TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Bitcoin puzzle #66 was solved: 6.6 BTC (~$400k) withdrawn

437 pointsby mrb8 months ago

19 comments

mrb8 months ago
Discussion thread here: <a href="https:&#x2F;&#x2F;bitcointalk.org&#x2F;index.php?topic=1306983.msg64526037#msg64526037" rel="nofollow">https:&#x2F;&#x2F;bitcointalk.org&#x2F;index.php?topic=1306983.msg64526037#...</a><p>Bitcoin puzzles are private keys with just a few unknown bits so that anyone can bruteforce them to collect a reward. Puzzle 66 contained 66 unknown bits and had 6.6 BTC deposited into it by the initial puzzle creator. The private key was 0x000000000000000000000000000000000000000000000002832ed74f2b5e35ee or 256 bits with mostly zeroes but 66 random ones.<p>The next Bitcoin puzzle, #67, has 67 unknown bits, and contains 6.7 BTC up for grabs: <a href="https:&#x2F;&#x2F;www.blockchain.com&#x2F;explorer&#x2F;addresses&#x2F;btc&#x2F;1BY8GQbnueYofwSuFAT3USAhGjPrkxDdW9" rel="nofollow">https:&#x2F;&#x2F;www.blockchain.com&#x2F;explorer&#x2F;addresses&#x2F;btc&#x2F;1BY8GQbnue...</a><p>The previous puzzle by order of difficulty was #64 (not #65, because see below) and was solved on 9&#x2F;9&#x2F;2022, so about 2 years ago. In other words, it took about 2 years of compute time to run the 2^66 bruteforcing task.<p>Puzzles that are multiple of 5 (#65 or #70) are special: they have twice more entropy. So that private key #65 doesn&#x27;t have 65-bit of entropy but 130-bit of entropy. And the creator of the puzzle intentionally published their public key on the blockchain. When you know the public key, brutetforcing the n-bit private key only requires 2^(n&#x2F;2) work. So puzzle #65 with a 130-bit key actually require bruteforcing up to only 2^65 keys.
评论 #41548277 未加载
评论 #41556256 未加载
评论 #41548292 未加载
评论 #41552249 未加载
评论 #41548106 未加载
评论 #41548212 未加载
评论 #41549986 未加载
评论 #41548162 未加载
评论 #41552405 未加载
评论 #41547569 未加载
评论 #41571619 未加载
评论 #41554315 未加载
评论 #41585998 未加载
gzer08 months ago
Whoever solved it left a rather intriguing, albeit slightly mocking, message:<p><pre><code> TX input: Code: 1FuckUmT5yBAvozf6gT8GRQVbJ7iBDUnrH TX outputs: Code: 1Jvv4yWkE9MhbuwGU66666666669sugEF 0.00000001 1YouAreSoDumbLoL666666666667K5aR4 0.00000002 1WhatWereUThinking6666666662wkqq1 0.00000003 1YouDeserveNothing6666666665sbbBC 0.00000004 1YouEpicFaiLure66666666666688GSDA 0.00000005 1BitchAssLoser66666666666669dBUVg 0.00000006 1AndEveryoneELse666666666669Vnc8C 0.00000007 1ThisisALosingGame6666666667HAZdf 0.00000008 1JustGetAReaLJob666666666665vGKVD 0.00000009 1YoureWastingTimeAndMoney664CVExC 0.00000010 1AndCausingCLimateChange6666HK8Qc 0.00000011 13zb1hQbWVsc2S7ZTZnP2G4undNNpdh5so 0.00000012 1Jvv4yWkE9MhbuwGUoqFYzDjRVQHaLWuJd 0.00000013 1FK5PjPNARQmg94n2cNHTo9417kWfXUDBQ 0.00002125</code></pre>
评论 #41552591 未加载
评论 #41552407 未加载
arcanemachiner8 months ago
Looks like the coins were stolen by a bot:<p>&gt; <a href="https:&#x2F;&#x2F;bitcointalk.org&#x2F;index.php?topic=1306983.msg64535839#msg64535839" rel="nofollow">https:&#x2F;&#x2F;bitcointalk.org&#x2F;index.php?topic=1306983.msg64535839#...</a><p>I&#x27;m not super familiar with the concept (and I&#x27;m too lazy to look into it TBH), but I think the would-be winner posted the private key before enough (any?) blocks were mined, and the thief posted a transaction with a bigger fee, and the thief&#x27;s transaction was in the block that got mined.
评论 #41550881 未加载
评论 #41550834 未加载
评论 #41550836 未加载
评论 #41550854 未加载
评论 #41557629 未加载
评论 #41550094 未加载
cj8 months ago
Interesting: Reading the first page of the bitcointalk forum, the puzzle originated from this wallet, which has an incredible amount of volume going through it. 10,000+ transactions and over a million BTC sent&#x2F;received.<p><a href="https:&#x2F;&#x2F;www.blockchain.com&#x2F;explorer&#x2F;addresses&#x2F;btc&#x2F;173ujrhEVGqaZvPHXLqwXiSmPVMo225cqT" rel="nofollow">https:&#x2F;&#x2F;www.blockchain.com&#x2F;explorer&#x2F;addresses&#x2F;btc&#x2F;173ujrhEVG...</a>
评论 #41558253 未加载
thundergolfer8 months ago
We had fraudsters using modal.com compute to solve this challenge. It&#x27;s not traditional mining software so it didn&#x27;t initially get flagged, but we&#x27;ve updated our detection to catch it now[1].<p>1. <a href="https:&#x2F;&#x2F;modal.com&#x2F;blog&#x2F;catching-cryptominers" rel="nofollow">https:&#x2F;&#x2F;modal.com&#x2F;blog&#x2F;catching-cryptominers</a>
