.com/PawelGorny/MinikeyCuda
it disappeared from github. If you downloaded it, send it to my email: cassiosamasr@gmail.com       thanks

Apparently, this is a fork of what you requested, as they acknowledge it in their GitHub.
https://github.com/Qalander/Minikeys

thanks bro!
Post
Topic
Board Development & Technical Discussion
Re: A few words about minikeys
by
AbadomRSZ
on 22/05/2025, 20:07:25 UTC
Has anyone downloaded this repository? https://github.com/PawelGorny/MinikeyCuda
it disappeared from github. If you downloaded it, send it to my email: cassiosamasr@gmail.com       thanks

Apparently, this is a fork of what you requested, as they acknowledge it in their GitHub.
https://github.com/Qalander/Minikeys


thanks bro!
Post
Topic
Board Development & Technical Discussion
Re: A few words about minikeys
by
AbadomRSZ
on 22/05/2025, 20:04:52 UTC
thanks bro!
Post
Topic
Board Development & Technical Discussion
Re: A few words about minikeys
by
AbadomRSZ
on 22/05/2025, 14:56:52 UTC
I must admit that until recently I was not aware of existence of mini-private-key format... I have found information about it accidentally and I decided to play a little with it.
So, just to recall some information:
The size of 'physical' items forced creators to find a way how to encode information about Bitcoin private key on a small area. Typical WIF, which has more than 50 characters would be too long. So, the new format has been created. Initially minikeys had 22 characters, later 30 characters. What is similar to WIF is that minikeys are build based on Base58 characters - that format excludes characters which looks similar to other, what could be problematic for user. That way, for example, characters like 'l' (lowercase L) or 0 (zero) and O (uppercase o) are excluded. Later, creators decided to exclude "1", so in fact the new format "base57" is used. And just a detail - minikeys starts with a letter "S".
The main difference between WIF and minikeys is that WIF encodes the exact private key, while minikey is in fact more like "brainwallet" phrase - the ways to restore private key is completely different. In case of WIF all we need is "base58 decoding" to retrieve information about private key (and additionally information if we had correct WIF, so decoded private key is really the one we look for). In case if minikey we must calculate hash of a key, just like we do with brainwallets.
What is also interesting, is that minikeys also has some kind of verification if input (the text found on physical item) is correct. Verification is based on fact, that not each combination of characters could be treated as a valid minikey - only when "extended" minikey produces hash which starts with "00" in hex.
All hashes on minikeys are sha256.
Let's take an example (we will work on short keys, 22 characters):
ScatCATcatCATcatCATcat
We must verify if key is correct, to get this information we calculate hash of key "extended" by appending character "?" (question mark).
Code:
sha256(ScatCATcatCATcatCATcat?) = 2dbe5cf8ac83725536cbb3d74a89dec34dd5c57af867431745449119f49788ec
Because hash starts with "2d", "ScatCATcatCATcatCATcat" cannot be used as a valid minikey;

SkK5VPtmTm3mQKYaJQFRZP
Code:
sha256(SkK5VPtmTm3mQKYaJQFRZP?) = 00442b142a40eefcd894b0bb6f19c58284f2e7248cee7e4910cd37afbfc7879a
Now we see that SkK5VPtmTm3mQKYaJQFRZP is a "correct" minikey. Then we may calculate hash to retrieve the real private key:
Code:
sha256(SkK5VPtmTm3mQKYaJQFRZP) = f30c1ddd12ea91bd35d5d1b83eac611717d99da826f207c3c3d4839e271648cb

That key gives uncompressed public key
04bf2d4231ca9ec2a49664f5b821bd44ad6cb38c6393936f1e3a6a8f4e0ee81686666e952387a4d d63a2ac7fb8c63737a9c4be142a186c1496d7013569c028143c
which produces hash160 fc258e14e4d1705f4c5a1f77e9a693531de82553
which could be converted into address 1PzEGi7a6UEGCAXtGjZj8kBX2VEHcLMrqd.

