Search content
Sort by

Showing 20 of 97 results by nomadsena
Post
Topic
Board Announcements (Altcoins)
[ANN] RadiumX New PoW coin . No ICO. No Masternode
by
nomadsena
on 19/02/2023, 04:52:10 UTC

About

RadiumX is a blockchain protection project with the ability to send signed transactions. The project has

fast transactions, low commission for transfers.


In addition, the distinctive features are:
Without premine
Not ico
No bounty programs
Quick access to stock exchanges
Without masternode
As well as many other features, which we describe in the future.
There will be no coin sale. The coins will be mined and available
soon after on several exchanges to be named.
We believe this to be a much fairer way of launching our project.
There will be a maximum of 255 Million coins ever created.


This is Pre launch RadiumX blockchain.


Specification

Coin Name: RadiumX
Symbol: RDX
Coin Type: PoW
Algorithm: X16S
Block Time: 1 Minute
Block Reward: 5000 RDX
Halving Schedule: Every 2.1M Blocks (Approximately every 4 years)
Max Supply: 255 Million
Block Size: 1MB (scalable)
GPU Minable: Yes
ASIC Resistant: Yes
ICO: No
Pre-mine: No
Founders Reward: No
Wallet Address Prefix: P

Wallets
https://github.com/jasonfifa/test1/releases/download/1.0.3/radiumX.zip



Site
radiumxcoin.info (in maintenance)

Explorer & Miner
Integrated in wallet

Mining pools
launch today


Check this topic !

Post
Topic
Board Project Development
Re: Keyhunt - development requests - bug reports
by
nomadsena
on 26/06/2022, 03:54:40 UTC
hi albert0bsd, a small question. when the BSGS is searching for private key from public key, the key range is 2^256 unlike the other bruteforce methods  that hash the private key to get ripemd 160 and check balance, in which case the key space is 2^160. if that is true this method is useful to solve only when the key space is know like the puzzle transaction otherwise regular bruteforce methods better because the key range is 2^160. correct me if I am wrong.
Interesting question, but to me, it's not as easy as one or the other. It's not black and white.

With ripemd160; what 2^160 range would you search? There are (roughly) 2^96, 2^160 ranges. Let's say you search the entire first 2^160 range, 0 to 2^160; you may not find the key you are looking for but instead you may find multiple collisions of the same keys within that range (not the key you are looking for). Now you search the next 2^160 range, 2^160-2^161, the key may not be in there. But if you stopped with the first range, let's say you found it in the first 2^160 range and only searched 50% of the keys before you found it, so you brute forced 2^159 keys to find it. With BSGS your search time would/could be reduced, depending on your hardware setup. I know with Kangaroo, to search for a key in the 2^256 range, you would roughly have to "search" through roughly 2^129 (group operations)....which is 2^30 times smaller than brute force approach.
Hi thanks for replying, I am aware of the fact that collisions exist and its not as simple as that first 2^160 private keys align with the RIPEMD 160 range. and sorry to correct 50% key range is 0-2^255 and remaining 50% 2^256 that's how exponential numbers work. My question was, tools like bitcrak has to search in the range of 2^160 private key space to find a collision, meaning it maynot be the same private key but can be hashed to get the same wallet address but BSGS has to search in the range of 2^256 as it calclates K from publickey. so this means it is better only for solving the puzzle and not any random wallet for which the public key is known?...
And albert0bsd your inputs are needed here. Smiley  
Where did I mention 50% of 2^256?  I stated that with Kangaroo you would have to complete roughly 2^129 group operations (with a DP of 0), 256 / 2 + 1 = 129. If you used a DP of 30, 256 / 2 + 1 = 129; 129 -30 = 99, so you would have to complete roughly 2^99 group ops. Far less than 2^160.  Do you understand how Kangaroo and BSGS work?

But you can find any and all keys in a 2^255 keyspace. So realistically, 128.5 group ops at DP 0, 2^98.5 group ops at DP 30, 2^88.5 group ops at DP 40...as you can see, it is exponentially faster searching for a pubkey versus possibly searching a 2^160 space for a possible collision.

