The Canary - Burst Early Warning System
-
@ctt @Gibsalot Even if Burst would be used by 3 billion people / accounts this wouldn't mean a bruteforce attempt will be randomly successful at some point. The possible combination of the 12 words is a very large number (see wikipedia) which are difficult for us to imagine. On the other hand million and billion are not very large numbers (in math).
It's like comparing the distance to the moon (possible combinations) with length of a helping ladder (3 billion accounts). You won't reach it the moon suddenly with your hand. ;)
After crunching the numbers of my moon vs ladder example -> It is wrong by six magnitudes.
So your ladder (3 billion accounts) is not 10 meter high. It is 0,00001 m high.
-
@haitch Now at 615 CPU Hours ......
-
@daWallet
(2 words) after some optimizations - 53 sec.
[13:42:43] Start BURST-ADFP-EN99-24FD-44QA7
[13:43:36] precious fault6 threads, avg speed - ~8011 combinations/sec
-
@haitch Now 736 CPU hours. My single threaded cracker ran for around 648 hours - so surprised the multithreaded approach take more hours, albeit in a lot less real time. My single threaded app ran for around 26 days to get to 648 CPU Hours. Blago's cracker has been running for less than 1 day, and has more hours.
-
@haitch Just passed 1,000 CPU hours ......
-
When @daWallet says the 12 word phrase is "a very large number:"; that number is 341,54,387,00,281,734,278,1797,097,590,636,000. Brute forcing that passphrase will, on average, take longer than the universe has existed - billions of billions of years. 5 Words is over 3,000 years, each additional word make it 1,626 time harder. Replacing or adding a numeral or symbol makes it virtually impossible.
-
@haitch just went past 1,780 CPU hours .....
-
@haitch just went past 2,500 CPU hours - going to give it another day to solve it, then will have to kill it, as it's impacting my plotting and mining.
-
3 words, 6 threads,
53 hrs gone, 32% complete (1'393'000'000 combinations done) of all combinations (1626^3)... still waiting99 hrs gone, 50% complete (2'149'500'000 combinations). Combination not found.
Interrupted, need restart computer
-
seems that a couple of days ago someone pulled the rest of the coins out of the 3 word phrase account
http://burstcoin.biz/address/13349019730708354187
did i miss some one (besides haitch) claiming to have found the pass phrase?
-
Interesting... some one got a prize!
little update:
(2 words) after huge optimizations (multithreads, AVX, fast libs) - 4 sec.
125744 combinations/secpass founded after 502975 combinations
[14:43:03] Start BURST-ADFP-EN99-24FD-44QA7 [14:43:07] precious fault [14:43:07] END
-
@Blago going from 53 sec to 4 sec is very impressive for optimizations. huge seems like an understatement.
the combinations/sec is impressive too but comparing to possibilities of 12 word phrase is not cause for concern about standard phrases.
-
-
@Blago spoiler alert
.
.
.
.
ignore neither guydumb luck on that jsfiddle, couple days late and couple burst short
-
3 words - 5 hrs 41 min 8 sec
[06:04:45] Start BURST-UP6D-R28A-67XL-DYBJL [11:45:53] ignore neither guy [11:45:53] ENDpassword found after 3211632924 combinations
-
@Blago And you almost got 160k trys per second... Very impressive man?!



