Bitcoin Forum
January 06, 2026, 06:24:29 PM *
News: Latest Bitcoin Core release: 30.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 [50] 51 52 53 54 55 56 57 58 59 60 61 »
  Print  
Author Topic: == Bitcoin challenge transaction: ~1000 BTC total bounty to solvers! ==UPDATED==  (Read 62824 times)
This is a self-moderated topic. If you do not want to be moderated by the person who started this topic, create a new topic. (11 posts by 1+ user deleted.)
benjaniah
Jr. Member
*
Offline Offline

Activity: 52
Merit: 3


View Profile
June 01, 2024, 05:00:34 AM
 #981

Does anyone know where I can find vanitysearch for sm89/ccap89. All the links to vanitysearch on the first page give me 404 errors. Thanks
fecell
Jr. Member
*
Offline Offline

Activity: 177
Merit: 2


View Profile
June 02, 2024, 07:50:31 AM
 #982

what computational power does the puzzles 130 needed to be solved

if you have 56core/256GB server, you'll check about 12 exakeys per sec

2^129 / 11344588059320129643 / 3600*24 = ?

after 1_902_338_144_733  years AT MOST you'll become rich, but with this probability 1/680564733841876926926749214863536422912 you'll find PK in first second. Feel lucky? (haha)

p.s. if you pay $200 per month for server, you'll pay 1902338144733*200*12 = ?

4_565_611_547_359_200 dollars

so, it's only reasonable if you do not pay for server
this is true if you go through all the values ​​without taking into account entropy.

Of course, if you try to generate a random number of 10 bits a billion times, you can get the number 0. But if you try to generate a random number of 66 bits, it becomes impossible to get the number 0. In this way, you need to ignore values ​​that with the maximum probability could not be a private key.
kTimesG
Full Member
***
Offline Offline

Activity: 700
Merit: 221


View Profile
June 05, 2024, 10:55:39 AM
 #983

what computational power does the puzzles 130 needed to be solved

if you have 56core/256GB server, you'll check about 12 exakeys per sec

2^129 / 11344588059320129643 / 3600*24 = ?

after 1_902_338_144_733  years AT MOST you'll become rich, but with this probability 1/680564733841876926926749214863536422912 you'll find PK in first second. Feel lucky? (haha)

p.s. if you pay $200 per month for server, you'll pay 1902338144733*200*12 = ?

4_565_611_547_359_200 dollars

so, it's only reasonable if you do not pay for server
this is true if you go through all the values ​​without taking into account entropy.

Of course, if you try to generate a random number of 10 bits a billion times, you can get the number 0. But if you try to generate a random number of 66 bits, it becomes impossible to get the number 0. In this way, you need to ignore values ​​that with the maximum probability could not be a private key.

For 10 bits and a billion random trials you'll get the number 0 around 976562 times, on average.

If we replace each possible value from 0 to 2**66 - 1 with some emoticon for a thing in the universe, what exactly makes 0 to be more special than some other value? The values are just labels, it makes zero sense to discriminate them. The only valid affirmation you have is that there is a 100% chance that some random value in some 2**66 set of elements is contained in the set. It doesn't matter how you look at them.

Also, it would be weird as well if somehow the maximum probability solution (some value with maximum entropy and with exactly 33 bits of zeros and 33 bits of ones, in some arrangement that has the least possible compression form) is the one that's correct. So, why not exclude stuff from the other end of this mindset as well? It's like: if you throw a coin in the air 100 times, chances are very low you'll get a 50/50, but still, these are the maximum chances as well.

Off the grid, training pigeons to broadcast signed messages.
bitcoinpuzzles621
Newbie
*
Offline Offline

Activity: 15
Merit: 0


View Profile
June 07, 2024, 06:55:48 AM
 #984

Does anyone still happen to have the public keys for all of the solved puzzles?   Like starting from puzzle number 1 upto number 65 for example?   Just was curious since usually only the private key is listed after a puzzle is solved.  But knowing what the public keys were helps greatly too.  Maybe you will reply here later if you have that list of values,  thanks
benjaniah
Jr. Member
*
Offline Offline

Activity: 52
Merit: 3


View Profile
June 13, 2024, 04:25:42 AM
 #985

Does anyone still happen to have the public keys for all of the solved puzzles?   Like starting from puzzle number 1 upto number 65 for example?   Just was curious since usually only the private key is listed after a puzzle is solved.  But knowing what the public keys were helps greatly too.  Maybe you will reply here later if you have that list of values,  thanks