Too technical for me Smiley I don't fully understand BSGS. simple question how many private keys can a bsgs find for a given publickey if range is not specified. I simply want to know can it find collisions.
Post
Topic
Board Project Development
Re: Keyhunt - development requests - bug reports
by
nomadsena
on 25/05/2022, 17:29:00 UTC
hi albert0bsd, a small question. when the BSGS is searching for private key from public key, the key range is 2^256 unlike the other bruteforce methods  that hash the private key to get ripemd 160 and check balance, in which case the key space is 2^160. if that is true this method is useful to solve only when the key space is know like the puzzle transaction otherwise regular bruteforce methods better because the key range is 2^160. correct me if I am wrong.
Interesting question, but to me, it's not as easy as one or the other. It's not black and white.

With ripemd160; what 2^160 range would you search? There are (roughly) 2^96, 2^160 ranges. Let's say you search the entire first 2^160 range, 0 to 2^160; you may not find the key you are looking for but instead you may find multiple collisions of the same keys within that range (not the key you are looking for). Now you search the next 2^160 range, 2^160-2^161, the key may not be in there. But if you stopped with the first range, let's say you found it in the first 2^160 range and only searched 50% of the keys before you found it, so you brute forced 2^159 keys to find it. With BSGS your search time would/could be reduced, depending on your hardware setup. I know with Kangaroo, to search for a key in the 2^256 range, you would roughly have to "search" through roughly 2^129 (group operations)....which is 2^30 times smaller than brute force approach.
Hi thanks for replying, I am aware of the fact that collisions exist and its not as simple as that first 2^160 private keys align with the RIPEMD 160 range. and sorry to correct 50% key range is 0-2^255 and remaining 50% 2^256 that's how exponential numbers work. My question was, tools like bitcrak has to search in the range of 2^160 private key space to find a collision, meaning it maynot be the same private key but can be hashed to get the same wallet address but BSGS has to search in the range of 2^256 as it calclates K from publickey. so this means it is better only for solving the puzzle and not any random wallet for which the public key is known?...
And albert0bsd your inputs are needed here. Smiley   
Post
Topic
Board Project Development
Re: Keyhunt - development requests - bug reports
by
nomadsena
on 19/05/2022, 19:43:37 UTC
hi albert0bsd, a small question. when the BSGS is searching for private key from public key, the key range is 2^256 unlike the other bruteforce methods  that hash the private key to get ripemd 160 and check balance, in which case the key space is 2^160. if that is true this method is useful to solve only when the key space is know like the puzzle transaction otherwise regular bruteforce methods better because the key range is 2^160. correct me if I am wrong.
Post
Topic
Board Off-Topic (India)
Topic OP
cryptofitnessclub
by
nomadsena
on 23/02/2022, 11:36:45 UTC
important Update -> ICO dates changed

    Revolutionizing the online fitness industry.


     

    The internet has changed the way we access everything. The only sector that is yet to fully embrace technology is fitness industry. The market analysis shows that lack of transparency, consistency in pricing and payment options are the main hurdle for the growth of online fitness industry. The IHRSA report stats that technology opportunities such as online pricing transparency, online registration and reservations for programs, selling memberships online, virtual training and club mobile applications are the future of the fitness industry.

    That’s why we created Cryptofitnessclub. Cryptofitnessclub is a whole new approach to the fitness industry changing the rules of the game. Cryptofitnessclub is a place where content is created and shared by the peers and everyone gets paid for creating  content. Cryptofitnessclub is the "Steemit" of the online fitness industry with lot of advanced features. This platform can be used for virtual training, live one-on-one sessions, uploading videos, getting expert advice via chat or blogging. We act as a hub that connects the users and the fitness trainers by fulfilling their needs. Cryptofitnessclub makes your sharing experience more easy and rewarding. We already have a working prototype of our business model and working hard to take it to the next level.


    Our Vision
    To make fitness accessible to everyone for free!




    .



    Cryptofitnessclub is a online fitness platform where content is created, reviewed and rewarded by the users. please visit our FAQ or read our WHITEPAPER to know more.





