Search content
Sort by

Showing 20 of 94 results by DaCryptoRaccoon
Post
Topic
Board Pools
Re: [∞ YH] solo.ckpool.org 2% fee solo mining 300 blocks solved!
by
DaCryptoRaccoon
on 06/06/2025, 12:08:46 UTC
Using AxeOS latest version

Version:   v2.6.5
ESP-IDF Version:   v5.4
Board Version:   204
Post
Topic
Board Pools
Re: [∞ YH] solo.ckpool.org 2% fee solo mining 300 blocks solved!
by
DaCryptoRaccoon
on 06/06/2025, 11:21:32 UTC
The best share was found since the last block find as I try reset each time so the best share of 600m should be showing on the pool.
Post
Topic
Board Pools
Re: [∞ YH] solo.ckpool.org 2% fee solo mining 300 blocks solved!
by
DaCryptoRaccoon
on 06/06/2025, 11:16:05 UTC
https://solo.ckpool.org/users/bc1qtesc50ye5euqtr67sdqke8xdwef6klasc5vx59

Missing a best share on here.

Should be 600m like the image.

Post
Topic
Board Pools
Re: [∞ YH] solo.ckpool.org 2% fee solo mining 300 blocks solved!
by
DaCryptoRaccoon
on 06/06/2025, 10:44:33 UTC
Why has his best share not re-set? 

Soon as a block is found my one starts again but this one still says his best share is the one that found the block?  Undecided

Trivial bug I guess, holding the share value across the share reset code.

I think there is a issue CK.

I now have 2 miners and 1 of my own saying there best shares are not showing on the pool.

I can share one of mine is not showing the correct best share.

Code:
   "hashrate1m": "317G",
   "hashrate5m": "407G",
   "hashrate1hr": "424G",
   "hashrate1d": "3.08T",
   "hashrate7d": "57.7T",
   "lastshare": 1749206175,
   "shares": 674105907778,
   "bestshare": 10270859.78562477,
   "bestever": 544020438532
  },





Best share is not the same as shown in the miners.
Also can't think of any reason why one miners best share after a block find would not reset and others best shares are not being reported.
If needed I have more images and this is not just a issue for me another miner who is mining on the pool has the same missing best share.

Did you change something on the pool?
The fact is it's not just 1 issue here or just 1 person its multiple issues and not the same people which leads me to think pool issuse.


https://solo.ckpool.org/users/bc1qa8r4up9nchkvdnhcf9feexv2jfantrk48ef374

Defo not right that the block finders best share didn't reset everyone elses did and now we have multiple users claiming there best shares are not being reported.

Please have a dig CK something is wrong.

Best Regards!
Post
Topic
Board Pools
Re: [∞ YH] solo.ckpool.org 2% fee solo mining 300 blocks solved!
by
DaCryptoRaccoon
on 04/06/2025, 23:48:33 UTC
Why has his best share not re-set? 

Soon as a block is found my one starts again but this one still says his best share is the one that found the block?  Undecided

Code:

{
 "hashrate1m": "255P",
 "hashrate5m": "238P",
 "hashrate1hr": "185P",
 "hashrate1d": "20.2P",
 "hashrate7d": "6.72P",
 "lastshare": 1749080658,
 "workers": 380,
 "shares": 7456392485743,
 "bestshare": 137427866914851.2,
 "bestever": 137427866914851,
 "authorised": 1721981103,
 "worker": [
  {
   "workername": "bc1qa8r4up9nchkvdnhcf9feexv2jfantrk48ef374.4",
   "hashrate1m": "255P",
   "hashrate5m": "238P",
   "hashrate1hr": "185P",
   "hashrate1d": "20.2P",
   "hashrate7d": "6.72P",
   "lastshare": 1749080658,
   "shares": 5309686766963,
   "bestshare": 137427866914851.2,
   "bestever": 137427866914851
  }
 ]
}

Post
Topic
Board Bitcoin Technical Support
Re: Need help plz
by
DaCryptoRaccoon
on 15/05/2025, 09:53:14 UTC
You should make a back up of the file before trying anything on it
this is always advised just incase something happens.