They're all on page 1 of this thread  Grin https://asktom.cf/index.php?topic=5218972.0
dtbtc
Newbie
*
Offline Offline

Activity: 1
Merit: 0


View Profile
June 18, 2024, 11:29:17 PM
 #986

Hi Guys
Im playing around with bitcoin puzzles , currently with VanBitCrackenRandom2 by scanning ranges and I think there is something not right or im missing something....
I need a tool which allows me to scan full ranges from my database.
With above software there is no indication when / if range has been completely scanned .
Even if I use small range which can be fully searched in seconds program is still looking for new keys good know where.

Can someone recommend any software ( gpu ) where I can specify in cmd start of the range and end of the range where I can get indication that range scan has been completed.

Currently Im using command:

VBCr -t 1 -gpu -gpuId 0 -g 2046,512 -bits 66 -dis 1  -begr 2000000000000000 -endr 3FFFFFFFFFFFFFFFF -r 210000 -o 66BitChallengeKey.txt 13zb1hQbWVsc2S7ZTZnP2G4undNNpdh5so

And I dont even think command is right as when switching to micro  ranges its doing constant scan even if test keys are fund....

When I run this for:

VBCr -t 20  -dis 1  -begr 3FFFFFFFFFFFFFEFF -endr 3FFFFFFFFFFFFFFFF -r 1 -o aaa.txt 1Eo3WvHuWKcjcuA6R8KAPFWkNwMEa2WRvT
where 1Eo3WvHuWKcjcuA6R8KAPFWkNwMEa2WRvT has a PK WIF of KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qaCyWMw1qH2rzy6joVM6 from 3FFFFFFFFFFFFFFFF  its running all the time after the key is found regardless if I use -r flag or not...
Thanks in advance...
benjaniah
Jr. Member
*
Offline Offline

Activity: 52
Merit: 3


View Profile
July 14, 2024, 02:55:16 AM
 #987

So, has anyone figured out a bulletproof way to spend puzzle 66's inputs, once the key is found, without the internet-of-bots stealing the prize? Other than trying to find a big enough mining pool that will mine your transaction into a block and not expose the transaction to the mempool? Could any mining pool even be trusted to that extent?
pbies
Full Member
***
Offline Offline

Activity: 404
Merit: 230



View Profile
July 14, 2024, 08:36:45 PM
 #988

So, has anyone figured out a bulletproof way to spend puzzle 66's inputs, once the key is found, without the internet-of-bots stealing the prize? Other than trying to find a big enough mining pool that will mine your transaction into a block and not expose the transaction to the mempool? Could any mining pool even be trusted to that extent?

If knowing that pubkey of puzzle 66 would work like that, then any address and transaction is in danger.

Stop beliving in bs.

BTC: bc1qmrexlspd24kevspp42uvjg7sjwm8xcf9w86h5k
WanderingPhilospher
Sr. Member
****
Offline Offline

Activity: 1456
Merit: 284

Shooters Shoot...


View Profile
July 14, 2024, 09:24:26 PM
 #989

So, has anyone figured out a bulletproof way to spend puzzle 66's inputs, once the key is found, without the internet-of-bots stealing the prize? Other than trying to find a big enough mining pool that will mine your transaction into a block and not expose the transaction to the mempool? Could any mining pool even be trusted to that extent?

If knowing that pubkey of puzzle 66 would work like that, then any address and transaction is in danger.

Stop beliving in bs.

Post a random 66 bit public key here and I will show you how easy it is to find. Might wanna read up on a few things.
WanderingPhilospher
Sr. Member
****
Offline Offline

Activity: 1456
Merit: 284

Shooters Shoot...


View Profile
July 14, 2024, 09:29:54 PM
 #990

Hi Guys
Im playing around with bitcoin puzzles , currently with VanBitCrackenRandom2 by scanning ranges and I think there is something not right or im missing something....
I need a tool which allows me to scan full ranges from my database.
With above software there is no indication when / if range has been completely scanned .
Even if I use small range which can be fully searched in seconds program is still looking for new keys good know where.

Can someone recommend any software ( gpu ) where I can specify in cmd start of the range and end of the range where I can get indication that range scan has been completed.