评论 #41551464 未加载
评论 #41563815 未加载
评论 #41550753 未加载
评论 #41551205 未加载
gizmo3858 months ago
Is there something unique or special about the private keys that are guessed? This seems like an incredibly wasteful allocation of compute (which wouldn’t be surprising given that it’s bitcoin but still)
评论 #41548348 未加载
评论 #41548209 未加载
rboyd8 months ago
probably discussed in the bitcointalk thread, but how do we know it&#x27;s not just the creator of the puzzle reclaiming his own bitcoin?
评论 #41551265 未加载
评论 #41548226 未加载
gosub1008 months ago
somewhat-related: <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;RSA_Factoring_Challenge" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;RSA_Factoring_Challenge</a>
y428 months ago
What I don&#x27;t understand, hopefully someone is still reading it here: The hint says this:<p>&gt;&gt; First output: take random number from 2^0 upto 2^1-1, use it as private key &gt;&gt; Second output: take random number from 2^1 upto 2^2-1, use it as private key &gt;&gt; Third output: take random number from 2^2 upto 2^3-1, use it as private key<p>To me it sounds like that wallet #10 has a range from 2^9 to 2^10 - 1 - so you don&#x27;t actually need to check previous bits. But somehow it seems like everyone is crawling through the whole range of possible private key. Doesn&#x27;t make sense, does it? Am I missing something?
评论 #41571598 未加载
mrb8 months ago
Another good resource on these puzzles: <a href="https:&#x2F;&#x2F;privatekeys.pw&#x2F;puzzles&#x2F;bitcoin-puzzle-tx" rel="nofollow">https:&#x2F;&#x2F;privatekeys.pw&#x2F;puzzles&#x2F;bitcoin-puzzle-tx</a>
iJohnDoe8 months ago
Can someone EILI5?<p>I thought cracking anything to steal bitcoin was impossible due to the keys sizes involved? Is this possible because a portion of the key is already available so there is less to crack?<p>Which key is known? The public or private? Another comment said the “now known public” but then also said the private key can now be recovered by cracking it? Two keys need to be cracked?<p>What kind computing power is needed to crack both keys and how long?<p>Thanks. Sorry, I’m an idiot when it comes to bitcoin.
评论 #41551600 未加载
wodenokoto8 months ago
That’s not a trivial price. Who finance these puzzles?
评论 #41554059 未加载
odyssey78 months ago
What category of taxable income would this be in the US?
评论 #41550065 未加载
评论 #41549583 未加载
评论 #41549322 未加载
patagnome8 months ago
ref: <a href="https:&#x2F;&#x2F;wiki.p2pfoundation.net&#x2F;Arthur_Brock_Against_the_Consensus_on_Data_Consensus_in_the_Blockchain" rel="nofollow">https:&#x2F;&#x2F;wiki.p2pfoundation.net&#x2F;Arthur_Brock_Against_the_Cons...</a>
DreadPriateRob8 months ago
my assumption is the only way you will be able to stop any bot from double spend attack is to multisig the puzzle address when its solved so any transaction there forth would need your main wallets or any wallet that you set up to need its signature or signature(s) if using multiple before any transactions are made but you will need to be quick about it maybe even setting up your own script or bot to do so i find it wild that the solver didn&#x27;t think that someone could swoop in and take the reward i multisig all my addresses for that very reason and yes i know a lot about mutisig it&#x27;s impossible to use a double spend attack with that set up
ivanjermakov8 months ago
Who is paying to the puzzle solvers?
评论 #41548264 未加载
评论 #41548244 未加载
评论 #41555437 未加载
评论 #41548246 未加载
totallyunknown8 months ago
This is just sick.
评论 #41548192 未加载
评论 #41552931 未加载
Meganet8 months ago
So while this is going on <a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=Vl6VhCAeEfQ" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=Vl6VhCAeEfQ</a> (ted talk)<p>a lot of people created co2 to take part in a btc lottery and the winner was now randomly found.<p>I hate crypto :|
评论 #41555916 未加载
Dwedit8 months ago
Do they have a buyer for that $400k? If not, it&#x27;s not worth $400K.
评论 #41548290 未加载
评论 #41548295 未加载
评论 #41548282 未加载
评论 #41548288 未加载
评论 #41548284 未加载
评论 #41548327 未加载
评论 #41548323 未加载