Search content
Sort by

Showing 3 of 3 results by monero_pegasus
Post
Topic
Board Bitcoin Discussion
Re: == Bitcoin challenge transaction: ~100 BTC total bounty to solvers! ==UPDATED==
by
monero_pegasus
on 24/02/2021, 18:12:09 UTC
Hello my friend, your program is not working correctly, you could not go over 35%. I went over with a speed of 1600 Mkey, and in 8 hours about 46,000,000,000,000 passwords, our final range of 18446744073709551615 turns out, 5 more numbers in front, this is a lot.

Maybe my maths is wrong, I certainly mess things up with the hex-dec conversions... Maybe it's more like 17%?

My BitCrack console window currently says:

Code:
Ellesmere        768 / 8192MB | 1 target 150.12 MKey/s (1,655,689,975,443,750,912 total) [15:17:01:05]

So if I am reading this correctly, that's 1.65 x 10^18 keys checked.

And the keyspace is approx 9.22 x 10^18 in size?  I used a hex calculator to subtract the ff[..] from 80[..] and came up with that number in decimal equivalent.  Maybe that's where I went wrong
Post
Topic
Board Bitcoin Discussion
Re: == Bitcoin challenge transaction: ~100 BTC total bounty to solvers! ==UPDATED==
by
monero_pegasus
on 24/02/2021, 17:33:33 UTC
So I'm starting to ponder, how on earth has this #64 puzzle not been solved yet?

I have personally solo checked about 35% of the keyspace in the past 15.5 days, with a comparatively slow speed of ~150 MKey/s.

I've seen this #64 puzzle has been the main target for about a year?  And there are several pools checking BKey/s , many other BitCrackers who are getting >700 MKey/s, etc.

I'm starting to get skeptical that the 16jY7qLJnxb7CHZyqBP8qca9d51gAjyXQN  address is even in the 8000000000000000...ffffffffffffffff keyspace at all.
Post
Topic
Board Collectibles
Re: [ANN] Spesmonerujo Carbon Chamaeleon Notes
by
monero_pegasus
on 30/10/2020, 06:45:08 UTC
these are super cool I had to finally make an acct to get one

#69 please