Currently Im using command:

VBCr -t 1 -gpu -gpuId 0 -g 2046,512 -bits 66 -dis 1  -begr 2000000000000000 -endr 3FFFFFFFFFFFFFFFF -r 210000 -o 66BitChallengeKey.txt 13zb1hQbWVsc2S7ZTZnP2G4undNNpdh5so

And I dont even think command is right as when switching to micro  ranges its doing constant scan even if test keys are fund....

When I run this for:

VBCr -t 20  -dis 1  -begr 3FFFFFFFFFFFFFEFF -endr 3FFFFFFFFFFFFFFFF -r 1 -o aaa.txt 1Eo3WvHuWKcjcuA6R8KAPFWkNwMEa2WRvT
where 1Eo3WvHuWKcjcuA6R8KAPFWkNwMEa2WRvT has a PK WIF of KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qaCyWMw1qH2rzy6joVM6 from 3FFFFFFFFFFFFFFFF  its running all the time after the key is found regardless if I use -r flag or not...
Thanks in advance...
Hi, I modded VBCr, it is as its name states, random. It will not progress through a range.
Also, you have a very low rekey rate in your second command line. This will cause the program to basically always rekey to new random points.

There are plenty of programs out there that will do what you are wanting to do, especially if you are searching for a full length address.

https://github.com/WanderingPhilosopher/VanBitCrakcenS
https://github.com/WanderingPhilosopher/KeyHuntCudaClient
or any other Keyhunt-Cuda program on GitHub, or Rotor-Cuda

or an oldie but goodie
https://github.com/Telariust/VanitySearch-bitcrack/releases

Hope that helps...
sdhgfdsjfgsiujdgf
Newbie
*
Offline Offline

Activity: 11
Merit: 0


View Profile
July 14, 2024, 09:32:46 PM
 #991

So, has anyone figured out a bulletproof way to spend puzzle 66's inputs, once the key is found, without the internet-of-bots stealing the prize? Other than trying to find a big enough mining pool that will mine your transaction into a block and not expose the transaction to the mempool? Could any mining pool even be trusted to that extent?

I cant belive that I read this BS again on this forum. Are you out of your mind? Why the hell do you need a mining pool?HuhHuhHuh
I have read a similar BS from another user in another topic, that is talking about miners.

You dont need any miners to get the money, when you got the privatekey, you can immediately take control of the bitcoins. Do you really dont know how?

nomachine
Full Member
***
Offline Offline

Activity: 784
Merit: 127



View Profile
July 15, 2024, 03:41:23 PM
Last edit: July 15, 2024, 04:24:46 PM by nomachine
 #992

So, has anyone figured out a bulletproof way to spend puzzle 66's inputs, once the key is found, without the internet-of-bots stealing the prize? Other than trying to find a big enough mining pool that will mine your transaction into a block and not expose the transaction to the mempool? Could any mining pool even be trusted to that extent?

I cant belive that I read this BS again on this forum. Are you out of your mind? Why the hell do you need a mining pool?HuhHuhHuh
I have read a similar BS from another user in another topic, that is talking about miners.

You dont need any miners to get the money, when you got the privatekey, you can immediately take control of the bitcoins. Do you really dont know how?



 It's a blast to solve Puzzle 65, 66, 67, 68.  It takes about 60 seconds once we identify the public key from the blockchain.  

Here i tested my toddler bot script on Puzzle 65 = address -> 18ZMbwUFLMHoZBbfpCjUJQTCMCbktshgpe


root@puzzle ~/Test # time python3 toddler_puzzle_bot.py
Version 0.2.230519 Satoshi Quest, developed by AlbertoBSD
Endomorphism enabled
Threads : 12
Search compress only
Quiet thread output
K factor 4096
Mode BSGS sequential
Opening file 65.txt
Added 1 points from file
Bit Range 65
-- from : 0x10000000000000000
-- to   : 0x20000000000000000
N = 0x100000000000
Bloom filter for 17179869184 elements : 58890.60 MB
Bloom filter for 536870912 elements : 1840.33 MB
Bloom filter for 16777216 elements : 57.51 MB
Allocating 256.00 MB for 16777216 bP Points
Reading bloom filter from file keyhunt_bsgs_4_17179869184.blm .... Done!
Reading bloom filter from file keyhunt_bsgs_6_536870912.blm .... Done!
Reading bP Table from file keyhunt_bsgs_2_16777216.tbl .... Done!
Reading bloom filter from file keyhunt_bsgs_7_16777216.blm .... Done!
Thread Key found privkey 1a838b13505b26867  
Publickey 0230210c23b1a047bc9bdbb13448e67deddc108946de6de639bcc75d47c0216b1b
All points were found
Private Key: 1a838b13505b26867
WIF Key: KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZM21gaY8WN2CdwnTG57
Starting Electrum ....
starting daemon (PID 41802)
true
Keypair imported: 18ZMbwUFLMHoZBbfpCjUJQTCMCbktshgpe
Transaction IDs: []
Daemon stopped
Electrum daemon stopped successfully.

