Search content
Sort by

Showing 20 of 29 results by Noname400
Post
Topic
Board Project Development
Re: List of all Bitcoin addresses with a balance
by
Noname400
on 15/06/2021, 12:42:25 UTC
Where can I get or how can I make addresses with a balance for other currencies?
Post
Topic
Board Project Development
Re: List of all Bitcoin addresses ever used - currently UNavailable on temp location
by
Noname400
on 15/06/2021, 12:40:39 UTC
Where can I get or how can I make addresses with a balance for other currencies?
Post
Topic
Board Project Development
Re: treasure hunt
by
Noname400
on 12/06/2021, 09:45:41 UTC
I doubt people will convert your code to C+/Rust for free, so i suggest you check these options,
1. Use PyPy (https://www.pypy.org) which improve your code performance without change single line of your code.
2. Use another compiler such as Numba (https://numba.pydata.org/). I never tried Numba though since you need to modify your code and read the documentation.

PYPY, I've already tried the performance drops or is the same
Numba, does not have time to accelerate, and therefore the performance drops.
there is no way out yet.
only GPU left or C ++ insert
Post
Topic
Board Project Development
Re: List of all Bitcoin addresses with a balance
by
Noname400
on 05/06/2021, 20:10:48 UTC
is it really possible to unload from other currencies?
Post
Topic
Board Project Development
Re: treasure hunt
by
Noname400
on 05/06/2021, 20:07:50 UTC
help translate my c ++ code or RUST
this will increase productivity.
Post
Topic
Board Project Development
Re: treasure hunt
by
Noname400
on 05/06/2021, 16:20:09 UTC
Before you proceed further, you should delete your mail credentials on your code. I suggest you move it to the .env file, and change your current one, assuming you unintentionally put your real password.

Deleting lines and pushing the changes doesn't completely delete them, because they are still accessible in older commits.

You should make a copy of all the repo's files (except for .git/ folder), and then force-push it to the remote which will delete the entire commit history like this:

Code:
git init
git remote add origin https://github.com/Noname400/mnemonic-colider
git add *
git commit -m "commit message"
git push origin main --force

I have my own mail server.
already changed passwords.
thanks for the help.
Post
Topic
Board Project Development
Re: treasure hunt
by
Noname400
on 05/06/2021, 10:19:13 UTC
I can't read your README since it's all in Russian but for starters you could add Cython to your python project, write your python files in that syntax and then compile them down into a C++ library, with a simple entry point, something like a main() function. Then dynamically load it from a small, simple, C++ program.

I am very bad at working with C ++
I can't even imagine where to start.

Well for starters, numpy is written using Cython and only uses a really basic amount of C language. So you can start by reading Cython's tutorials: https://cython.readthedocs.io/en/latest/src/tutorial/index.html.

But if you don't know much C++ then if you wanna port programs to it you're going to have to at least learn C, the subset of C++. Raw C is slightly faster than using C++'s std library anyway and only has a few syntax/library functions you need to learn, the higher-level functions you might need can be swiped from Github and Stack Overflow.

Thank you. I will consider.
Live and learn
Post
Topic
Board Project Development
Re: treasure hunt
by
Noname400
on 05/06/2021, 10:11:02 UTC
Before you proceed further, you should delete your mail credentials on your code. I suggest you move it to the .env file, and change your current one, assuming you unintentionally put your real password.

Thank you. really forgot.
Post
Topic
Board Project Development
Re: treasure hunt
by
Noname400
on 05/06/2021, 06:17:08 UTC
I can't read your README since it's all in Russian but for starters you could add Cython to your python project, write your python files in that syntax and then compile them down into a C++ library, with a simple entry point, something like a main() function. Then dynamically load it from a small, simple, C++ program.