    GYM Tokens

    Cryptofitnessclub runs on the smart GYM Tokens, which is built adhering to the ERC20 token standard. As the currency used for payment within the Cryptofitnessclub ecosystem, the token has a true utility and value. The special feature is the ability to store virtual balances of your GYM Tokens in your profile at Cryptofitnessclub eliminating the risk of hack.  

    Smart contract address:
    0x2fd9Ee2015647CD53a14b7EB3f7BC93fAdA44c78


    ROAD MAP

    • 2016
      - Inception
      - Concept Roots
    • Q1 2017
      - Hiring web developers and advisors
      - Developing the blue print
    • Q2-Q3 2017
      - Website design and content development
      - Security features implementation and testing
    • 2018
      March 1
      - Annoncement
      - User registration on the website
    • Pre-ICO
      - May 1, 2018 to May 7, 2018
    • Main-ICO
      - May 14, 2018 to June 11, 2018
    • Q3 2018
      - Setting-up of servers, self hosted videos.
      - Community development.
    • Q1 2019
      - Getting fitness professionals on board. Getting them to accept GYM Tokens
      - Supporting the use of GYM Tokens and increasing their growth.
    • Q2 2019
      - Exchange listing thereby providing the ease of access for usage and conversion of GYM Tokens
      - Partnering  with the leading Fitnessclubs
    • Q3 2019
      - Implementation of virtual training
      - Establishment of online store
    • 2020
      - Global Expansion
      - Expanding the business. partnering  with fitnessclubs all over the world
      - Offer users the ability to use any fitness centre with a single membership



    Translations
    Vietnamese | Japanese | Korean | French | German | Deutch | Spanish | Russian | Italian | Portuguese  
    [/list]
    Post
    Topic
    Board Project Development
    Re: All Bitcoin address with balance, update weekly.
    by
    nomadsena
    on 12/01/2022, 08:28:47 UTC

    The serious part is: I have a little doubt on the viability of RIPEMD160, by the curse of "birthday paradox", approaching 2^80 computation doesn't seem to be too remote.
    The birthday paradox is specifically about probability of two persons having a same birthday. that would mean finding a collision two private keys having same RIPEMD-160 hash, not finding a collision to the public that we have.
    let me explain in details. lets compare 2^256 to the entire population that we consider in a birthday paradox, and 2^160 be compared to 365 days (number of allowable birthdays). so the paradox says we need 23 members to say with ~50% probability that two may share the same birthday, not someone has the same birthday as us. so in the same way we need 2^80(which P~2^160/2) to say with ~50% that any two private keys in the entire rage of 2^256 have same RIPEMD-160 hash. those two private keys with same public key may or maynot have been used. but what we are doing here is more specifically searching some 30 million addresses for any collision, thats more like someone in the sample waiting to find an other person with same birthday as his and the probabilities for that are different.

    please correct me if i am wrong. i dont think 2^80 keys is enough to crack the bitcoin address. its the same old probabilities you have 50% chance if we searched from 1 to 2^159.
    Post
    Topic
    Board Project Development
    Re: All Bitcoin address with balance, update weekly.
    by
    nomadsena
    on 04/01/2022, 09:26:10 UTC
    are the bitcoin addresses in the CVC compressed or uncompressed.
    Post
    Topic
    Board Project Development
    Re: Keyhunt - development requests - bug reports
    by
    nomadsena
    on 29/12/2021, 11:36:25 UTC
    Hello albertobsd i have a Questions outside and inside this awesome program that you have made.
    i've been looking for correct answers for weeks, but everyone says differently so your the one who to ask, because you're a bitcoin expert here. Smiley
    Questions:


    So total  possible public keys are 2^256 and are mapped to a set of 2^160 (160 bits) addresses. Since there are more public keys and private keys than addresses, but every public key can be mapped to an 160 bits address, there must be then in average 2^256 / 2^160 = 2^96 keys to each address. so if there are 2^96 addresses for each bitcoin address, so does all that 2^96 addresses that one Address have, share ALL the same public key? because that's what you need  in order to have the same RIPEMD-160 hash. so only private key which changes, not public key with the 2^96 key possible keys per Address right?

