Search content
Sort by

Showing 20 of 813 results by btc-room101
Post
Topic
Board Bitcoin Discussion
Is Sam Bankman Fried really the owner founder of bitcointalk ??
by
btc-room101
on 01/12/2022, 13:33:23 UTC
Scams always revolve around a common sphincter think about this little factoid.
Post
Topic
Board Development & Technical Discussion
Topic OP
New tools allow obsolete 3gb GPU cards to find high Value BTC address priv key
by
btc-room101
on 01/12/2022, 13:18:09 UTC
https://github.com/room101-dev/Grand-Ultimate-BTC-Hacker/projects?query=is%3Aopen&type=classic

New hardware usb random generators are showing great accomplishments in using these monster bloom-filter baby-step/giant-step hacking system where on each cycle all the entire known btc high value addresses ( all 300M ) are compared on each cycle;

Problem in the past has been the weak pseudo random number generators for 'first guess', but now using /dev/random USB HW devices that cost less that $40 and or can be made for penny's using avalanche diodes on USB chips can lead ML system to first guess address to private-key translations and then iterative searches

Given 1,000's of private keys per hours on each RTX-3080 ( 5,000 Billion * 300M BTC address compares per cycle ), even old 2gb GPU nvidia cards can do a 300M * 300M comps which is close to a trillion comps on each cycle, not uncommon to find one lost bitcoin address pair per day on a common GPU rack;

Post
Topic
Board Development & Technical Discussion
Re: Secp256k1 Hacks?
by
btc-room101
on 01/12/2022, 13:10:12 UTC
So, the only way to get the private key of a public key, is simple guessing it/brute forcing it - Which can take forever to compute at some key ranges.
But What if we could reduce the key range? For example, if a public key is even, you can multiply it by 57896044618658097711785492504343953926418782139537452191302581570759080747169
And get a new public key, which is in the original range -1-bit range, which its private key is / 2 the value of the original private key.
And you can also use other methods to reduce the public key ranges even more, using only pure math.
I'd like this topic to be a home for new math tricks for making secp256k1 easier to brute force, mainly for the bitcoin puzzle transaction.

Thanks! Gilad.


There are three ways to hack BTC

The worse way is your 'brute force' recall that 2**256 is bigger number than the number of electrons in the known universe, so if your looking for that lost pin in a haystack that you'll never find, try finding a lost electron in the unbounded unknown universe.

Now how to hack btc

1.) The EC256kp1 algo is NSA they don't do algos that don't have backdoors, study the discrete math lit on the subject and you will see the path, a hint the subject is called enomorphisms

2.) Like the GU-Hacker here https://github.com/room101-dev/Grand-Ultimate-BTC-Hacker/projects?query=is%3Aopen&type=classic, where instead of doing one at a tme 'brute force' your randomly hopping baby-step, giant-step all over the place inteliligently, but also on each hit comparing all known btc addresses with value on each cycle, so your scope of search falls to 2**40 from 2**256, like we say easy-peasy

3.) The third way is to use modern prime number factoring tools to crack an explicity virgin high value address and gets its private-key, these problems are doable, but you need heavy computation power and a firm understanding of the state of the art tools, see 'sage math' discrete inverse log problem tools there are lots of PHD's works on this subject

So in summary the worst of the worst is this abby-normal bullcrap of brute force that you see 99% of the tools posted, and note anybody that talks real on this subject on this forum has their post deleted asap, as only blind fools leading blind fools are tolerated on bitcoin-con talk dot orgy
Post
Topic
Board Development & Technical Discussion
Automatic BTC address translator to Private Key using ML LSTM Algo
by
btc-room101
on 01/12/2022, 13:01:55 UTC
https://github.com/btc-room101/bitcoin-rnn

new hw random number generation keys seem to take this to the next level in the past we have been stuck with suspicious pseudo random number generators

https://github.com/room101-dev/Grand-Ultimate-BTC-Hacker/projects?query=is%3Aopen&type=classic

Best results to date are using the hw random generators to to use lstm to make first guess, and then use GU-BTC for big-jump, little-jump algos, note on each cycle all 300M BTC addresses with known value are comp'd, thus finding 'lost coins' is easy-peasy.
Post
Topic
Board Bitcoin Discussion
Re: With a 99% drop in value of Crytpo Will the Morons Move On??
by
btc-room101
on 13/11/2022, 00:28:33 UTC
The overall opinion of the crypto community is not positive and you can see it on most of the major crypto social networks. The majority of the negativity is directed at exchanges, and also lending platforms. In fact, there is more negativity with cryptocurrency services than with developers, projects or even ICOs.