real   2m46.311s
user   1m55.133s
sys   0m59.598s


and the time required to import the key into Electrum and start the redirection of transactions (if they exist ).

The 10 minutes is the average time and this is a pretty stupid circumstance. At this stage, the transaction has
entered the mempool and remains 'Pending,' waiting for confirmation.

It only takes a matter of seconds (for such a small range) to obtain the private key from public key, after which
you (or a thousand of them) can replace the still-unconfirmed transaction in the mempool.  

In other words, you need a very strong miner to speed up (prioritize) the transaction to go through the mempool in
one (or less than) minute for puzzle 66, 67, 68, 69.

BTC: bc1qdwnxr7s08xwelpjy3cc52rrxg63xsmagv50fa8
sdhgfdsjfgsiujdgf
Newbie
*
Offline Offline

Activity: 11
Merit: 0


View Profile
July 18, 2024, 03:36:14 AM
 #993

So, has anyone figured out a bulletproof way to spend puzzle 66's inputs, once the key is found, without the internet-of-bots stealing the prize? Other than trying to find a big enough mining pool that will mine your transaction into a block and not expose the transaction to the mempool? Could any mining pool even be trusted to that extent?

I cant belive that I read this BS again on this forum. Are you out of your mind? Why the hell do you need a mining pool?HuhHuhHuh
I have read a similar BS from another user in another topic, that is talking about miners.

You dont need any miners to get the money, when you got the privatekey, you can immediately take control of the bitcoins. Do you really dont know how?



 It's a blast to solve Puzzle 65, 66, 67, 68.  It takes about 60 seconds once we identify the public key from the blockchain.  

Here i tested my toddler bot script on Puzzle 65 = address -> 18ZMbwUFLMHoZBbfpCjUJQTCMCbktshgpe


root@puzzle ~/Test # time python3 toddler_puzzle_bot.py
Version 0.2.230519 Satoshi Quest, developed by AlbertoBSD
Endomorphism enabled
Threads : 12
Search compress only
Quiet thread output
K factor 4096
Mode BSGS sequential
Opening file 65.txt
Added 1 points from file
Bit Range 65
-- from : 0x10000000000000000
-- to   : 0x20000000000000000
N = 0x100000000000
Bloom filter for 17179869184 elements : 58890.60 MB
Bloom filter for 536870912 elements : 1840.33 MB
Bloom filter for 16777216 elements : 57.51 MB
Allocating 256.00 MB for 16777216 bP Points
Reading bloom filter from file keyhunt_bsgs_4_17179869184.blm .... Done!
Reading bloom filter from file keyhunt_bsgs_6_536870912.blm .... Done!
Reading bP Table from file keyhunt_bsgs_2_16777216.tbl .... Done!
Reading bloom filter from file keyhunt_bsgs_7_16777216.blm .... Done!
Thread Key found privkey 1a838b13505b26867  
Publickey 0230210c23b1a047bc9bdbb13448e67deddc108946de6de639bcc75d47c0216b1b
All points were found
Private Key: 1a838b13505b26867
WIF Key: KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZM21gaY8WN2CdwnTG57
Starting Electrum ....
starting daemon (PID 41802)
true
Keypair imported: 18ZMbwUFLMHoZBbfpCjUJQTCMCbktshgpe
Transaction IDs: []
Daemon stopped
Electrum daemon stopped successfully.

real   2m46.311s
user   1m55.133s
sys   0m59.598s


and the time required to import the key into Electrum and start the redirection of transactions (if they exist ).

The 10 minutes is the average time and this is a pretty stupid circumstance. At this stage, the transaction has
entered the mempool and remains 'Pending,' waiting for confirmation.

It only takes a matter of seconds (for such a small range) to obtain the private key from public key, after which
you (or a thousand of them) can replace the still-unconfirmed transaction in the mempool.  