    ==========

    Another Question related:

    So if all my thoughts are right, then from what i understood, All addresses of bitcoin exists only 1 TIME from the range ( 160 bits ) 0 - ( FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF ), and the rest 2^96 addresses per address start to exists after the range of 2^160, so starting from 2^161. Is that also correct?


    ==========


    Last Question.

    Then if bitcoin addresses have 160 bits, can't we just try to Bruteforce that 160 bits from ( 0 - FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF )  Hex-Range with  high number of  Random peta/keys checks - - using BSGS, won't we have a 1 of 2^160 chance of unlocking any addresses that have the public key? can that work using BSGS right, or with BSGS that method doesn't work? (even with low chance, i still believe in luck)

    ==========

    if you could answer all this three Question, then i really appreciate it!
    Best regards.
    You keep hearing different opinions because people have different understanding of public key. If someone assumes that wallet address itself is public key he will tell you that the key space is 2^160 remaining are just collisions. But if your are talking about actual public key then you have to search in the space of 2^256 to find a private key. If you are randomly using a public key in BSGS mod then the key space is 2^256. Here is the tradeoff if your using BSGS the speeds are in typing pkeys/sec but the range is too large and a good ram will help you. But if you are hasing the public key to ripemd-160 the typical speed is mkeys/sec a good GPU will help you. But BSGS is best for solving puzzle. And about the luck part no offense but you are not understanding the odds, if you think you are that lucky pick up a rock outside your house and it will turnout to be a meteorite in which case you will earn millions.
    -- by the way this is my understanding of bitcoin if i am wrong please correct me i am eager to learn
    Post
    Topic
    Board Project Development
    Re: Keyhunt - development requests - bug reports
    by
    nomadsena
    on 21/11/2021, 11:19:10 UTC
    adding more than one pub key to the input file in BSGS mode is severely  decreasing the performance like halving for every one extra pub key added to the input file. but somewhere in the thread i read that more pub keys dosent really effect the performance adversely. did anyone test. with one pub key i am getting 8pkeys/s add one more to the input file it drops to 4pkeys/s and so on.
    Post
    Topic
    Board Project Development
    Re: Keyhunt - development requests - bug reports
    by
    nomadsena
    on 19/11/2021, 03:37:26 UTC
    Is using intel optane persistent memory has any effect on the speed compared to the regular Dram? Has anyone tested with it ?
    And one more thing dose the refersh rate of the RAM effect the performance in anyway
    Post
    Topic
    Board Project Development
    Re: Keyhunt - development requests - bug reports
    by
    nomadsena
    on 18/11/2021, 16:00:30 UTC
    Is using intel optane persistent memory has any effect on the speed compared to the regular Dram? Has anyone tested with it ?
    Post
    Topic
    Board Bitcoin Discussion
    Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
    by
    nomadsena
    on 14/11/2021, 17:27:23 UTC
    -snip-
    if you see carefully there are some 547 satoshi incoming transactions to these addresses and after a while the funds from these addresses are moved (same to assume someone cracked the privatekey). it could be just a coincidence but if you dig down deeper these 547 satoshi are sent to lots of addresses even to some high value addresses and some of them are getting cracked, funds are moving out briefly after they receive these 547 satoshis. these are the wallets i know of, maybe there could be many. i dont know how but someone is sending these small amounts and somehow how cracking these addresses. this is my assumption. i hope experts here could uncover the mystery.

    Just google for 'bitcoin dust attack' and you can easily understand the reason of these transactions and why they were 547 sat
    Ok understood what dust attack is. Its to de-anonymize a address and target the person who holds the wallet. But the addresses i mentioned were satoshi era wallets for which the private keys were forgotten. Even if you were to find the person its of no use because he himself dont know the keys. Is there a way they are trying some other kind of attack to get those private keys.