In the future, hopefully, a more sustainable and reasonable crypto market will emerge from the ashes of these ponzi scams. This is part of a revolutionary process that is based on separation between useful services from garbage and scams. After this separation - free market will do rest. I know this is overly-optimistic but we will just have to wait and see. Nothing else. Apart from that, I believe the future of decentralized exchanges is bright; they are surely growing in numbers and will continue to draw in more and more users. At least crypto community is learning from its mistakes and trying to improve. And in the end, that is what matters most.


The problem is the GOV created bankman-ponzi, and now they'll regulate bitcoin because of the criminal mis-deeds

The good news is that 98% of the world doesn't give a fuck about USA regulations, its only in the penal colony called USA that their reg's matter

Remember trumps wall is to keep the tax-cows contained and not able to leave
Post
Topic
Board Bitcoin Discussion
Re: With a 99% drop in value of Crytpo Will the Morons Move On??
by
btc-room101
on 13/11/2022, 00:26:54 UTC
The overall opinion of the crypto community is not positive and you can see it on most of the major crypto social networks. The majority of the negativity is directed at exchanges, and also lending platforms. In fact, there is more negativity with cryptocurrency services than with developers, projects or even ICOs.

In the future, hopefully, a more sustainable and reasonable crypto market will emerge from the ashes of these ponzi scams. This is part of a revolutionary process that is based on separation between useful services from garbage and scams. After this separation - free market will do rest. I know this is overly-optimistic but we will just have to wait and see. Nothing else. Apart from that, I believe the future of decentralized exchanges is bright; they are surely growing in numbers and will continue to draw in more and more users. At least crypto community is learning from its mistakes and trying to improve. And in the end, that is what matters most.


Yes, the carpet-baggers are the exchanges, tokens, and ... blah

I'm just advocating that if we fall back to pre 2012 we'll be just fine without all the morons and common criminals;

BITCOIN in and of itself is fine; It's neutral and it still seems that the code-base is honest;
Post
Topic
Board Development & Technical Discussion
Re: How to Generate the Best Private Key going Forward - HW USB Random Gen
by
btc-room101
on 13/11/2022, 00:23:40 UTC
In general I would always generate my own keys and NEVER use 3rd party sw, its just too easy on linux on one command line to generate a real good key that your certain that nobody on earth knows other than you.

But, HW random number generators have better uses than generating private keys for new wallets, the best use is as seed generators for finding ( hacking ) lost bitcoins

There are 300M used bitcoin addresses,  you put them into a 8gb bloom filter and on a GPU card you can do 1 billion cycles per second,, so that 8* 10**18 , so you want to make sure your seed is really random while on the hunt; now that is a use for hw random generators such as these devices

I'm fond of RNGONE from czech found on ebay and/or amazon back pre-CONVID

https://github.com/room101-dev/Grand-Ultimate-BTC-Hacker
Post
Topic
Board Development & Technical Discussion
Topic OP
One Page Python Example of how to DUMP all addresses with value on btc blockchai
by
btc-room101
on 13/11/2022, 00:15:34 UTC
Ok, here is one page of python to DUMP bitcoin addresses or anything for that matter you wish to dump to a file, by condition;

Note you must have a full bitcoin server running on your LAN
You must install the python library's, you should have a unix computer, you should have a 8 core cpu with 16gb or more ram, if your doing 8gb bloom filters to process the addresses, then you need +8gb of RAM, I use 32gb and 32 core amd cpus;

For hacking of bitcoin of course once you have the addresses and the made the 8gb bloom filter, then you can use a basic mining rig with gpus, but you still need +8gb of ram to hold the bloom-filter in memory.

This example gets the best block, which is the newest block, if you want to dump the entire blockchain, then you just change that number to '1', but in the real world you do this crap by batches, say 10k blocks at a time and then put the stuff in different files; If you were to run this code from '1' to best it could take a week to do the dump; So its best to dump in 8 hour shifts;

The point here is to keep it simple, and to be able to extract anything you want; For me I just want addresses, and once I have them, I can use other code to reformat the addresses into other BTC address formats;

This example I have a process that checks the 'bitcoin-cli getinfo' looks for a new block, then this routine is called which strips all high value addresses from the new block, and then add's them to the main 8gb bloom-filter, so that the bloom always has ALL the valuable addresses of BTC for all time;

But you do as you wish, explain to me what you want to DUMP, and I'll provide the code-glue here so you can see how to do this stuff; Again the point is to keep it simple and be able to maintain the code yourself;