If you think you know the password you could try decrypt the file and output the contents with

Code:
gpg --decrypt recovered_file.gpg > output_file
You could also give this command a go see if there is a secret key for the file

Code:
gpg --list-secret-keys

If the file was encrypted with a symmetric cipher (passphrase only, no public/private key),

Code:
gpg --decrypt --symmetric recovered_file.gpg > output_file

If you still have no luck you could try export the packets and see if they hold any additional information

Code:
gpg --list-packets --verbose recovered_file.gpg > packet_dump.txt

Another good solution is PGPDUMP

Code:
pgpdump file -l -i -m- p  < options are for showing additinal information from the file >

If you have or can recover the private key associated with the key ID (5EB…)

Code:
gpg --decrypt --recipient-key 5EB… recovered_file.gpg > output_file

If you still unsure you could try bruteforce it with gpg2john

gpg2john recovered_file.gpg > hash.txt
john hash.txt

This will convert the GPG file’s passphrase hash into a format compatible with John the Ripper for brute-forcing.

Good luck!


Post
Topic
Board Pools
Merits 2 from 1 user
Re: [∞ YH] solo.ckpool.org 2% fee solo mining 299 blocks solved!
by
DaCryptoRaccoon
on 03/05/2025, 20:30:01 UTC
⭐ Merited by Nexus9090 (2)

So what is the point of only 18 shares per min?  Surly with such a beefy pool we should be able to sumit way more shares.

Something that has puzzled me about the diff and pools for time is why restrict us to such a low value of share per min.

18 works out to 1% variance. There was method to the madness.

Ahh I thought there may have been some method to the number.

Thanks CK and Nexus9000 for the reply
Post
Topic
Board Development & Technical Discussion
Re: Removing OP_return limits is a huge mistake
by
DaCryptoRaccoon
on 03/05/2025, 20:02:26 UTC
thanks for the unfound accusations on my intentions/funding etc. I wish you good luck in your endeavors, that's all I can say at this point  Undecided
So you don't think it's appropriate for you to disclose your potential conflicts of interest?  I'm happy to do so, I have no commercial interest in Bitcoin except for the value of my own Bitcoins.

For example, these discussions appear to be utterly mobbed by undisclosed or poorly disclosed employees, investors, and associates of the Ocean Mining pool.  One of them, for example, made a demand of Lopp to disclose his potential conflict of interest (resulting in a temp ban on github which I think you referenced above),  but over and over again I keep finding non-disclosed ocean affiliates/employees/investors, some of which I only recognize because I was asked to invest in it when it was formed.   I can't help but notice that Ocean's exclusive marketing angle seems to be around spam, and so ISTM ocean has a commercial interest in exaggerating any issues related to spam, since they believe they're the cure.

For all the complaints about the development lists requiring polite conduct, it's somewhat amusing to see the vanishing act when I dish it out a bit here.

I'm blocked by most people so that defo is not me. 

Luke = Blocked me
Lopp = Blocked me
Todd = Blocked me

Probably some others too.  Seem to be the way they shhhh anyone trying to raise any concerns.

if Liquid can have a side chain why can't we just have a data sidechain? Is ir really that hard keep Bitcoin main chain for UTXO's transactions and money based and have a side chain.  Litecoin runs many side chains no issue.  Why Bitcoin can't just do the same is beyond me.

The overall consensus I fell is users do not want this change to occur, granted they may not be well informed on the matter or understand the nature of the changes as not everyone is a tech guru or coder out there we must keep this in mind. 

Rather than lets have another big fall out over some changes lets find soltutions that fit and work and keep bitcoins core finance.  If you really need or want data do it on a side chain.  Why the need to have the data in the main bitcoin blockchain is beyond me.