    How do you know that these keys are forgotten?
    Because the last incoming transactions were in 2010 and 2012 and there were no outgoing transactions afterwards anyone with sane mind mind would have spent atleast some BTC after the huge price rise somany times. Even if we assume there were cold wallets look at this address 1JTgogpKuriP1b5B7JiJ9LxLybjUMB8BiZ 50 BTC were freshly mined and was never spent just forgotten. So i came to the conclusion the person holding the BTC would have forgotten the private keys. If not he would have promptly moved them to other address as soon as he have seen the dust attack not after a while. Ofcourse all of this is just my assumptions because thats what logically thinking points to. Maybe i might be wrong.

    You are quick to judge about someone having "sane mind" or not.

    I have some BTC aquired in the early days, and haven't sold almost anything until now, < 10% of it, it is far to early to sell something. BTC price is yet to go to expected values.

    Those people you've mentioned have much, much more than me, and even if they've sold some small ampunt, they have absolutly no reason to move coins from other blocks at all. These stories abour lot's of BTC being lost are just legends, there were some incidents but majority of the old coins are hodled safelly in wallets, it is easy to keep the private keys safe. It is not a rocket science.
    Agreed. As i have mentioned its all just my assumption. Was trying to find if there is any vulnerability in the BTC. thanks for clarifying
    Post
    Topic
    Board Bitcoin Discussion
    Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
    by
    nomadsena
    on 14/11/2021, 10:31:16 UTC
    -snip-
    if you see carefully there are some 547 satoshi incoming transactions to these addresses and after a while the funds from these addresses are moved (same to assume someone cracked the privatekey). it could be just a coincidence but if you dig down deeper these 547 satoshi are sent to lots of addresses even to some high value addresses and some of them are getting cracked, funds are moving out briefly after they receive these 547 satoshis. these are the wallets i know of, maybe there could be many. i dont know how but someone is sending these small amounts and somehow how cracking these addresses. this is my assumption. i hope experts here could uncover the mystery.

    Just google for 'bitcoin dust attack' and you can easily understand the reason of these transactions and why they were 547 sat
    Ok understood what dust attack is. Its to de-anonymize a address and target the person who holds the wallet. But the addresses i mentioned were satoshi era wallets for which the private keys were forgotten. Even if you were to find the person its of no use because he himself dont know the keys. Is there a way they are trying some other kind of attack to get those private keys.

    How do you know that these keys are forgotten?
    Because the last incoming transactions were in 2010 and 2012 and there were no outgoing transactions afterwards anyone with sane mind mind would have spent atleast some BTC after the huge price rise somany times. Even if we assume there were cold wallets look at this address 1JTgogpKuriP1b5B7JiJ9LxLybjUMB8BiZ 50 BTC were freshly mined and was never spent just forgotten. So i came to the conclusion the person holding the BTC would have forgotten the private keys. If not he would have promptly moved them to other address as soon as he have seen the dust attack not after a while. Ofcourse all of this is just my assumptions because thats what logically thinking points to. Maybe i might be wrong.
    Post
    Topic
    Board Bitcoin Discussion
    Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
    by
    nomadsena
    on 14/11/2021, 04:59:27 UTC
    -snip-
    if you see carefully there are some 547 satoshi incoming transactions to these addresses and after a while the funds from these addresses are moved (same to assume someone cracked the privatekey). it could be just a coincidence but if you dig down deeper these 547 satoshi are sent to lots of addresses even to some high value addresses and some of them are getting cracked, funds are moving out briefly after they receive these 547 satoshis. these are the wallets i know of, maybe there could be many. i dont know how but someone is sending these small amounts and somehow how cracking these addresses. this is my assumption. i hope experts here could uncover the mystery.