I am very bad at working with C ++
I can't even imagine where to start.
Post
Topic
Board Development & Technical Discussion
Topic OP
treasure hunt
by
Noname400
on 04/06/2021, 17:45:33 UTC
I wrote a small program for finding treasures. (https://github.com/Noname400/mnemonic-colider)
but it is very slow ...
can someone tell me how to port it to C ++
Post
Topic
Board Project Development
Re: Mnemonic Slots
by
Noname400
on 02/04/2021, 05:21:51 UTC
wrote a simple program.
7 currencies can be searched.
maybe someone will be interested
https://github.com/Noname400/mnemonic-colider
Post
Topic
Board Development & Technical Discussion
Re: BitCrack - A tool for brute-forcing private keys
by
Noname400
on 04/02/2021, 16:20:10 UTC
Need Advice on a Risk Management Question ?
So when we eventually  Grin find the Private Key using BitCrack for any of these Bitcoin challenge transactions,
What will be the best/safest method to import the private key into your own wallet in the quickest possible time ?
eg : To an Exodus Digital Hot wallet or to a cold storage offline wallet or bitcoin core address

I heard that its possible to use transaction fees to redirect an import of private keys to another wallet
since there will be so many hackers sniffing for transactions/keys from these wallets trying to intercept transfers.
Is this possible or highly unlikely ?

Thanks  Wink

http://www.sensoria.org.uk/wp-content/uploads/2019/07/the-adventures-of-robin-hood-1200-1200-675-675-crop-000000.jpg



who's stopping you from giving a higher commission? and don't worry about hackers.
Post
Topic
Board Bitcoin Discussion
Re: Baby Step Giant Step Combined Efforts to Find 1.2 Bitcoin
by
Noname400
on 24/01/2021, 16:46:55 UTC
connecting to tests.
interesting idea
2 prots with 24 cores. see what happens.
how best to run? 48 processes?
Post
Topic
Board Development & Technical Discussion
Re: BitCrack - A tool for brute-forcing private keys
by
Noname400
on 16/01/2021, 14:58:06 UTC
I have compiled cuBitCrack using CUDA 11.2, confirmed working on 2080, 2080ti, and 3070 without the multiplication issue preventing private keys from being found.

Can anyone help me create a windows binary?

https://github.com/yoyodapro/BitCrack/releases/tag/v11.2-alpha

Apologize for the late reply to this comment, but @yoyodapro, what "multiplication issue" are you referring to? I've read this entire thread and do not recall an issue like that being mentioned. While I am using a 3090, I was able to compile the current build of bitcrack against CUDA 11.2 but updating the references from CUDA 10.1 to 11.2. While cubitcrack still gives the misaligned address error, clbitcrack seems to work fine, albeit at a slower rate. But curious what issue you are referring to so I can understand how it may or may not affect what I am working on.

if I understood correctly you have P2SH addresses in the list
they start with "3"
BitCrack does not accept them
Post
Topic
Board Development & Technical Discussion
Re: BitCrack - A tool for brute-forcing private keys
by
Noname400
on 15/01/2021, 20:08:55 UTC
good evening to all enthusiasts.
I found many versions and modifications of this project. In addition to the original branch from the respected brichard19, I found a branch with a random search. Should I use it? the better or worse it is.
in the original branch, everything is simple (start + step + step + N step)
random points are generated in the branch. but I don’t understand after the generation, the search proceeds further by random choice or also (random point + step + step + N step)

Are you talking about the points being chosen by an RNG? I am not totally sure how long does the process of generating random numbers takes because I haven't measured it, but I'd say it could take a noticeable percentage of the time it takes to check a private key.

I still feel like pregenerating a bunch of keyspace ranges beforehand and passing those to bitcrack serially is a better approach at randomization than generating a random number 2^X times per second (X is an arbitrary number proportional to the speed of your GPU).

