Also, I can't seem to find the topic I was reading somewhere the other day. It was the only story I ever heard where the corrupt 0.5.1 wallet was brute forced and the password looked similar, but had some characters altered. I am curious as to the structure the corruption looks like as I have been throwing tokens, wildcards and other additional switches (--typos-delete, --typos-swap..etc) at it for weeks now. Does anyone know if the character count is always the same or is there truncation of any type? What kind of characters where involved as in were they all english characters.
Also, I assume if this could have been done, it would have by now.
Why hasn't someone made a script that replicates the bug of 0.5.1 where you input the original password and it outputs at least a rough idea of what it became?
Maybe I am wrong too because I have read 2 different things that make the claim to the password not working.
The UTF-16 BE issue as well as another issue with the version number being included in 1 part of the encryption and not later on through.
I am pretty techy, but some of this is not entirely clear.