    Just google for 'bitcoin dust attack' and you can easily understand the reason of these transactions and why they were 547 sat
    Ok understood what dust attack is. Its to de-anonymize a address and target the person who holds the wallet. But the addresses i mentioned were satoshi era wallets for which the private keys were forgotten. Even if you were to find the person its of no use because he himself dont know the keys. Is there a way they are trying some other kind of attack to get those private keys.
    Post
    Topic
    Board Bitcoin Discussion
    Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
    by
    nomadsena
    on 14/11/2021, 04:58:56 UTC
    Ok understood what dust attack is. Its to de-anonymize a address and target the person who holds the wallet. But the addresses i mentioned were satoshi era wallets for which the private keys were forgotten. Even if you were to find the person its of no use because he himself dont know the keys. Is there a way they are trying some other kind of attack to get those private keys.
    Post
    Topic
    Board Bitcoin Discussion
    Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
    by
    nomadsena
    on 13/11/2021, 11:37:29 UTC
    Not related to puzzle

    157XG8DEk6FhcoHfNpZW6v6fuBd9184DsT. went dormant in 2012
    1JTgogpKuriP1b5B7JiJ9LxLybjUMB8BiZ. went dormant in 2010
    1CU6Vu9qHxAQKuMBQ6ReEcBKJT2KahcEHs. went dormant in 2012
    1BamMXZBPLMwBT3UdyAAKy3ctGDbXNKoXk. went dormant in 2012

    if you see carefully there are some 547 incoming transactions to these addresses and after a while the funds from these addresses are moved (same to assume someone cracked the privatekey). it could be just a coincidence but if you dig down deeper these 547 satoshi are sent to lots of addresses even to some high value addresses and some of them are getting cracked, funds are moving out briefly after they receive these 547 satoshis. these are the wallets i know of, maybe there could be many. i dont know how but someone is sending these small amounts and somehow how cracking these addresses. this is my assumption. i hope experts here could uncover the mystery.
    Post
    Topic
    Board Project Development
    Re: Keyhunt - development requests - bug reports
    by
    nomadsena
    on 11/11/2021, 18:00:33 UTC
    In those case you need to use a small N value, like 0x40000000 (30 bits) or 0x1000000 (24 bits)

    Code:
    -n 0x40000000

    Code:
    -n 0x1000000

    the default N value is 0x100000000000 enough to cover some 44 bits in  a single operation using only some 1 or 2 MB of RAM

    Code:
    -n 0x100000000000

    So i dont see the necessity to specify a lower range, unless you are doing some test for your self.
    Exactly. i was testing the code, if i have compiled it right and the code is working.
    Post
    Topic
    Board Project Development
    Re: Keyhunt - development requests - bug reports
    by
    nomadsena
    on 11/11/2021, 11:35:36 UTC
    While specifying bit rage with -b in bsgs when giving 30 bit range -b 30 its throwing error "range too small". Do i need to change anything in the code or just use -r instead.
    Post
    Topic
    Board Bitcoin Discussion
    Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
    by
    nomadsena
    on 04/03/2021, 19:00:12 UTC
    completey unrelated to this topic and basically a noob question. but i read somewhere here on this thread that "directory.io has 904625697166532776746648320380374280100293470930272690489102837043110636675 pages thats almost all the private keys". if generating all the private keys combinations takes more then the age of universe with current technology, how come they generated them all.
    Each page is only generated if visited...basically each page contains say 100 keys/addresses, so the website script knows if you visit page 900 to calculate the keys for 9000 through 9100.

    I have another noob question for you about the website privatekeys.pw. Why they can provide a Search Private Key queries but not Search Address? If their website able to Search Private Key, why can't they do Search Address for their pages?
    on privatekeys.pw. new private keys are generated on the go using your system resources and the balances are verified. its not some kind of date base
    Post
    Topic
    Board Bitcoin Discussion
    Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
    by
    nomadsena
    on 04/03/2021, 18:43:15 UTC
    completey unrelated to this topic and basically a noob question. but i read somewhere here on this thread that "directory.io has 904625697166532776746648320380374280100293470930272690489102837043110636675 pages thats almost all the private keys". if generating all the private keys combinations takes more then the age of universe with current technology, how come they generated them all.
    Each page is only generated if visited...basically each page contains say 100 keys/addresses, so the website script knows if you visit page 900 to calculate the keys for 9000 through 9100.
    thanks for the reply but why do they have this at the bottom of their page:"It took a lot of computing power to generate this database. Donations welcome: 1LBCPotwPzBvBcTtd7ADGzCWPXXsZE19j6". i thought all the address were already generated.