Besides the analysis of the private key from the public key, I'd like to ask: is the public key given directly to you? How do you know the winner is transferring and broadcasting the fund? Do you get the public key immediately after the winner broadcast the transation? Does this take time?
Also, once you have the private key, if you manually enter it and then transfer the funds using a higher fee, wouldn't that take a long time? Even if you use a bot, you'll need to construct a long transaction string, right? All of these take time.
Are those who claim theft can be done in seconds really that confident?
I kept silent because it wasn't worth my time but can I ask you something?
Why are you here? What is the purpose?
It takes less than 2 seconds to break the private key of Puzzle 71 (once the initial TX is in the mempool), create the TX, and broadcast it, and to get it accepted by any miner.
Please stop the non-sense, you are polluting the discussion.
Let me say it again: you might not have time to open a new browser tab and check your first TX, before it gets replaced.
I want to ask you a question, and that is, if we set the time to send the transaction, taking into account the volume of the transaction sent, which in this particular case is about 1987 bytes, by monitoring the block being created online, and set the transaction with a network fee of $2000 at a time when there is only enough free space left in the current block for the volume of the transaction we sent, and then send the transaction so that it is confirmed and included in the current block with a high network fee, and then the block is closed and the next block starts to be created, is there still a risk of the transaction being hijacked by robots?