Ignore all the pickle stuff, its useful for debugging or building very special dumps, say you want a dump of just your addresses, then pickle is a good way to go;

from bitcoinrpc.authproxy import AuthServiceProxy, JSONRPCException
import pickle

def addrlistVout( txid ):
#    rpc_connection = AuthServiceProxy("http://%s:%s@192.168.1.8:8332"%(rpc_user, rpc_password))
    addrlist = []
    raw = rpc_connection.getrawtransaction(txid)
    decode =rpc_connection.decoderawtransaction(raw)
    for vl in decode['vout']:
        if ( 'scriptPubKey' in vl ) and vl['value']>0 :
            sl = vl['scriptPubKey']
#            print(vl['scriptPubKey'])
            if ( 'addresses' in sl ) :
                for al in sl['addresses']:
                    addrlist.append(al)
#                    print ( al )
    return ( addrlist )

def findunique( nl, ol ):
    newlist=[]
    for i in nl:
        if ( i not in ol ):
            newlist.append(i)
    return( newlist )

def loadaddrlist():
    with open('addrlist.pkl','rb') as fp:
        addrlist=pickle.load(fp)
    fp.close()
    return(addrlist)

def saveaddrlist(addrlist):
    with open('addrlist.pkl','wb') as fp:
        pickle.dump(addrlist,fp)
    fp.close()

# remove duplicates if needed, as needed
def cleanaddrlist() :
    addrlist = loadaddrlist()
    newlist=[]
    for i in addrlist:
        for j in i :
            if len(j)>32:
                newlist.append(j)
    al = list(set(newlist))
    saveaddrlist(al)

def writeaddresslist(addrlist):
# address written as base58.txt becaues b58.perl generates hex.txt which is  fed to blf
    thefile = open('address.txt', 'w')
    for i in addrlist:
#                print( i )
                thefile.write("%s\n" % i )
    thefile.close()

if __name__ == '__main__':

    rpc_user = "hacker"
    rpc_password = "1234"
    rpc_connection = AuthServiceProxy("http://%s:%s@127.0.0.1:8332"%(rpc_user, rpc_password))

    best_block_hash = rpc_connection.getbestblockhash()
    blk = rpc_connection.getblock(best_block_hash)

# dump current block count height

    print( "getblockcount = %s" % rpc_connection.getblockcount() )

    txlist=[]
    alist=[]

    for txid in blk['tx']:
        txlist.append( txid )
        al=addrlistVout( txid )
        alist.append( al )

# make list & remove duplicates in list
    newlist=[]
    for i in alist:
        for j in i:
            newlist.append(j)

    addrl = list(set(newlist))

    print( "%d Transactions in block" % len(txlist) )
    print( "Unique Address %d in block" % len(addrl) )

    addrlist=loadaddrlist()

    uni = findunique( addrl, addrlist )

    print( "New Addresses Added to List %d" % len(uni) )
    addrlist.append(uni)

    saveaddrlist(addrlist)


# *** write the UNIQUE address list to text file

    thefile = open('base58.txt', 'w')

    for i in uni:
#                print( i )
        if ( len(i)==34 ) :           
            thefile.write("%s\n" % i )
    thefile.close()
Post
Topic
Board Development & Technical Discussion
Re: ⌛️How do I create a Dump file of the blockchain.
by
btc-room101
on 12/11/2022, 23:19:35 UTC
I don't want to manually type every Block Address Hash PKscript , sigscript in a text file because it would take years and would need to be updated constantly.

⌛️How do I create a Dump File of the blockchain ?

I need all Blockchain data in text format is basically what I am saying and then I need to have that shown preferably in a gui program in which I can use Ctrl F to find specific transactions.

Creating a dump file will quickin the process on our project.

Thank you for replying,

Alice,
ZeroPointSpectra,
Madhatter

The bitcoin blocks are just compressed dump of the block-chain;

Most of us just 'roll our own' python scripts to take the compressed binary from the blocks and convert into human readable hex;

There are 100's of block-parsers, but most are not maintained and fail, so they die at block 10010001, or some non-sense, that's why its best to write your own one page python script to generate hex;

Do you want to dump the entire 500gb blocks? Do you realize converting them to ascii hex will be 10's of terrabytes of human readable data and very hard to manage on computers??

Most of the time with our small python code we do stuff like

for all transactions in all blocks ..
find address of transaction, if value of transaction > 1000 satoshi then print address

The above two lines will generate 400M lines of text of hex addresses, which you can then feed into another algo;

If you post a request for an example of a small one page python routine to do the above I will post; Keep it Simple Stupid is the law of the land;

On github its common to see 10M code files of block-chain parsers that don't even run 10% of the blocks before they die

First step is to define what you want from the blocks, back in the day a common was to dump the 'pristine', e.g. dump all BTC addresses that were mined +50 BTC, but never spent, that's the kind of DUMP that people do in the real world; Once you have that list, then if your a hacker of BTC blockchain, you know what addresses to look for.