Now, let's ask how safe it is. I will focus on famous Cascascius coins - the list of coins (produced and already 'opened') is available online: https://casascius.uberbills.com/ and https://casasciustracker.com/
From serie 1, which was based on short keys (22 characters) and full base58, there are slightly less than 5000 coins still unopened.
I was aware of only one tool to brute-force minikeys and try to attack them knowing public addresses of coins - it was Keyhunt by @albert0bsd (https://bitcointalk.org/index.php?topic=5322040.0)
Just for fun and programming exercise I decided to prepare a small tool for "attacking" Cascascius, but using GPU. Working, but probably not extremely optimized program is available here: https://github.com/PawelGorny/MinikeyCuda
Program may work in two modes - random or sequential.
Sequential processing is very similar to typical WIF solving, where we change character by character and test the result. Initially we test if minikey is eglible for processing (if hash of key+? produces 00), then we hash again to generate the private key. Then we verify if private key produces address we look for. Statistically every 1/256 minikey is "correct" and produced private should be tested.
On my dev card rtx3060 I have performance of about 8mln keys/s, which gives around 30k/s 'valid' keys,
Random mode works quite differently - using GPU we produce bunch of 'valid' keys and then we check all of them. That way we may check much more keys, but we are not able to verify if we do not have duplicates. The corresponding performance is about 600-750k/s.
But what is the possibility of successful attack? Let's calculate:
For short keys, we have 58^21 possibilities = 1,076435e+37. As statistically 1/256 keys are valid, we must test 4,204824e+34 keys.
If we are able to test 500k/s and we are sure we will not have duplicated work, we need:
1 401 608 248 902 228 061 589 725 886 minutes, which gives 2 666 682 360 925 091 441 380 years (if I am not mistaken) to test all the keys.
Calculations for longer keys (30 characters) are left to the reader.
In other words - if you are in the possession of one of coins, I think you may sleep safe.

But if (I have no idea if situation like that may occur) you have lost part of your key, 6-7 characters, maybe more - it would be possible to recover it.


Has anyone downloaded this repository? https://github.com/PawelGorny/MinikeyCuda
it disappeared from github. If you downloaded it, send it to my email: cassiosamasr@gmail.com       thanks
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
AbadomRSZ
on 01/05/2025, 14:09:22 UTC
We got robbed of Puzzle 69.

Hello, we are coming out to claim we are the group that solved puzzle 69.
We are a group consisting of 12 software developers in Asia with interest in cryptography. We have been scanning puzzle 66, 67, 68 and 69 since last year.

We have rented several GPUs online to use for the puzzles. Unfortunately, puzzle 66 was solved by

1Jvv4yWkE9MhbuwGUoqFYzDjRVQHaLWuJd (not us)

but got stolen using RBF. Puzzles 67 and 68 were solved by 1 person and then finally we were able to solve puzzle 69.

Code:
0x101d83275fb2bc762d
0x101d83275fb2bc7ba7
0x101d83275fb2bc7f4e
0x101d83275fb2bc7604
0x101d83275fb2bc7e0c
Match found!
Private Key: 0x101d83275fb2bc7e0c
Compressed Public Key: 024babadccc6cfd5f0e5e7fd2a50aa7d677ce0aa16fdce26a0d0882eed03e7ba53

We are using our custom software written using CUDA C++. Each member has several GPUs which will be given a range to scan. It was really a eureka moment when we were notified that a match was found by one of our members.

We are aware of RBF attack so we used a wallet software (we prefer not to say which one) which does not enable RBF by default, to transfer the coins. But when we checked the transaction, before it was confirmed, another transaction was created.

This is really heartbreaking for me and my group because we spent months scanning the range only for it to be stolen by others. We are contributing part of our savings to pay our GPU bills monthly. We might resort to contacting the wallet software provider but we know that our 6.9 BTC is long gone forever.