BuT BrUh MoNkEy JpEg LoOkS cOoL is not a reason.
Post
Topic
Board Development & Technical Discussion
Merits 1 from 1 user
Re: Removing OP_return limits is a huge mistake
by
DaCryptoRaccoon
on 03/05/2025, 14:27:32 UTC
⭐ Merited by gmaxwell (1)
In some respects yes but in others still have concerns that it might lead to bigger problems later.

Like any big change there is always going to be sketical side and the arguments about it pushing users off the network is always valid imo.

https://prnt.sc/lpI2lKmt0X6L

I mean at this point we are already reaching into the $2000+ a year for running a full node block generator or not if size runs away this could cause some run away growth leading to increased cost for many.

We should always be looking to cater to the many rather than the few in my view and this change is for the few not the many.

Thanks for the reply raise some good points.

Regards.
Post
Topic
Board Development & Technical Discussion
Merits 2 from 2 users
Re: Removing OP_return limits is a huge mistake
by
DaCryptoRaccoon
on 03/05/2025, 13:48:31 UTC
⭐ Merited by JayJuanGee (1) ,ibminer (1)
No good can come from this.
Feels like another attack on Bitcoin.
Can we just get back to being the money again?
My post directly above yours lists several reasons why failing to remove the limit is bad.  What elements do you disagree with?


So the removal of OP_RETURN size limit will allow for larger data payloads to be embedded into Bitcoin transaction, which potentally could lead to significant increase in the blockchain size, unlike witness data wich can be pruned in segwit tx's the OP_RETURN data is stored in the UTOX set which will lead to permanent bloat as the blockchain grows. Increaing computational requrements storeage and bandwith to run a full node.

This could price out individuals and smaller users from running full nodes dew to increased cost or higher hardware cost. The effect of this could lear to fewer nodes and have a impact on the decentralization of the network.  A less decentralised network is more vulnerable to censorship, collusion or controll by a small set of well-resouced bad actors. Miners or corporations. 

The pull request acknowedges that some parties are already store data in unspendable output adding bloat to the UTXO set, but also argue that OP_RETURN is less harmfull of a alternative.

However, removing the limits entirely risks exacerbation of the problem rather than a mitigation of it.

Many will claim that data anchoring is inevitable and that OP_RETURN is more efficient way to handle it compared to fake addresses or unspendable outputs.  But the argument that the market for block space will naturally regulate use via fees.  This assumes miners prioritize long term netork health over the short term fee revenue which isn't guaranteed, especially given the pull request not that major miners already bypass these limits for profit.  As many see it Bitcoin core's streanth lies in its simplicity and stablilty which minimize attack surface and ensure long term reliablity.  Removing OP_RETURN limits and associated configuration option such as -datacorrier and -datacarriersize introduce new code paths and behaviours than mist be tested and maintained.

Larger OP_RETURN outputs could amplify existing attack vectors, such as mempool spam or flood-and-loot attacks, as noted by commenter Brazy Development in the pull request.

An attacker could flood the mempool with large OP_RETURN transactions, increasing memory and bandwidth demands on nodes. While nodes have resource management tools (maxmempool size, minimum relay fees ect), these are tuned for typical transaction patterns.  Massive OP_RETURN payloads could push smaller nodes to their limits, delaying transaction processing or causing nodes to crash. Attacks could also cause some disruption the network’s reliability, increase transaction fees, and disadvantage smaller miners who rely on efficient block propagation. The pull request notes that slow block propagation caused by non-relayed transactions getting mined already benefits larger miners, and removing OP_RETURN limits could exacerbate this by enabling more data-heavy transactions.

Proponents such as James Lopp are giving the argumentthat the market for block space and existing node defenses like fee based eviction mitigate these risks. It's being claimed attackers would face high economic costs. However, a well funded attacker like a state actor or competitor chain could absorb these costs to destabilize Bitcoin, and smaller nodes would bear the brunt.  The frustration everyone feels with developers “playing with people’s money” by adding complexity is a common sentiment among Bitcoin maximalists. The pull request’s proponents, like petertodd, argue that OP_RETURN limits are already bypassed and cause harm (UTXO set bloat from fake addresses), but their solution removing limits entirely feels like a capitulation to non monetary use cases rather than a defense of Bitcoin’s core principles.