In other words, you need a very strong miner to speed up (prioritize) the transaction to go through the mempool in
one (or less than) minute for puzzle 66, 67, 68, 69.

Are you replying to me, or just randomly hallucinating? What is the purpose of your writing?
MrlostinBTC
Jr. Member
*
Offline Offline

Activity: 51
Merit: 30


View Profile
July 18, 2024, 05:07:45 AM
Last edit: July 18, 2024, 05:18:01 AM by MrlostinBTC
 #994

So, has anyone figured out a bulletproof way to spend puzzle 66's inputs, once the key is found, without the internet-of-bots stealing the prize? Other than trying to find a big enough mining pool that will mine your transaction into a block and not expose the transaction to the mempool? Could any mining pool even be trusted to that extent?

I cant belive that I read this BS again on this forum. Are you out of your mind? Why the hell do you need a mining pool?HuhHuhHuh
I have read a similar BS from another user in another topic, that is talking about miners.

You dont need any miners to get the money, when you got the privatekey, you can immediately take control of the bitcoins. Do you really dont know how?



Mining has nothing to do with obtaining the privkey, once its loaded and sent to a new address the next transaction in line will pick it up and you will obtain ownership. The alt coins however would be left intact and easily breakable for first come first serve. I know for a fact If I managed to break a puzzle I would not be worried about the small alt coin addresses, I am sure someone could sweep them all at once but I dont have time for that.

Also a address without a outgoing TX does not have its public key exposed. Once coins are sent from a address the pubkey is leaked because the network needs it for verification to send the coins. The pubkey can easliy be cracked with tools listed here. So once someone sweeps BTC from say puzzle 66 the pubkey is now exposed. BSGS can now be used to crack the privkey in minutes or less. The reason puzzles 66 and up are still not broken is because the pubkey is not known. The creator knowningly sent small amounts of coins on other puzzles to expose some of the pubkeys. Puzzles 120, 125, 130, 135 ect. Maybe for fun who knows.

Again, Miners have nothing to do with solving the puzzle. If 2 people were to try to send the coins at the same time for some reason on the same block, 1 transaction would reject depending on that tx in the mempool, and the exact time it was sent. The miner speed would be the same for both of them as the blocks get solved 1 at a time. The network will attemp a target time "usually a minute" for each block to get solved by adjusting difficuilty based on current net hash rate, its not perfect but a sudden ramp up in hash rate will only solve a few blocks before the difficuilty adjusts to correct the solving speed.
benjaniah
Jr. Member
*
Offline Offline

Activity: 52
Merit: 3


View Profile
July 29, 2024, 05:36:35 AM
 #995

So, has anyone figured out a bulletproof way to spend puzzle 66's inputs, once the key is found, without the internet-of-bots stealing the prize? Other than trying to find a big enough mining pool that will mine your transaction into a block and not expose the transaction to the mempool? Could any mining pool even be trusted to that extent?

I cant belive that I read this BS again on this forum. Are you out of your mind? Why the hell do you need a mining pool?HuhHuhHuh
I have read a similar BS from another user in another topic, that is talking about miners.

You dont need any miners to get the money, when you got the privatekey, you can immediately take control of the bitcoins. Do you really dont know how?



 It's a blast to solve Puzzle 65, 66, 67, 68.  It takes about 60 seconds once we identify the public key from the blockchain.  

Here i tested my toddler bot script on Puzzle 65 = address -> 18ZMbwUFLMHoZBbfpCjUJQTCMCbktshgpe


root@puzzle ~/Test # time python3 toddler_puzzle_bot.py
Version 0.2.230519 Satoshi Quest, developed by AlbertoBSD
Endomorphism enabled
Threads : 12
Search compress only
Quiet thread output
K factor 4096
Mode BSGS sequential
Opening file 65.txt
Added 1 points from file
Bit Range 65
-- from : 0x10000000000000000
-- to   : 0x20000000000000000
N = 0x100000000000
Bloom filter for 17179869184 elements : 58890.60 MB
Bloom filter for 536870912 elements : 1840.33 MB
Bloom filter for 16777216 elements : 57.51 MB
Allocating 256.00 MB for 16777216 bP Points
Reading bloom filter from file keyhunt_bsgs_4_17179869184.blm .... Done!
Reading bloom filter from file keyhunt_bsgs_6_536870912.blm .... Done!
Reading bP Table from file keyhunt_bsgs_2_16777216.tbl .... Done!
Reading bloom filter from file keyhunt_bsgs_7_16777216.blm .... Done!
Thread Key found privkey 1a838b13505b26867  
Publickey 0230210c23b1a047bc9bdbb13448e67deddc108946de6de639bcc75d47c0216b1b
All points were found
Private Key: 1a838b13505b26867
WIF Key: KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZM21gaY8WN2CdwnTG57
Starting Electrum ....
starting daemon (PID 41802)
true
Keypair imported: 18ZMbwUFLMHoZBbfpCjUJQTCMCbktshgpe
Transaction IDs: []
Daemon stopped
Electrum daemon stopped successfully.