Now, our problem is how to pay our remaining GPU bill which amounts to $158,954.07. This is so frustrating! Why can't people play fair and square???

We are accepting donations to help us pay our remaining GPU bill in these addresses:

1BMWUDeiq15EDZETNG49YfdQvLoEzGBjxm
bc1q2pqem06ad053rnt656dta4nej6uqe9p786kjls


I think it's good that you lost the 6.9 btc you primitive piece of shit... even a 10 year old child knows that the low bit wallet transaction has to be done by mara pool. now do everyone a favor and screw yourself
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
AbadomRSZ
on 22/04/2025, 20:39:48 UTC
Hahaha, take it easy... It’s not that simple... But... Every member in this topic will get 0.2 BTC—if they have a BTC address in their signature. Satisfied?  Grin

Are you talking about that key?

Code:
KyDi5tDzUCEN5bCRZhiS5sEGMpmcRZdpAhmWLRfMmutGmPHtjVob
KyDi5tFNbmN45bCRZhiS5sEGMpmcRZdpAhmWLRfMmutGmPHtjVob
KyDi5tJzYm5M5bCRZhiS5sEGMpmcRZdpAhmWLRfMmutGmPHtjVob
KzDiBk1GeGqp5bCRZhiS5sEGMpmcRZdpAhmWLRfMmutGmPHtjVob
KzDiBk2nLZCk5bCRZhiS5sEGMpmcRZdpAhmWLRfMmutGmPHtjVob
KzDiBk377UHr5bCRZhiS5sEGMpmcRZdpAhmWLRfMmutGmPHtjVob
L2Die4KeEMng5bCRZhiS5sEGMpmcRZdpAhmWLRfMmutGmPHtjVob
L3DiBgEqot9K5bCRZhiS5sEGMpmcRZdpAhmWLRfMmutGmPHtjVob

That’s probably a scam. I’ve bunch of WIFs with partial matches in sequence, be careful not to waste your time there.

https://www.talkimg.com/images/2025/04/21/xxPta.gif

For those who think searching for WIF has some magical twist—let me tell you, it's much slower compared to generating an address directly from a private key (hex, bytes or dec).

@nomachine, maybe let the curious minds DM you directly -: this thread’s starting to feel like a rerun marathon. Grin Let’s save the scrolls for fresh stuff!



-- Sim results

If you sum the number of checks over 10k simulations you get this :

Code:
=== FINAL RESULTS ===
Sequential: 495816995
Prefix: 496059807


WHICH IS ALMOST 50-50!

And maybe I have conducted the most experiments on prefixes, whether it be in the form of base58 or hash160.
Through these experiments, I have consistently encountered a 50-50 probability of outcomes.

but the basic aspect has already been demonstrated, which was the probabilistic success rate.

Well done! But let’s be real—if we’re talking probabilities, I Still remember, how you got yourself stuck in this argument when you trying to defend someone. Your heroic moment, huh? Maybe now’s a good time to snap out of that mess and chase some actual probability breakthroughs.

=== Configuration ===
Total numbers: 2,097,152
Block size: 4,096
Prefix: 3 characters (16^3 combinations)
Simulations: 10000

=== FINAL RESULTS ===
Wins:
Sequential: 3736 (Average Win Margin: 42.57%)
Prefix: 6244 (Average Win Margin: 36.55%)
Ties: 20

Total Checks:
Sequential: 10,472,126,509
Prefix: 10,548,477,557

Bro demonstration is over now! lets reduce the talk in this forum that we can easily read important posts Grin And thanks for searching all 10 digit seeds for me  Kiss


this wif key: K***********5bCRZhiS5sEGMpmcRZdpAhmWLRfMmutGmPHtjVob partial is a PHrutis scam. he said the objective is to make a pool to search for calsacius minikeys. the image is fake everything is fake
Post
Topic
Board Development & Technical Discussion
Re: Competition to Break Bitcoin's Cryptography and win 1 BTC
by
AbadomRSZ
on 18/04/2025, 12:54:03 UTC
Project 11 has launched a competition where people can win 1 BTC if they break Bitcoin’s Elliptic Curve cryptography and an ECC key using a quantum computer with Shor’s algorithm. The aim is to break the biggest ECC key possible.