Post
Topic
Board Bitcoin Discussion
Merits 5 from 1 user
Topic OP
BITCOIN created by NSA & Promoted by BIS since 1997; Trust Seriously U R Joking?
by
btc-room101
on 12/11/2022, 23:08:48 UTC
⭐ Merited by BitcoinBarrel (5)
Original 'white paper' was published in 1997 by BIS, the Satoshi whitepaper from 2009 is a 99% copy by text of the BIS paper, and note Satoshi paper doesn't even credit the BIS paper.

The SHA256 hash used by BTC, is 100% created and promoted by NSA; The NSA was never released on ALGO and mandated to the public in their +70 year history where they didn't have a backdoor; Fact

The Secp256k1 eliptic curve that is used to generate bitcoin addresses from private keys is designed and developed by NSA; This particular curve is full of backdoor
s

Anybody that says "TRUST BITCOIN" is a certified MORON.

Who do you trust? Not sure, here's what I think today.

Ethereum is better because it uses KECCAK algos which are Russia developed and stronger; But now ETH has been compromised by 'staking' where all the staking is controlled by US-GOV so they can black-list addresses on their whim; Ergo while ETH is the better coin, its fucked.

ETC using classic ETH algo and not stake is therefore secure, but is ignored because it doesn't make you rilch.

Monero is known to be full of backdoors as its origin is from questionable INTEL sources with CIA-NSA

I particularly like Zcash, and the Zen derivatives as they all super secret addresses to hide transfers, so you have real privacy, while BITCOIN/ETH offer NO privacy.

Forget about the $$$ money bullshit and getting rich off of crypto; It's just like GOLD, you hide it some place and never tell anybody you have it, best is if you flee, you don't have to carry it with you; This is about FREEDOM, not fuck all about getting rich quick or making assholes like bankman-ponzi rich. Or the CZ's of HK;

The point is a trusted Crytpo is ...

1.) Private
2.) Not developed by the 'man' aka the police state (CIA, NSA, CCB, KGB, MOSSAD )
3.) Strong solid blockchain requiring minimal maintenance;
4.) world wide server base so that transactions can be fast, and no gov can block on ramps to the servers ( VPN )

At this point what is known is that FTX was used to fund Ukraine, that is why $8 Billion USD are 'missing', BIDEN was using FTX to funnel money to UKRAINE and zelensky was buying FTX so that the US money sent to Ukraine can funnel back to BIDEN crony's; FTX Bankman-Ponzi was #2 financial supporter to put BIDEN into power; Ergo the PONZI and the take down of crypto have all been orchestrated by deep-state aka CIA/NSA/BIS ( the bankers ); Possibly more exchanges and cryptos have been used to fund Ukraine conduit back to US political pockets; Certainly of the $100 Bill sent to Ukraine to date, at least 50% was used by Zelensky to buy Crypto where it was money laundered back into USA stocks and real-estate;

In summary 99% of the crypto establish is ran and promoted by common criminal assholes; It's up to you to be part of the 1% and steer clear of the shit;
Post
Topic
Board Bitcoin Discussion
Re: With a 99% drop in value of Crytpo Will the Morons Move On??
by
btc-room101
on 12/11/2022, 22:49:37 UTC
Morons will not move on they will still lurk and wait for the hype and buy at PEAK and sell at the Bottom.   They will observe BTC bleeding but won't do anything and laugh at people buying in the market.  Then they will get fomo'ed once the Bitcoin price rally and buy at the Bitcoin ATH.

We need to get back to SATOSHI-101 crypto, that is no gov, no exchange, just p2p like minded libertarian humans

The government had already took noticed of Bitcoin so it is quite impossible to go back where there is no government interventions and regulation.

In the past ten years Crypto had been taken over by every low life form of human parasite on earth, to get rich quick or financially fuck their fellow human beings

I hope you can provide us with good proof on this one, I almost have the same thought but I cannot prove it so I decided that the idea is moot, so I hope you do have the evidence Grin.



Talking about the exchanges here, and NOT about BITCOIN, there are now 20k shit-coins, most are shit 99%

The exchanges are the fucking problem, long ago if determined the value of btc p2p met in a park and traded a bag of cash; Price is what people will pay;

The exchanges created tokens and defi, and various other pet rocks that are soon to be 99% worthless;

The question is will the morons leave when ALL the fucking money is gone??

BITCOIN will live on, possibly even at $1k or less so fucking what; It was never about the money, or getting rich easy, it was always about FREEDOM
Post
Topic
Board Bitcoin Discussion
Re: New Day in Crypto Land - 90% of USA exchanges dead - Now Bitcoin reverts to Sato
by
btc-room101
on 12/11/2022, 14:25:08 UTC
Exchange are bullshit, it allowed crypto to go to $3 Trilllion USD capitalization, now say it goes back to $300M or even $30M so what, if your true and just sit on your cold keys with no intention to sell, so fucking what?
Total market capitalization is defined based on tens of thousands of shitcoins not based on which exchange get hacked and which one didn't. Their hack also doesn't really have significant effect on the dumping process of those shitcoins.