Why we are not focused on more payment solutions and being the money anymore is beyond me.

What once was is no longer and this could be the very turning point many had the fear would come.

Don't forget where we came from and don't make changes that could damage the nature of the network.

But hey. What do I know.








Post
Topic
Board Pools
Re: [∞ YH] solo.ckpool.org 2% fee solo mining 299 blocks solved!
by
DaCryptoRaccoon
on 03/05/2025, 12:29:20 UTC
@ -ck

I'm just wondering what metrics are used to calculate the pool's difficulty level set for a given worker, is it purely down to the number of shares returned in a given time?

Also, how is the difficulty set by a miner? Most of my rigs run CGMiner which has a suggested difficulty parameter '--suggested-diff xxx' that allow me to set the difficulty I want.

However, I've recently added a BitAxe Gamma and there appears to be no method for requesting a particular difficulty so it falls back to whatever the pool decides, is there an additional parameter that can be set for example in the password field like -d = 10000?

Thanks

G.
Cgminer was the only mining software that implemented the stratum command for suggesting diff. Bitaxe and others use different mining software these days, without any support for suggesting diff. The pool chooses based on submission rate to maintain 18 shares per minute. Suggesting diff is by and large a waste of time since the pool will find the optimal value for your mining hardware over enough time, unless you want to set it higher than strictly needed (there's no logical reason for this apart from a very tiny drop in internet bandwidth.) The pool will ignore you setting too low a diff as this potentially acts as a DoS on the pool.


So what is the point of only 18 shares per min?  Surly with such a beefy pool we should be able to sumit way more shares.

Something that has puzzled me about the diff and pools for time is why restrict us to such a low value of share per min.

18 is hardly a drop in the ocean compaird to the power of the server.

If there is no serious load then why limit to 18 shares per min? 

Would this not also have some effect on the time expected for a block?
If you are exected to solve a block when your shares are on par with network diff then it would take approximately 13 million years to submit 123 trillion shares at 18 shares per minute.

That cannot be correct. 
Post
Topic
Board Development & Technical Discussion
Re: Removing OP_return limits is a huge mistake
by
DaCryptoRaccoon
on 03/05/2025, 12:17:25 UTC
No good can come from this.

Feels like another attack on Bitcoin.

Can we just get back to being the money again?

Thanks
Post
Topic
Board Development & Technical Discussion
Re: Generating Private Keys with OpenSSL in Bitcoin’s Early Days – Methods- History
by
DaCryptoRaccoon
on 15/03/2025, 22:11:28 UTC
Here is a quick breakdown of how it works or how I think it works  Wink

MakeNewKey calls OpenSSL’s EC_KEY_generate_key function to generate a new private-public key pair for the secp256k1 curve.

Code:
void MakeNewKey()
{
    if (!EC_KEY_generate_key(pkey))
        throw key_error("CKey::MakeNewKey() : EC_KEY_generate_key failed");
}

It then steps inside the EC_KEY_Generate from OpenSSL it then generates a random number between 1 and the order of SECP256k1 this number is the private key.

It then multiples the curve base point (G) which is a fixed point on the secp256k1 curve.  the output will be points X,Y on the curve which is the public key. 

Both the private key stored as a scalar and the public key as a point are in the pkey object.