According to them, 6 million BTC in over 10 million addresses are possibly vulnerable to quantum computers because of their exposed public keys. That's a value of over $500 billion. The aim of the initiative is to test how serious of a threat quantum computers present.

Project 11 believes that quantum computers will break Bitcoin's 256-bit keys sooner or later. Participants don't have to go that far. The company believes that breaking a 5-bit key is already a significant breakthrough.


Competition Rules:

- Individuals and teams can sign up. No institutional affiliation is needed.
- Participants need to find out how to run Shor's algorithm on current quantum hardware and demonstrate scaling capabilities to 256-bit keys.
- Project 11 has prepared sets of ECC keys from 1 to 25 bits of security. Participants will need to target these key lengths and demonstrate that their methods can crack the provided x-bit key.
- Submit your entries. Participants can include the code, instructions used with the quantum program, a description of their approach, techniques used, and the specs of the used quantum computer.  

The deadline to make the submissions is 5 April 2026. All submissions will be shared publicly.
Those interested in participating can sign up here: https://www.qdayprize.org/register

What do you think, what key length will these white hats be able to crack?


Sources and further reading:
https://www.qdayprize.org/
https://x.com/qdayclock/status/1912534686569755044


There are hundreds of dormant addresses, where the owners either lost their wallet password or died. The trick is to call the idiots to break these addresses using QC so that the same idiot can earn 1 BTC, while they get the biggest slice of the pie! Only brainless idiots get into this game.
Post
Topic
Board Bitcoin Discussion
Re: Share your ₿ $100k experience
by
AbadomRSZ
on 17/04/2025, 13:16:01 UTC
I will make it short.
Without Bitcoin I would be nothing. Perhaps I would just have an okayish life but not the time freedom I can afford now. Bitcoin allowed me to be global, generous and polite. Thank you Satoshi, Hal Finney and everyone else including you who is reading it.


I discovered Bitcoin in 2014, and at the time I didn't believe in Bitcoin's potential, and today I'm without Bitcoin and poor. If Satoshi sees this message, contact me via PM to donate some Bitcoin.
Post
Topic
Board Development & Technical Discussion
Re: fake signature generation
by
AbadomRSZ
on 10/03/2025, 14:32:05 UTC
alright bro!
Post
Topic
Board Development & Technical Discussion
Re: fake signature generation
by
AbadomRSZ
on 10/03/2025, 01:56:55 UTC
hi, im currently working on enhancing on Nonce Recurrence Attack. Read: https://eprint.iacr.org/2023/305.pdf

While i was able to recreate the attack describe in the paper, im thinking of enhancing this method. however, the enhance method would require me to generate some fake signatures that still points to the same public key. i vaguely remember that there was a discussion in some topic and someone mention that we could create fake signatures that could still be verified against the targeted public key but it wont be valid. or something to that effect.

Do you get what i am saying? does it make sense to you?  i might not be explaining this correctly. but if you do, what is the formula to do that? i have forgotten the formula.



I HAVE WHAT YOU'RE LOOKING FOR, TALK TO ME IN PM
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
AbadomRSZ
on 05/03/2025, 20:05:55 UTC
99.9% of the members of this group are like dogs, they just bark and don't solve it! Pay close attention to who solved the last few puzzles and never posted anything here! they just show up to count the merits.
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
AbadomRSZ
on 26/02/2025, 23:24:16 UTC
Hi @zahid888. I am curious about this from last year.. I even write some python script to try to understand this, but still didnt get that :

It’s just a few lines of code, bro—why overcomplicate it?  Remember, it’s only for generating the starting point!

