1PWo3JeB9jrGLDTmsp45h1pDXXtb7zisQH
start with 79B
Why does everyone keep trying to solve it?
I think this is a game that benefits others, not the solvers!! When more inventory was added to these puzzles, each Bitcoin was worth about $27,000. Have any of you thought about why the finder of puzzle 69 lost inventory?
Let me remind you of a few principles: Bitcoin can only consider a transaction as completed after receiving 6 confirmations in the next blocks in the blockchain network chain, and before 6 confirmations, that asset is not in your possession, and the block containing the transaction confirmed by miners may be completely removed from the blockchain chain before reaching 6 confirmations, which are called orphan blocks.
lost because he used the mempool instead of Mara. Big mistake when it's already been discussed here on how to avoid losing those funds.

Although using a private mining pool instead of a public one can prevent RBF, but who can guarantee that the private mining pool will not embezzle the money? This is not difficult at all technically.
Normal transfers with high fees may still have a chance of success, but if they cheat through a private mining pool, you will never get your property back. I think the decentralization of Bitcoin does not allow you to hand over transactions to private mining pools.
And I have not seen any evidence that No. 67 and 68 were successfully transferred through Mara.
If you have any questions, why dont you try Mara by yourself? Ill make myself clear: im not specialist in bitcoin not even in coding. But I already have tested Mara and it`ll worked out in the end. At no time in this process the private key is revealed, you only need a hex of a signed transaction which contains just numbers, and past it in Mara. I dont see how they could get the private key and trick you leaving you with nothing. I could be talking bullshit since im not an expert about all of this, Im just talking about what I did and tested with 5 dolars.
If I'm not thinking incorrectly, the assumption or theory behind not trusting MARA is entirely based on the hex of a signed transaction, the idea that someone there, whether it's the miner or someone else, could access the public key information before anyone else and, thinking "well, this is a Bitcoin puzzle anyway," could take the entire amount for themselves.
There only 2 way. Collusion inside 😅. Or setup huge mount of miner at mara pool and hope lucky the public key pass to your miner ..
But why .. .. better to find way to solve it 🙃😅
If it fail trough mara , then mara reputation will fall i think. Cause the solver will surely go bonker 🙃
My discussion is not about attacking or removing confirmed blocks for profit; it is about why some puzzles - whose existence is recorded at the time of their creation - become very valuable and popular, but when these puzzles are solved, the rewards are not distributed to the solvers and are stolen? The answer is quite clear: we all know that it is completely ridiculous and illogical to believe that bots can obtain the private key in a very short time, given the public key. The only logical and 100% probable case is that those bots already have that key before you yourself have access to your private key. "Yes, of course the number of these bots is the same as the number of puzzles left. These bots all have the keys to the puzzles and are designed to monitor and investigate unsolved Bitcoin puzzles and monitor Bitcoin transactions across the blockchain. If you have access to a full node on the Bitcoin network, you can examine the transactions associated with orphaned blocks at the time and date of previous puzzle solutions and see how many of these thefts occurred there."
I'm writing this without being lazy and explaining it step by step: "completely ridiculous and illogical to believe that bots can obtain the private key in a very short time" might be true for keys over 80 bits, but what you said is nonsense for the following reason.
If we talk about the current puzzle 71, when you search for the public key of any 71-bit address using RetiredCoder's kangaroo, Ok I can even give you the hardware an RTX 4090 and as an example, I show below exactly how it works:
MAIN MODE
Solving public key
X: EDCFADF4E607CB2E8927DA2E7BF0B2CB9D7376B6DFC43A486DDD535021C9F686
Y: B27F71F9B498BAD82633C5DA9EEDFDC3F3B786318080710BB0BF1381968962D0
Offset: 400000000000000000
Solving point: Range 70 bits, DP 14, start...
SOTA method, estimated ops: 2^35.202, RAM for DPs: 0.277 GB. DP and GPU overheads not included!
Estimated DPs per kangaroo: 3.067. DP overhead is big, use less DP value if possible!
GPU 0: allocated 2394 MB, 786432 kangaroos. OldGpuMode: No
GPUs started...
Stopping work ...
Total Time: 3 seconds
Point solved, K: 0.412 (with DP and GPU overheads)
PRIVATE KEY: 6ACC29061A29B3EB5A
Public Addr: 1PWo3JeB9qordwWTL3GMBUVuo5Usa9wj4z
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3rDzuJyywM8f2fuQHuuyk
Priv (HEX): 0x6ACC29061A29B3EB5A
Ah wait, I reached the private key in 3 seconds. Even if I don't know any coding, I would automate this with AI. I did this for you without being lazy, and as I said before, please read the thread carefully starting from page 350s, even from 300s or much earlier.