Ian wrote:
BTC = 0* Were having a slight problem, LOL, Yah, I lost the password to the BTC 
wallet,

Ron wrote:
> See, that's what happens when you invest in Silk Road!
> Unless you actually forgot it.

The blockchain makes all of this a matter of public record, we can see it's all still there at the same old address:
https://blockchain.info/address/1Mz6YwFap2FEpPrSq3EEpqW4Endo7gA1wr

He forgot the exact passphrase that was encrypting his private key, but remembers quite a bit about it. There's hope. He established it on July 24 and actually used it with success on August 10.

there is about $ 200.00 "stuck" and a crack strike force of
hackers is working on cracking into it.

A very inefficient cracking program of mine will be running for the next 12-24 hours. There are 2,299,968 variations of what I know from Ian that this is trying at this very moment.

It's inefficient because it is starting a single openssl sub-process to decode for every try. Only using 25% cpu thanks to that start-stop overhead. No parallelism.

Estimate of 12-24 hours comes from aprox 5-10 minute run time when I was going for 16,000 variations.

I have an encrypted .key file as per
https://github.com/jim618/multibit/wiki/Export-and-limited-import-of-private-keys
(where I got my openssl invocation for this from)

Passphrase is going through whatever 256 bit hashing process openssl uses as per above to attempt a aes-256-cbc key. Extra overhead from decoding the ascii armour again and again too...

When this initial crappy attempt fails, we'll be escalating this to a wider operation:

"Operation Wrenches and Blades" http://xkcd.com/538/

As per that comic, "wrenches" is people doing interviews with Ian to learn whatever they can extract (without the use of drugs and blunt objects of course).

Ignore comments Ian makes about dead brain cells from his business travels, neuro science tells us that we don't encode each piece of information in one specific part of the brain. The signal is in the network.

Before Ian made this public, I've invited Ron and/or Mak to conduct a second, independent interview. Once they or someone else has had a chance to conduct one of their own, I will make the notes from my interview available and my copy of the key available.

This operation will go on for as long has to. At some point I imagine this turning into a treasure hunt poster on the wall with all pertinent information (ascii armour version of his key + timestamp encrypted is only 131 characters) that could become legendary here at Skullspace.

Especially if the years pass by and this 1.4763397 bitcoin becomes more and valuable.

I swear, from what Ian has told me, somebody here will find it eventually.

This is where the "blades" part comes in to my title. I will eventually escalate this into customized John the Ripper + MPI madness . Such things will be developed, tested and debugged with on site Skullspace equipment (vm server + workstations), but for very big production runs I will take up Chris Kluka on offers to use idle blades at his worksite (with compensation for power use) and/or Amazon EC2 instances with GPUs if it turns out the hash, AES, and iterative aspects of this make sense to program on GPU. (my instinct says yes based on the data size).

Being relatively bullish on bitcoin's valuation, I won't be in a rush to work on this though -- I've now got Skullspace in a position where it may be saving some bitcoin for its own future. Muhuhuhaha!


Mark
_______________________________________________
SkullSpace Discuss Mailing List
Help: http://www.skullspace.ca/wiki/index.php/Mailing_List#Discuss
Archive: https://groups.google.com/group/skullspace-discuss-archive/

Reply via email to