Below is full demonstration & Code

Demo:

https://www.talkimg.com/images/2025/02/25/q4fzj.gif

Code:
import random
import subprocess

print('''\n\n      Demo By Zahid888\n
puzzle: 67 730fc235 Possibilities : 13\n
Seed : 2113081982 KHex : 730fc235
Seed : 2179848786 KHex : 730fc235
Seed : 2620256395 KHex : 730fc235
Seed : 3559516538 KHex : 730fc235
Seed : 5559894373 KHex : 730fc235
Seed : 5960477113 KHex : 730fc235
Seed : 6204436682 KHex : 730fc235
Seed : 7016671995 KHex : 730fc235
Seed : 8305603871 KHex : 730fc235
Seed : 8560029709 KHex : 730fc235
Seed : 8633074902 KHex : 730fc235
Seed : 9737552820 KHex : 730fc235
Seed : 9997208084 KHex : 730fc235\n\n''')
while True:
    x = input('seed integer : ')
    seed_value = int(x)
    random.seed(seed_value)
    seed = str(seed_value)
    a = random.randrange(2**30, 2**31)
    random_start = "%00x" % a
    random_range = (random_start+"000000000:"+random_start+"fffffffff")
    print('\nSeed : ' + str(x) + ' KHex : ' + str(random_start) + '\n')
    cmd_command =('BitCrack.exe -b 128 -t 256 -p 512 --keyspace '+random_range+' 1BY8GQbnueYofwSuFAT3USAhGjPrkxDdW9\n')
    subprocess.call(cmd_command, shell=True)

If you do the calculation, puzzle 67 solver only realized a lot of losses,
67 days x 24 hours x several thousand GPUs = more than puzzle 67 price. I think that's why he is not giving any donations right now.

There’s a big difference between someone posting a youtube tutorial in 2005 and someone introducing an idea at the right time and right place, @Wondrig philosopher didn’t just share information—he brought forward a solution when it was needed the most.

Innovations aren't always about inventing something entirely new; sometimes, they’re about applying knowledge when it is truly needed.

Anyway...

Hi @zahid888. I am curious about this from last year.. I even write some python script to try to understand this, but still didnt get that :

Hey Bro, welcome to the black hole! Cheesy Just a friendly reminder—if you win, I definitely expect an appreciation fee... Fair trade, right?  Grin Grin


What script do you use to collide the seeds with the KHex?

Seed : 2113081982 KHex : 730fc235
Seed : 2179848786 KHex : 730fc235
Seed : 2620256395 KHex : 730fc235
Seed : 3559516538 KHex : 730fc235
Seed : 5559894373 KHex : 730fc235
Seed : 5960477113 KHex : 730fc235
Seed : 6204436682 KHex : 730fc235
Seed : 7016671995 KHex : 730fc235
Seed : 8305603871 KHex : 730fc235
Seed : 8560029709 KHex : 730fc235
Seed : 8633074902 KHex : 730fc235
Seed : 9737552820 KHex : 730fc235
Post
Topic
Board Development & Technical Discussion
Re: I found a method to reverse public keys to private keys
by
AbadomRSZ
on 25/02/2025, 00:35:40 UTC
I hope he comes back and proves he's capable! Grin
Post
Topic
Board Development & Technical Discussion
Re: I found a method to reverse public keys to private keys
by
AbadomRSZ
on 24/02/2025, 19:45:12 UTC
I decided to join in the fun as well, private key and k nonce 200 bits but they were generated with my script!