real   2m46.311s
user   1m55.133s
sys   0m59.598s


and the time required to import the key into Electrum and start the redirection of transactions (if they exist ).

The 10 minutes is the average time and this is a pretty stupid circumstance. At this stage, the transaction has
entered the mempool and remains 'Pending,' waiting for confirmation.

It only takes a matter of seconds (for such a small range) to obtain the private key from public key, after which
you (or a thousand of them) can replace the still-unconfirmed transaction in the mempool.  

In other words, you need a very strong miner to speed up (prioritize) the transaction to go through the mempool in
one (or less than) minute for puzzle 66, 67, 68, 69.

Are you replying to me, or just randomly hallucinating? What is the purpose of your writing?

If (hypothetically) you found the private key for puzzle 66, and simply tried to spend puzzle 66's BTC balance to another wallet that you control, you better hope that that transaction gets mined into the next block
within a few seconds, or it will be stolen with 100% certainty. This is also the case for the next few puzzles, 67,68,69...
1princess4
Newbie
*
Offline Offline

Activity: 1
Merit: 0


View Profile
July 29, 2024, 07:24:37 PM
 #996


If (hypothetically) you found the private key for puzzle 66, and simply tried to spend puzzle 66's BTC balance to another wallet that you control, you better hope that that transaction gets mined into the next block
within a few seconds, or it will be stolen with 100% certainty. This is also the case for the next few puzzles, 67,68,69...

Hey,

hypothetically i find the key, submit tx transaction with 0.1BTC going to my address and pay fee of 6.5 BTC. How do you steal my transaction ?

Thank you!
albert0bsd
Hero Member
*****
Offline Offline

Activity: 1120
Merit: 718



View Profile
July 29, 2024, 08:19:57 PM
 #997


Hey,

hypothetically i find the key, submit tx transaction with 0.1BTC going to my address and pay fee of 6.5 BTC. How do you steal my transaction ?

Thank you!

It is a lose-lose example in my case the bot will keep increment 1sat/vB more than your or anyone else TX.

In the final round in case to reach the limit of the input balance it will append an extra input to the TX and send 100% of the puzzle address as fee.
MrlostinBTC
Jr. Member
*
Offline Offline

Activity: 51
Merit: 30


View Profile
July 30, 2024, 02:57:39 AM
 #998


Hey,

hypothetically i find the key, submit tx transaction with 0.1BTC going to my address and pay fee of 6.5 BTC. How do you steal my transaction ?

Thank you!

It is a lose-lose example in my case the bot will keep increment 1sat/vB more than your or anyone else TX.

In the final round in case to reach the limit of the input balance it will append an extra input to the TX and send 100% of the puzzle address as fee.

Better to stick to the higher range keys then. 130 and up.
holy_ship
Jr. Member
*
Offline Offline

Activity: 116
Merit: 1


View Profile
August 03, 2024, 06:03:33 PM
 #999

Better to stick to the higher range keys then. 130 and up.

130+ with public tools is ridiculously unefficient.
sdhgfdsjfgsiujdgf
Newbie
*
Offline Offline

Activity: 11
Merit: 0


View Profile
August 03, 2024, 09:48:58 PM
 #1000

If (hypothetically) you found the private key for puzzle 66, and simply tried to spend puzzle 66's BTC balance to another wallet that you control, you better hope that that transaction gets mined into the next block
within a few seconds, or it will be stolen with 100% certainty. This is also the case for the next few puzzles, 67,68,69...

You mean that the Public Key will become visible to everyone BEFORE the bitcoins have moved to the new bitcoin address?
Is this what you are saying?
Will someone be able to beat my transaction and have his trasaction go thru before mine?
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 [50] 51 52 53 54 55 56 57 58 59 60 61 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!