Event JSON
{
"id": "7bca7e8597975119a31fdf4582b0a1d2f6a24af34fd2f6ac1a949b07294c2ec9",
"pubkey": "0f28196ced1024be7ceb3d7b194337bf8f21e7ad0a8be803b1ec0a7c52e926de",
"created_at": 1705517156,
"kind": 1,
"tags": [
[
"e",
"4cdcdd9ba80443fcbf9596a17889e2ac8ac1ba609fdc93572b8d0a78ef3dca8b"
],
[
"e",
"762b8debcc61bfb109e0230cf2fa617ea12d61fc18b37d9fec37bacbe2504824"
],
[
"p",
"86c79e5aa8c41f68c9a238858b08c4d63c1b0ce6d4fa96d32a90df25bd83b072"
],
[
"p",
"4c800257a588a82849d049817c2bdaad984b25a45ad9f6dad66e47d3b47e3b2f"
],
[
"r",
"https://medium.com/@johncantrell97/how-i-checked-over-1-trillion-mnemonics-in-30-hours-to-win-a-bitcoin-635fe051a752"
]
],
"content": "Indeed, most that was cracked is 4 words by John Cantrell\n\nHowever he wrote his own tooling in Rust and made the process as efficient as it can be.\n\nhttps://medium.com/@johncantrell97/how-i-checked-over-1-trillion-mnemonics-in-30-hours-to-win-a-bitcoin-635fe051a752",
"sig": "a8efcc390bb341b876df9a1e6bd204ba58ffb7d3806b1c33949949f4b9d6599fbb2deb34266a9c42cf8c9eb5b3a879796a054c522feefae384766eb1f3228fe4"
}