Code:
public_key: (100294193921211249051138660251652642324139747863533407083596980561416295326134 : 88248257669731470714700196852673878038781216985954649158849096031930923409205 : 1)

r = 0xa7a485bf6453503e924d52985c2762fca0afc214d44a15412d95baea55eae063
s = 0xe0022cc19a011734f436d7ba316003989aeab58eccf1795d407c758e820b5e91
z = 0x49a5e79978dfad44c33b7e8dc8e092ac9a0a80b01e70034f72836489988e8294

r = 0xceb399fc671d814aee808626dd5ae8f3ef0f3856741ce2d516be1b59042d0e0
s = 0x1f7c68cc3c5fc13d089e9f734581029f8fd32ab8fe8b8ee3db3f564ed59c9ae9
z = 0x131287092adc402875864067c996d676fc7230c6e240e8e3aaab4cebdc48dc3f

r = 0x6c723a1e3bec228fba03b1bfb413c2161f9d06d04f18322abba7dfe12d6dc71e
s = 0x8e728c485417c937ea98bcc6dc740b307d932971bbe3e9123754abaa98b040b3
z = 0xf2b4b224af793c82273956a8c176a1888feac39b66a5fe13b6737c8de1aed323

r = 0xcf26c301b9883ce8c5ff73d4b4ebf1433d9e8968dddd835ae6b12186621e376e
s = 0xcfe55d8ef6031233be7a7717b0789085c3dbf8360c3cf4bab42cf9b049a41c8
z = 0x31f843dfa96949027ff06458643c40cbfb08bb783058d88d995fa145f96c1587

r = 0x9b732053ed98c72dfd3c88a71355e21c69c7aa31c3f2c1557730921d2f91d778
s = 0x4a85505d27bc5558ffe972e879918da87ca04c0275008aade7e42deea90cbf30
z = 0x15b1e3f8bc4ec7825c76dc998ff3ce89e483004e807cd40022726295153c30eb

r = 0xc5602039d6a8c2b1ecd9beb528c22a4940bf803d2c58df035ec6e5ef386ea19a
s = 0x82aaae7b148dcaa2fa33faec008766d260cd6c3596ca827dc7ea7bf8b7e3d36
z = 0xd57f7ccd9c0ccb2e61f71b7840682c4d5573a9d4110a318bd8d79572c11491c5

r = 0x827607246fcb2cfed407c75da0377b47f48b2d7c0bbe37a09d01e1263589cbc8
s = 0xcc2b1abf5a80e47d4b8c56d23b9fa74f806a601e48f41fdab89912c69f89cf31
z = 0x62d9a63c3a246817dd9b0ad1ec05111456f8b84b76d74b6a1bdc2416ee19ee94

r = 0x2fbb4916bfd36e09ef9d7258db007992f0fe4d9d53042db9a2e0548b2e61a874
s = 0xd44d679ce9fe431674b0a168a396911634180e9483b5f49810905657f3c7834d
z = 0x5061314ee75e75d5ba8c63f755b1ef3862bc7055759a76b45ec519f539a2f031

r = 0x66cb13fc296eaf010366fbe23f9f326ea9c9d6ef4feae1fbd529d97473ee0178
s = 0x15d6ff2c6af8e5783abe75d95ba0a9afa5d70be23a2e055c9034ca87ec3f673f
z = 0x93acf23e800208a3dc27fcf70fae39f2a19334a3d2e8b64da1c30970f234628

r = 0xa0e5e2b6c0de6fad31c269ae8e8bbbe199496cfae68e27a7f43a9da93156c6f7
s = 0x5991555003749fee4e06c98a9578ff3bb027dd7abf8206472743e11fe663b6b1
z = 0x276489be17a33e261cd422800d39f76ccb0ace2991ac6b3635a8d1d9d0ea6c0f
Post
Topic
Board Bitcoin Technical Support
Re: Help me to recover 33.54 BTC from a corrupt wallet.dat, I'll pay you a Reward!
by
AbadomRSZ
on 23/02/2025, 14:38:05 UTC
Send the wallet to my email and I'll open it and we'll split the BTCs.

cassiosamasr@gamil.com