Anyway it would be nice if you linked that version of Bitcrack you're talking about so we can take a look at it's commit history to see what it changed.

https://github.com/brichard19/BitCrack/pull/148/commits

I will be grateful for any thoughts.
Post
Topic
Board Development & Technical Discussion
Re: BitCrack - A tool for brute-forcing private keys
by
Noname400
on 15/01/2021, 19:59:41 UTC
Thanks for the help a ton, and only changed the c_c to 35 in my case. made the solution file work as a charm,
otherwise no issues yet.
is there a verbose mode on this bitcrack as of no others have that, like show where it is now instead of continue file.
changed to 1024 now.
thanks guys

I compiled for you.
try it. if it starts, I will give the value MAKE ()

NVCCFLAGS=-std=c++11 -gencode=arch=compute_50,code=sm_50 -gencode=arch=compute_52,code=sm_52 -gencode=arch=compute_60,code=sm_60 -gencode=arch=compute_61,code=sm_61 -gencode=arch=compute_61,code=compute_61 -gencode=arch=compute_70,code=sm_70 -gencode=arch=compute_75,code=sm_75 -Xptxas="-v" -Xcompiler "${CXXFLAGS}"

I compiled for you.
try it. if it starts, I will give the value MAKE
or try changing MAKE and compile it yourself.
The CUDA version is very good.
https://github.com/djarumlights/BitCrack
Post
Topic
Board Development & Technical Discussion
Re: BitCrack - A tool for brute-forcing private keys
by
Noname400
on 14/01/2021, 10:32:26 UTC
Post
Topic
Board Development & Technical Discussion
Re: BitCrack - A tool for brute-forcing private keys
by
Noname400
on 14/01/2021, 10:10:04 UTC
good evening to all enthusiasts.
I found many versions and modifications of this project. In addition to the original branch from the respected brichard19, I found a branch with a random search. Should I use it? the better or worse it is.
in the original branch, everything is simple (start + step + step + N step)
random points are generated in the branch. but I don’t understand after the generation, the search proceeds further by random choice or also (random point + step + step + N step)

Are you talking about the points being chosen by an RNG? I am not totally sure how long does the process of generating random numbers takes because I haven't measured it, but I'd say it could take a noticeable percentage of the time it takes to check a private key.

I still feel like pregenerating a bunch of keyspace ranges beforehand and passing those to bitcrack serially is a better approach at randomization than generating a random number 2^X times per second (X is an arbitrary number proportional to the speed of your GPU).

Anyway it would be nice if you linked that version of Bitcrack you're talking about so we can take a look at it's commit history to see what it changed.
He is probably talking about Pica's version with random feature. Many say it had some bugs in it. I neve used it.

My version generates millions of random starting points, in the bit range you desire, and then counts sequentially, from each of those random starting points. So if you only want to look in the 8F00000000000000 range, it will generate millions of starting points all starting with 8F, and then compute sequentially. It doesn't take long to generate the points, no longer than generating Kangaroos. It's fast at finding keys in any 2^48 range, but above that, It's better to just search sequentially starting with one key. IMO. So if we took #64 puzzle, and assigned people the front 2^16 range, example 8F00, and another person 8F01, and another person 8F02, etc. all the way to 8FFF, then we only need 256 people to check the 8F range quickly. Now, once that range is done, start with another one like 80, 81, 82, 83, C0, C1, etc.
Who's in?! lol  Grin

Yes that's right.
I am currently using version (Pica's) https://github.com/neutron220/BitCrack

but based on the above, when finding (example) 30m points, I would like to have a random search within the range between the points. I think this will speed up the search.
and it also gives a chance for people with slow and old cards to play this game. as fast cards go through consistently much faster and we have no chance.
Post
Topic
Board Development & Technical Discussion
Re: BitCrack - A tool for brute-forcing private keys
by
Noname400
on 14/01/2021, 08:15:47 UTC
Very interesting, was looking for a tool like this.
Definitely going to give it a try. Cheesy

https://github.com/djarumlights/BitCrack (rndom only CUDA)
https://github.com/neutron220/BitCrack (random all) low speed RX480 8gb 100m/s

Post
Topic
Board Development & Technical Discussion
Re: BitCrack - A tool for brute-forcing private keys
by
Noname400
on 13/01/2021, 16:52:05 UTC
good evening to all enthusiasts.
I found many versions and modifications of this project. In addition to the original branch from the respected brichard19, I found a branch with a random search. Should I use it? the better or worse it is.
in the original branch, everything is simple (start + step + step + N step)
random points are generated in the branch. but I don’t understand after the generation, the search proceeds further by random choice or also (random point + step + step + N step)