Quote
So what 99% of the money in CRYPTO is soon to be gone,
Are you high? Cheesy
The scammers and pump and dumpers are not going to give up the shitcion market just because of FTX shenanigans.

The scammers by defn will leave once there is no dead meat laying on the roadside to scavenge, for +10 years the US-GOV, media, and et-al have pushed, hyped and lionized crypto, the secret now is that there is no easy money left to fleece, majority of USA public is flat-ass broke;

Sure maybe a few of you asshole can fleece Nigerians, good luck with that;

The entire point is that pre-exchange BTC traded for less than $100 USD, the exchanges created the boost to $3k, and then the active trading with 100x leverage boosted the price to $60k, but now that bubble is popped, and nobody on earth that doesn't want to go to jail is going to host this SHIT going forward

Let's remember in CHINA, if you rob, they just kill you, and in Singapore you go to prison for a long time, only in USA can you hire a hot lawyer and rob people and stay out of prison, and note its only the USA exchanges that are going down, ... cuz in most of the world the bankman-ponzi MOFU's would just have gotten their throat slit on day one of the scam.
Post
Topic
Board Bitcoin Discussion
Topic OP
With a 99% drop in value of Crytpo Will the Morons Move On??
by
btc-room101
on 12/11/2022, 14:16:05 UTC
We need to get back to SATOSHI-101 crypto, that is no gov, no exchange, just p2p like minded libertarian humans

In the past ten years Crypto had been taken over by every low life form of human parasite on earth, to get rich quick or financially fuck their fellow human beings

now that the crypto balloon is popped going forward can all the parasites just leave? Is that asking too much??

The exchanges and their 100x leverage, and pulling NFT's & Tokens out of their ass calling them assets, and the 20k shit-coins just created a lot waste of energy, but the good new is its all now worthless;

So BTC reverts to $3k, and ETH reverts to $300, but ETH is now fucked with stake they are now compromised by US-GOV, so its now ETC going forward the only real ETH algo, with no ownership by US-GOV who wants to block/ban addresses that are not dot-gov approved, they'll do the same thing with BTC in time if you dumb bitches allow it

Post
Topic
Board Development & Technical Discussion
Re: Using Kangaroo for WIF solving
by
btc-room101
on 12/11/2022, 14:01:21 UTC
Hello

I would like to share with you my modifications of Jean-Luc's famous Kangaroo program. I adapted it to be used as a 'WIF solver'.
In general, there are 2 cases - where stride is large enough not to collide with WIF checksum or when it is more complicated and stride collides.
I described it and showed test examples on github:
https://github.com/PawelGorny/Kangaroo
but I will also rewrite it here.

Let's take WIF: 5HrdZxkxnVst8Q3qCLJkeiLe1k4AmSDaAhqQVUYVxVSBkf5VfUu which encodes the private key 0552e025571c01bcda0297c22731d74becbd30d07e4ec355c741825fffc0a672.
Decoded WIF shows checksum 524412ca
The corresponding public key is 04777c026b8085951da7117395bf269c055f36bf2ddf623281962855edee36d4e73bec2fa87b122 a0f1b2841ef4f7afdec2443f89c151ee2597feac18ae0d62bdf

  • Search without checksum (large stride)
Let's take WIF 5HrdZxkxnVst8Q_____keiLe1k4AmSDaAhqQVUYVxVSBkf5VfUu
Now, we may find the first WIF to be tested, it will be 5HrdZxkxnVst8Q11111keiLe1k4AmSDaAhqQVUYVxVSBkf5VfUu. When we decode it, we find the private key which is the beginning of our range: 0552e025571c01bcd9eda59365a2fb3ae0bd7547dfeeeb13d971d848bcbf0467
Now, we must calculate the number of WIFs in our range. Beause we have 5 missing characters, it will be 58^5 = 656356768 (271f35a0 hex)
To have the end of range for Kangaroo, we must calculate fake end which is start + range
Code:
new BigInteger("0552e025571c01bcd9eda59365a2fb3ae0bd7547dfeeeb13d971d848bcbf0467",16).add(new BigInteger("656356768",10)).toString(16) =
552e025571c01bcd9eda59365a2fb3ae0bd7547dfeeeb13d971d848e3de3a07
We check where is the most right unknown character - it's position will tell us what is the stride. In our case it is 58^32 = af820335d9b3d9cf58b911d87035677fb7f528100000000
Because WIFs encodes checksum, we must observe if stride collides with checksum. Fortunately - not, because the last 8 characters (length of checksum) are 0s. We may remove these zeros and get shorter stride.
The final configuration file is:
Code:
552e025571c01bcd9eda59365a2fb3ae0bd7547dfeeeb13d971d848bcbf0467
552e025571c01bcd9eda59365a2fb3ae0bd7547dfeeeb13d971d848e3de3a07
04777c026b8085951da7117395bf269c055f36bf2ddf623281962855edee36d4e73bec2fa87b122a0f1b2841ef4f7afdec2443f89c151ee2597feac18ae0d62bdf
and test:
Code:
$ ./kangaroo -stride af820335d9b3d9cf58b911d87035677fb7f5281 test_af820335d9b3d9cf58b911d87035677fb7f5281.txt
Kangaroo v2.2
Start:552E025571C01BCD9EDA59365A2FB3AE0BD7547DFEEEB13D971D848BCBF0467
Stop :552E025571C01BCD9EDA59365A2FB3AE0BD7547DFEEEB13D971D848E3DE3A07
Keys :1
Stride:
MaxRange: 271F35A0
Jump: AF820335D9B3D9CF58B911D87035677FB7F5281
Number of CPU thread: 2
Range width: 2^30
Jump Avg distance: 2^15.04
Number of kangaroos: 2^11.00
Suggested DP: 1
Expected operations: 2^16.11
Expected RAM: 13.3MB
DP size: 1 [0x8000000000000000]
SolveKeyCPU Thread 1: 1024 kangaroos
SolveKeyCPU Thread 0: 1024 kangaroos