Code:

CKey()
{
    pkey = EC_KEY_new_by_curve_name(NID_secp256k1);
    if (pkey == NULL)
        throw key_error("CKey::CKey() : EC_KEY_new_by_curve_name failed");
}


It then Initializes a new EC_KEY object with the 256k1 curve in NID_secp256k1 in OpenSSL


Code:

CPrivKey GetPrivKey() const
{
    unsigned int nSize = i2d_ECPrivateKey(pkey, NULL);
    if (!nSize)
        throw key_error("CKey::GetPrivKey() : i2d_ECPrivateKey failed");
    CPrivKey vchPrivKey(nSize, 0);
    unsigned char* pbegin = &vchPrivKey[0];
    if (i2d_ECPrivateKey(pkey, &pbegin) != nSize)
        throw key_error("CKey::GetPrivKey() : i2d_ECPrivateKey returned unexpected size");
    return vchPrivKey;
}


It then converts the private key to DER format with i2d_ECPrivateKey and returns it as CPrivKey wich is a vector of bytes with a secure allocator.  Typical size being 279 bytes and incluses metadata and the 32 byte private key.


Code:

vector<unsigned char> GetPubKey() const
{
    unsigned int nSize = i2o_ECPublicKey(pkey, NULL);
    if (!nSize)
        throw key_error("CKey::GetPubKey() : i2o_ECPublicKey failed");
    vector<unsigned char> vchPubKey(nSize, 0);
    unsigned char* pbegin = &vchPubKey[0];
    if (i2o_ECPublicKey(pkey, &pbegin) != nSize)
        throw key_error("CKey::GetPubKey() : i2o_ECPublicKey returned unexpected size");
    return vchPubKey;
}


GetPubKey converts the key to byte vector using the i2o_ECPubKey format would be uncompressed 65 bytes and start with 0x04 and followed by the 32 byte X and the 32 byte Y coordinates

Other things to look at might be CBigNum which is a wrapper around OpenSSLs BIGNUM it's not used in key generation but is used in other cryptographic op's

BigNum handles large integers (keys, hashes, ect)
Provides a mehtod to convert between formats hex, binary and uint256.
Use for signing and verification ie manipulation of the hash in Sign and Verify.

1. Make a key

Code:
CKey key;
key.MakeNewKey();

2. Get PK

Code:
CPrivKey privKey = key.GetPrivKey(); // 279 bytes


3. Generate Pub Key

Code:
vector<unsigned char> pubKey = key.GetPubKey(); // 65 bytes

4. Hash pubKey to create the address.

5. User privKey to sign the TX.

You might want to poke over the early source code since bitcoin early codebase is not that extensive not too hard to pull it apart.

Can I ask why your looking for these things? seems interesting!   

Good luck.


Post
Topic
Board Development & Technical Discussion
Re: how to generate genesis bloack hash using randomx algo
by
DaCryptoRaccoon
on 19/02/2025, 15:22:35 UTC
You might want to start with a early version of Bitcoin if your looking to make changes.

The later versions are not suitable for a new blockchain.

If you are looking to make changes and mine a new chain I would do so in a VM with older versions of Bitcoin bitcoin-0.10.0.tar.gz is a good one for making altcoins with.  Just be aware the packages used and code DO have security issues so local VM with no internet for the build is advised.

Once you have created your chain and mined some blocks you can then start for forward port the software the real issue is Bitcoin today is just not as suitable a codebase for making new chains.

Post
Topic
Board Development & Technical Discussion
Re: 1,157,920,892,373,161,954,235,709,850,086,879,078,532,699,846,656,405,640,394,57
by
DaCryptoRaccoon
on 29/10/2024, 21:10:02 UTC
Code:
def calculate_time_to_explore_keyspace(attempts_per_second):
    total_keys = 2**256  # Approximately 1.15 x 10^77

    seconds_per_year = 60 * 60 * 24 * 365
    keys_per_year = attempts_per_second * seconds_per_year
    total_years = total_keys / keys_per_year
    total_seconds = total_years * seconds_per_year
    total_minutes = total_seconds / 60
    total_hours = total_minutes / 60
    total_days = total_hours / 24

