Search content
Sort by

Showing 10 of 10 results by rdenkye
Post
Topic
Board Bitcoin Discussion
Topic OP
The mysterious '2' message in Satoshi's wallets
by
rdenkye
on 09/01/2025, 19:00:53 UTC
In the visualization of public keys associated with Satoshi's wallets, a distinct '2' message can be seen near the middle of the right edge.


https://github.com/orhan2akdogan/Satoshi-Wallets
Post
Topic
Board Bitcoin Discussion
Re: Did you already break the Elliptic Curve, Satoshi, you there?
by
rdenkye
on 01/01/2025, 21:10:45 UTC
can you please share the data again.

I collected the data myself and ran tests on the first 33,000 addresses. There is no pattern.

The post could be fake. On the other hand, a pattern can be created with the addresses and this does not require breaking the elliptic curve. But satoshi did not do this.
Post
Topic
Board Development & Technical Discussion
Re: Bitcoin weak transaction nonce question
by
rdenkye
on 01/01/2025, 21:04:09 UTC
Hello,
I have 2 questions;
first; can a wallet with at least 10 pairs of transactions with only 5 characters in common in the R value be cracked with a Lattice attack etc. method?

second; for a single pair, the probability is approximately 1 in a million, how can it be 10 times.

I cannot create R in such a pattern even if I want to by giving the k(nonce) value weak. How could this have happened?

(I apologize for my translation English.)




where is the address

wallet must remain secure.
There are many patterns in R values, I am sharing some patterns for better understanding.

https://prnt.sc/hHPWbppNhfvl
Post
Topic
Board Bitcoin Discussion
Re: Did you already break the Elliptic Curve, Satoshi, you there?
by
rdenkye
on 31/12/2024, 09:57:41 UTC
I have been exploring the intricacies of Elliptic Curve Cryptography (ECC) for several years. My interest stems from a skepticism about the ubiquitous use of ECC, which, while currently deemed secure, is susceptible to the relentless advancement of time and technology that historically challenges cryptographic methods.

During my research, I analyzed a collection of public keys attributed to Satoshi Nakamoto. Upon plotting these keys on an elliptic curve, I observed a curious pattern, as shown here: https://ibb.co/zrsDy6c

What struck me as extraordinary was the apparent orderly generation of these public keys. They seem to follow a sequential arrangement along the X-axis, with corresponding values on the Y-axis that collectively form a discernible shape on the curve. This discovery is baffling, as generating public keys in such a precise and ordered manner on an elliptic curve is, to my knowledge, an incredibly challenging, if not impossible feat. I have thoroughly investigated this phenomenon but have yet to find an explanation.

This pattern has led me to ponder several possibilities:
- Could it be possible that Satoshi had found a way to 'break' the elliptic curve as early as 2009?
- Is there a chance that these public keys represent a puzzle, intentionally designed by Satoshi, awaiting a solution?

As of today, these public keys are associated with an estimated value of $72 billion, adding another layer of intrigue to this cryptographic enigma.

can you please share the data again.
Post
Topic
Board Development & Technical Discussion
Re: Bitcoin weak transaction nonce question
by
rdenkye
on 28/12/2024, 00:12:52 UTC
K: 31907037269755274359319072740750448760229601659665891328416497670755906520033
R: 7BCF7CCABE56F54B6B53B8663318BD0ADCD8B 0007A87 2A299BD83919F69BAC34
                                                                           p00yA87

I'm far from being an expert in this subject.

Isn't the probability of finding "?00?A87" in a random 64-digit hex string 0.00553%.

How many R values did you search for that sequence? The probability of finding "?00?A87" in 100,000 random strings would be 99.6%

Check my math.



should be lower.
hexadecimal number.
16 possibilities and 7 characters in its character.
2^16 = 268,435,456 possibilities are also 1.
everyone can learn by scanning.

but I may not have scanned. It may have created a comprehensive "golden model" in the opposite direction with the help of Lagrange Interpolations, but it can be directly reached in numbers with certain modular properties and it may have emerged from several pieces. anyway, the secp256k1 curve was chosen because it was weak. they fooled people by saying it was fast. someone knew its weakness since the day it was published. other difficulties are difficult to overcome with friend frames. the traces in the budgets in question are proof of this. our big brother satoshi was already an nsa officer.

just kidding, of course I scanned. everyone relax.
Post
Topic
Board Development & Technical Discussion
Re: Bitcoin weak transaction nonce question
by
rdenkye
on 27/12/2024, 05:48:39 UTC
no that's not the address, that was just to say I'm not new to the r topic.
and I purposely chose the example address from a topic you responded to.

I'm not writing the actual address because it still has a lot of btc.

https://bitcointalk.org/index.php?topic=5433479.0
Post
Topic
Board Development & Technical Discussion
Re: Bitcoin weak transaction nonce question
by
rdenkye
on 27/12/2024, 04:26:43 UTC
It may be obvious but are you sure that you are looking at R value when you were checking those transactions and their signatures? You see signatures are encoded using DER encoding and there are certain bytes added in that which are always the same (eg. 4730440220 which is [stack size][sequence tag][sequence length][int tag][int length]).


k=689633
65C5 0007A87 B2954B63C8658A956B756DCF7CEC554445EEF1D18CECD6E79262
        p00yA87

Actually something comes to my mind.
I wonder if someone deliberately prepared the k's in advance and created the tx's themselves.
He didn't take the trouble and spread it over 2 years, and also made 1000 btc volume in the wallet time. He may be a patient and humorous person.
Post
Topic
Board Development & Technical Discussion
Re: Bitcoin weak transaction nonce question
by
rdenkye
on 27/12/2024, 03:39:52 UTC
It may be obvious but are you sure that you are looking at R value when you were checking those transactions and their signatures? You see signatures are encoded using DER encoding and there are certain bytes added in that which are always the same (eg. 4730440220 which is [stack size][sequence tag][sequence length][int tag][int length]).


yes, I am an expert in these areas and I develop software that performs mass vulnerability scanning.

Let me give you the full statistics;
- There are less than 200 outgoing Tx.
- In 32 pairs, 5 characters match in the same character order.
In 1 pair, 6 characters match.

This cannot be a coincidence, but I cannot understand how it can be.
Post
Topic
Board Development & Technical Discussion
Re: Bitcoin weak transaction nonce question
by
rdenkye
on 27/12/2024, 01:50:49 UTC
Again, because of the math behind it, it's impossible for this to happen. But it did happen. The question is; if the probability of a 5-character match in two txs is 1 in 1 million, how can this happen 10 times?
Post
Topic
Board Development & Technical Discussion
Topic OP
Bitcoin weak transaction nonce question
by
rdenkye
on 26/12/2024, 20:38:24 UTC
Hello,
I have 2 questions;
first; can a wallet with at least 10 pairs of transactions with only 5 characters in common in the R value be cracked with a Lattice attack etc. method?

second; for a single pair, the probability is approximately 1 in a million, how can it be 10 times.

I cannot create R in such a pattern even if I want to by giving the k(nonce) value weak. How could this have happened?

(I apologize for my translation English.)