 verify PK 552E025571C01BCD9EDA59365A2FB3AE0BD7547DFEEEB13D971D848BEA7DAF2
Key# 0 [2N]Pub:  0x03777C026B8085951DA7117395BF269C055F36BF2DDF623281962855EDEE36D4E7
       Priv: 0x552E025571C01BCD9EDA59365A2FB3AE0BD7547DFEEEB13D971D848BEA7DAF2
   RealPriv: 0x552E025571C01BCDA0297C22731D74BECBD30D07E4EC355C741825FFFC0A672


  • Search with checksum (small stride)
Let's take WIF 5HrdZxkxnVst8Q3qCLJkeiLe1k4Am____hqQVUYVxVSBkf5VfUu
Now, we may find the first WIF to be tested, it will be 5HrdZxkxnVst8Q3qCLJkeiLe1k4Am1111hqQVUYVxVSBkf5VfUu. When we decode it, we find the private key which is the beginning of our range: 0552e025571c01bcda0297c22731d74becbd30cfb218f04dc91299473f61ffde
Now, we must calculate the number of WIFs in our range. Beause we have 4 missing characters, it will be 58^4 = 11316496
To have the end of range for Kangaroo, we must calculate fake end which is start + range
Code:
new BigInteger("0552e025571c01bcda0297c22731d74becbd30cfb218f04dc91299473f61ffde",16).add(new BigInteger("11316496",10)).toString(16) =
552e025571c01bcda0297c22731d74becbd30cfb218f04dc9129947400eacee
We check where is the most right unknown character - it's position will tell us what is the stride. In our case it is 58^18 = 2b85840fc1d6a480ae7fa240000
Unfortunately the stride collides with checksum (last 8 characters are not 0s). It means that for our calculations we must take into account the proper checksum And this is difficult part, because the real checksum is unknown. In our test it is known, but in real-life it could be needed to see how many possibilities there are. For example, in this case, playing with missing characters of WIF we may observe that last 4 characters of checksum are fixed. The first 4 could be changed, BUT the 4th character gets only 4 values. It means that if we want to use this method for real-life problem, we may need to do calculations for 16*16*16*4 checksums (in fact will less operations needed, because many checksums will generate the same private key in addition to the stride).
Because stride collides with checksum, we will have to use the full (long) value and pass checksum as a parameter.
The final configuration file is:
Code:
552e025571c01bcda0297c22731d74becbd30cfb218f04dc91299473f61ffde
552e025571c01bcda0297c22731d74becbd30cfb218f04dc9129947400eacee
04777c026b8085951da7117395bf269c055f36bf2ddf623281962855edee36d4e73bec2fa87b122a0f1b2841ef4f7afdec2443f89c151ee2597feac18ae0d62bdf
and test:
Code:
$ ./kangaroo -stride 2b85840fc1d6a480ae7fa240000 -checksum 524412ca test_2b85840fc1d6a480ae7fa240000_524412ca.txt
Kangaroo v2.2
Start:552E025571C01BCDA0297C22731D74BECBD30CFB218F04DC91299473F61FFDE
Stop :552E025571C01BCDA0297C22731D74BECBD30CFB218F04DC9129947400EACEE
Keys :1
Stride:
MaxRange: ACAD10
Jump: 2B85840FC1D6A480AE7FA240000
checksum:
Number of CPU thread: 2
Range width: 2^24
Jump Avg distance: 2^11.97
Number of kangaroos: 2^11.00
Suggested DP: 0
Expected operations: 2^13.25
Expected RAM: 12.4MB
DP size: 0 [0x0]
SolveKeyCPU Thread 1: 1024 kangaroos
SolveKeyCPU Thread 0: 1024 kangaroos