    return total_years, total_seconds, total_minutes, total_hours, total_days

def print_detailed_time(total_years, total_seconds, total_minutes, total_hours, total_days):
    print(f"Total time to explore the entire keyspace: {total_years:.2e} years")
    print(f"Total time in seconds: {total_seconds:.2e} seconds")
    print(f"Total time in minutes: {total_minutes:.2e} minutes")
    print(f"Total time in hours: {total_hours:.2e} hours")
    print(f"Total time in days: {total_days:.2e} days\n")

def present_keyspace_analysis():
    print("Keyspace Analysis for Bitcoin Private Keys")
    print("=" * 40)
   
    high_attempt_rate = 10**9  # assuming 1 billion attempts per second (very optimistic)
   
    total_years, total_seconds, total_minutes, total_hours, total_days = calculate_time_to_explore_keyspace(high_attempt_rate)

    print(f"Assuming {high_attempt_rate:,} keys can be tested per second:")
    print(f"Total keys in Bitcoin (2^256): {2**256:.2e} keys")
    print_detailed_time(total_years, total_seconds, total_minutes, total_hours, total_days)


    hex64_attempts = 10**18  # 1 quintillion HEX64 combinations (also very optimistic)
    total_years_hex64, total_seconds_hex64, total_minutes_hex64, total_hours_hex64, total_days_hex64 = calculate_time_to_explore_keyspace(hex64_attempts)

    print(f"Assuming {hex64_attempts:,} HEX64 combinations can be tested per second:")
    print_detailed_time(total_years_hex64, total_seconds_hex64, total_minutes_hex64, total_hours_hex64, total_days_hex64)
    print("Comparison of Bitcoin keyspace sizes:")
    print(f"- 256-bit keyspace: 2^256 ≈ {2**256:.2e} keys")
    print(f"- 135-bit public key space: 2^135 ≈ {2**135:.2e} keys")
    print(f"- 67-bit address space: 2^67 ≈ {2**67:.2e} keys")
    print("\nProbability of randomly guessing a Bitcoin private key:")
    probability = 1 / (2**256)
    print(f"The probability of successfully guessing a valid Bitcoin private key: {probability:.2e}")
    print("\nConclusion:")
    print("Even with highly optimistic assumptions about the number of keys tested per second,")
    print("the time required to brute-force the entire Bitcoin private key space is")
    print("astronomically high and completely impractical, making the claims about")
    print("recovering lost wallets through this method unfounded.")

if __name__ == "__main__":
    present_keyspace_analysis()


Your numbers do not add up for HEX64.
Post
Topic
Board Project Development
Re: Revolutionizing Bitcoin: A Bold Proposal to Lower Unit Price
by
DaCryptoRaccoon
on 29/10/2024, 20:36:54 UTC
yea ok VOD lets just let them keep gettiing away with this spam will we...

And yes my spelling is terrible I have issues...
Don't move the subject off the spam comments thanks and stay away from personal attacks.

Post
Topic
Board Development & Technical Discussion
Re: 1,157,920,892,373,161,954,235,709,850,086,879,078,532,699,846,656,405,640,394,57
by
DaCryptoRaccoon
on 29/10/2024, 20:30:30 UTC
Why do all these OPs assume the coins are lost and just not being held by the users.

Just because something don't move don't make it fair game...

At this point the forum should really stop allowing these types of cracking hacking stealing topics.

YOU have no proof the coins that have not moved are lost.  ZERO proof...

The mainstream are semi-floating the idea becase they would love nothing more than to do something to try "recover" the "LOST" (or sleeping) coins.

These topics are nothing more than brute force attempts on other people property.

Build something usefull....Not destructive.

PS go find a blackhat forum this is not blackhat stealing world...



The rules of this game are set by satoshi.  I don't do anything outside the rules of this game.
If you had enough information, you would know the criteria for lost wallet assets.
It's not a wallet theft. It's not a theft. It's a lack of satashonin rules.

And there will be a lot of developers and designers who will try this after me.