 verify PK 552E025571C01BCDA0297C22731D74BECBD30CFB218F04DC91299473FAD12F9
Key# 0 [2N]Pub:  0x03777C026B8085951DA7117395BF269C055F36BF2DDF623281962855EDEE36D4E7
       Priv: 0x552E025571C01BCDA0297C22731D74BECBD30CFB218F04DC91299473FAD12F9
   RealPriv: 0x552E025571C01BCDA0297C22731D74BECBD30D07E4EC355C741825FFFC0A672




It has no mean to solve 2**11, or even 2**40 puzzles so what?

BTC is 2*256, and you need to do 2**128 to crack real world btc

if you can do 2**40, and have a means to do 2**40  on the ball park then that puts you in the game of find a hit that year

The problem with the kangaroo BULLSHIT is that real world there are no problem in the 2*20 domain

There are two ways to crack BTC

1.) use large bloom filter and find key/address pairs with value, and have search space that is doing 2**40 compares per second

2.) use advanced crypto methods to crack ecdlp256 using known back doors ( this is huge problem in prime number theory, but there tools out there )
Post
Topic
Board Development & Technical Discussion
Re: What would happen to bitcoin if all bitcoin-related stuff on GitHub got banned?
by
btc-room101
on 12/11/2022, 13:54:03 UTC
OP,
I started the topic @pooya87 referenced above,  eventually mods for an unknown reason decided it as being off-topic: https://bitcointalk.org/index.php?topic=5169284.0 I wish yours not to end that way.

That said, it is more than obvious that github is the worst option to rely on for development if you get too addicted and dependent. It is an open question though, how much bitcoin ecosystem is addicted to github, and what is the cure?

GOOD point;

The issue is this FREE BULLSHIT

Once upon a time GITHUB might have been the good guys but given GOOGLE ( the bad guys ) now own github, the question begs to be asked is why are the BITCOIN zealots still using an NSA site to distribute anit-establishment software??

Oh, that's an easy rhetoric, cuz NSA developed 100% of the BTC source, so its all a perfect fit
Post
Topic
Board Development & Technical Discussion
Re: What would happen to bitcoin if all bitcoin-related stuff on GitHub got banned?
by
btc-room101
on 12/11/2022, 13:50:07 UTC
Recently, US Treasury Department has put sanctions[1] on Ethereum mixer Tornado Cash, taken down their website[2], added all associated with the mixer addresses to the OFAC SDN list, and also, which is more important for this topic, compelled Microsoft to suspend Tornado Cash's Github account[3], all repositories and accounts of code maintainers[4]. It is important to emphasize that Tornado cash is not a company but a smart contract that no particular person controls; it is essentially as censorship-resistant and decentralized as the underlying blockchain upon which it is built. In other words, it cannot be "banned" easily.

So, the question that bothers me is could the same happen to Bitcoin? What will happen to Bitcoin if the US Government suddenly decides to take down its Github repos? What if they ban all contributors, maintainers, and lead developers? Is there a place where the bitcoin codebase can migrate to? Are there other code hosting platforms besides Github that are not based in the US or upon which US Government sanctions have little to no influence? Is it possible to build a decentralized and distributed code hosting platform that no one can censor or shut off?


[1] https://www.coincenter.org/u-s-treasury-sanction-of-privacy-tools-places-sweeping-restrictions-on-all-americans/
[2] https://web.archive.org/web/20220808144431/https://tornado.cash/
[3] https://github.com/tornadocash
[4] https://nitter.net/semenov_roman_/status/1556717890308653059

Some 5+ years ago PUTIN said "GOOGLE is NSA"

Guess what mortimer?? GOOGLE is GITHUB, bought them out years ago

At best NSA is just using github to host the suckers that post their work, certainly everybody knows that the people at NSA are too stupid to write their own code so they bought GITHUB as a conduit to steal code

The good news is that 99.9% of all the code on github is SHIT, I'm talking crypto shit level of feces


SO the question 'what if NSA bans their trojan horse bitch??"