What have you done for development? Crypto Dom needs a stronger mechanism and more security to prevent its destruction.
1 BTC $70,000
1 BTC = Hash


1. a lot more than you have ever done that is for sure..
2. and stealing coins just because "You think you can" is not a excuse to do so..
3. There is no "criteria" for a lost wallet your just trying to justify stealing..   If a bank keeps a gold bar for 30 years in a valut don't mean you can break in and steal it because it has dust on it and has not moved for time..

Legit your rat theif and not welcome here.. -1 trust for being a scumbag and trying to convince people YOU know there coins are lost.

How fooliish.
Post
Topic
Board Development & Technical Discussion
Merits 3 from 2 users
Re: 1,157,920,892,373,161,954,235,709,850,086,879,078,532,699,846,656,405,640,394,57
by
DaCryptoRaccoon
on 29/10/2024, 13:53:46 UTC
⭐ Merited by pooya87 (2) ,ABCbits (1)
Why do all these OPs assume the coins are lost and just not being held by the users.

Just because something don't move don't make it fair game...

At this point the forum should really stop allowing these types of cracking hacking stealing topics.

YOU have no proof the coins that have not moved are lost.  ZERO proof...

The mainstream are semi-floating the idea becase they would love nothing more than to do something to try "recover" the "LOST" (or sleeping) coins.

These topics are nothing more than brute force attemts on other people property.

Build something usefull....Not destructive.

Post
Topic
Board Project Development
Re: Revolutionizing Bitcoin: A Bold Proposal to Lower Unit Price
by
DaCryptoRaccoon
on 29/10/2024, 01:42:33 UTC
What is this crap... Why are there so many new accounts posting absolute bullshit..

What is worse your replying to it to boost your comments.

This is clearly a AI generated post.. 

Either your farming your ROOBET affliliate link or your dumb..
Post
Topic
Board Pools
Topic OP
Satoshi Radio Block Hunt
by
DaCryptoRaccoon
on 28/10/2024, 17:37:42 UTC
🚀 SatoshiRadio.nl Block Hunt 🚀



Welcome to the SatoshiRadio.nl Block Hunt!

Looking for an exciting way to hunt Bitcoin blocks and score a solid reward? Then you’re in the right place!

If you’ve been around the block (pun intended 😉), you know mining is a mix of teamwork and a touch of luck. The goal? To land a block on the Bitcoin network and split the winnings. Since this is a new pool first find would be making some new Bitcoin history! 

Here’s how the rounds work

1️⃣ ONLY 10 Spots:
This hunt has room for just 10 people! Each of you contributes $250 (around 0.003629 BTC) to the pot.

2️⃣ Pooling for Hashpower:
We pool all deposits to rent hashpower, giving us a better shot. The hashpower will be directed to SatoshiRadio.nl, a new solo mining pool from the Netherlands. This pool is powered by CKPOOL’s legendary solo mining code and has a lively Bitaxe community on Telegram, which you’re welcome to join!

3️⃣ Reward Split:
If we strike it lucky and solve a block, the current reward of 6.25 BTC is split equally among all 10 participants. This is solo mining, so it’s all or nothing, but the payoff could be well worth it.

⚙️ Hunt Details ⚙️

10 places available — $250 in BTC per person
Reward split: 10 ways if we hit a block!
Pool: SatoshiRadio.nl
This is more than just mining—it’s a community effort with a chance for real rewards! Jump in, and let’s make this hunt a memorable one. See you on the block hunt!

Join the Telegram community today and find out what SatoshiRadio are working on!

Telegram : https://t.me/satoshi_radio
Pool  : https://SatoshiRadio.nl


1️⃣ Send your $250 deposit to the address below
2️⃣ Post your Username and TXID in the topic to be added to the list.
3️⃣ Wait for the group to be filled and the mining to start.


Deposit Address : bc1qpyzzu5ley5xs56mlfzndqp6t6s5derw2l7vy72
Please double check your deposit is to the correct address mistakes cannot be resolved!


THE LIST

Code:
USERNAME | TXID | STATUS

1.
2.
3.
4.
5.
6.
7.
8.
9.
10.