I don't fucking think so,

on the other hand working code, gets sold on the dark-net,

So carry on garth keep posting shit code on github and feed the NSA their own dog-food
Post
Topic
Board Development & Technical Discussion
Topic OP
How to Generate the Best Private Key going Forward - HW USB Random Gen
by
btc-room101
on 12/11/2022, 13:44:13 UTC
#here /dev/random uses the onerng usb random generator to get the seed
e=$(cat /proc/sys/kernel/random/entropy_avail)
h=$( head -c $e /dev/random | sha3sum -b -a 256 | awk '{print $1}' ); echo $h
echo '/dev/random from onerng'

ok, here assumes you have a ONERNG-USB ($40USD) or equiv plugged into a linux hw box

Note here in bash ( if u can't read bash then go away ), where is is the N, of significant non-recurring random bits from device normal should be about 3k but so what we only need 256 bits for a key ( private bit coin key )

Here 'h' is the key, note that where 'e' gets the Number of entropy, we only clip off that top N for the 'hash'

Note I'm NOT using sha256, I'm using keccak 3, which is RUSSIA, sha256 & ecdlp-256kp1 are NSA all 100% of bitcoin is NSA, which means they have back doors

So by not using SHA to has the random bits, you ensure that NSA can't backdoor your generated addresses ( know this in stone bitches )

The problem is that all random number generation on linux dist are now compromised;

Sure the HW USB device is simple, an avalanche diode an A2D convert and a FTDI chip, if you buy know HW if there is CPU then your are FUCKED; KISS folks, keep it simple stupid

There is tons of software on linux to measure 'entropy' of your device, certainly your generated device should generate 10x non-recurring entropy over target.

I will say one last time, KECCAK-512-3 is RUSSIAN the Sha256 which is based on BTC is NSA, like ECDLP256kp1 all are NSA

Not since 1950's has NSA ever released or mandated an ALGO, where they did not have backdoor KEYS, FACT

ENJOY; Using electrum or any wallet, and preferrably you should be running your own private electrum-server for anonymity, you can import your key and gen addressses and do as you wish;

If you don't understand the above, then find a mentor, but for gods sake don't use 3rd party software and don't use this shit while your connected online, its assumed your using a disconnected dinosaur computer with no access to internet

regarding your HW avalanche diode device, this is the kind of stuff we made when we were 8 years old in the day electronics, certainly if you don't roll your own, if you can't read a schematic, if you don't know for sure that your device is not compromised, then you are fucked.
Post
Topic
Board Bitcoin Discussion
Re: New Day in Crypto Land - 90% of USA exchanges dead - Now Bitcoin reverts to Sato
by
btc-room101
on 12/11/2022, 13:30:00 UTC
NADA about shit-coins, about total capitalization $3Trillion USD

Of which say ETH was 20%, and BTC was 50%, the other 30% be shitcoins by defn

Now that ?? BTC Cap is now down from 1.5 T to $300M and dropping like a rock

Most of the FUCKING GOD DAMN exchanges have more shibu-ino than ETH why is that? Cuz anybody can pull shibu-inu out of their arse and post it as an asset

ITS ALL GOING DOWN BITCHES
Post
Topic
Board Development & Technical Discussion
Re: How can you verify the randomness that's coming from a hardware?
by
btc-room101
on 12/11/2022, 10:43:08 UTC
Couldn't one of all these hardware wallet companies implement something like that and steal millions of dollars worth of BTC, in just one moment? It would probably be the worst scandal of the crypto space.
Technically could, although there would be no way to prove this as far as I'm aware, so there isn't a way to verify it either. It would be a pretty sophisticated attack though, it reminds me how computer forensics would freeze computers in the past, specifically the ram in order to extract data. Also, I do believe that some programs in the past, which I can't recall right now would give you supposedly random data, i.e a password generation based on the temperature of the device, and various other things.

I'm not sure how plausible this kind of attack would be though.

In general I would always generate my own keys and NEVER use 3rd party sw, its just too easy on linux on one command line to generate a real good key that your certain that nobody on earth knows other than you.

But, HW random number generators have better uses than generating private keys for new wallets, the best use is as seed generators for finding ( hacking ) lost bitcoins

There are 300M used bitcoin addresses,  you put them into a 8gb bloom filter and on a GPU card you can do 1 billion cycles per second,, so that 8* 10**18 , so you want to make sure your seed is really random while on the hunt; now that is a use for hw random generators such as these devices

I'm fond of RNGONE from czech found on ebay and/or amazon back pre-CONVID

https://github.com/room101-dev/Grand-Ultimate-BTC-Hacker
Post
Topic
Board Development & Technical Discussion
Re: How can you verify the randomness that's coming from a hardware?
by
btc-room101
on 12/11/2022, 10:37:39 UTC
Been running rng on my bitcoin hacking racks for +2 years now, works great

Increased my find of lost bitcoins 2x by using real random numbers and random seeds

https://github.com/room101-dev/Grand-Ultimate-BTC-Hacker

ONERNG I paid $40 usd ebay from czech, but two years ago, but like people here are showing you can roll your own, but unless your an electronic genius, I would spend the $40, and I'm an hw/sw scientist, so $40 is nothing