Skip to content

Sleeping beauty bitcoin wallets wake up after 14 years to the tune of $2 billion

Technology
42 33 0
  • Two wallets. 10k BTC each. These wallets were created back when BTC was 78¢. When you spend $10k the IRS might ask questions. If you are "structuring" correctly you avoid spending $9,999 and $1 within a short time span or even in the same reporting period. 10k BTC back then was something you could buy that looked like it wasn't $10k but was really close. Spend it twice in two different wallets and if there are enough other transactions no one will notice.

    Anytime you see a transaction or set of transactions that add up to or are just shy of 10k USD, BTC or pretty much anything, there should be a little bell that dings in your head and causes you to think "this person is clearly thinking about US tax reporting laws and trying to dodge them."

    Who had all that money back in 2011 that decided that now was the time to tap those wallets that are worth a billion each? Obviously someone that hasn't needed the money until now. Someone that is planning on spending up to 2 billion. But not right away because if you try to sell 20k BTC in a hurry it will draw attention and potentially destabilize the currency. But you could sell it all off over the next year or longer without flooding the market.

    Who wants to spend up to $2 billion in the next year? What could you buy with that kind of money? Elon musk spent ~$250 million getting Trump elected. That's just an eighth of $2B. You could buy a lot of super PAC power with $2B. You could bankroll the primarying of every Republican that voted for OBBB. Weird that these wallets were dusted off so close to Elon saying he would primary anyone that voted for OBBB, and he has a strong affinity for crypto, and he had enough money in 2011 to buy that much BCT on a whim, and that he wouldn't have had to touch it to pay other bills as BTC went from 78¢ to more than $100,000 over the last 14 years.

    I wonder who these wallets belong to and what they will be used for?

    This is what conspiracy thinking looks like. It's me. I'm the one conspiracy thinking.

    Btw, banks will flag multiple transactions of $9,999 even if the reporting threshold is $10k USD. Structuring to avoid the $10k reporting requirement is well known and no guarantee of remaining under the radar.

  • I hear this a lot but I don’t put any confidence behind it. This argument suggests that one day we’ll be able to brute force into lost wallets when we can break the encryption. Who knows how far in the future that will be.

    But if I recall correctly, Bitcoin’s protocol is consensus driven. If there is an imminent threat of quantum computing, the developers could just improve the code base to resist it. Or fork the protocol to one that is resistant (Bitcoin 2). Then it’s up to 51% of the Bitcoin node operators to adopt the protocol. As soon as 51% of them upgrades, you immediately stop the threat.

    I think the only reason Bitcoin is around is for two reasons: speculation, or the persons that actually believe it’s decentralised hard money free from control. I’d like to believe that there are a ton of people out there that run the BTC nodes to keep it decentralised. If there is an update that will resist quantum computing, I’m sure they’ll be eager to immediately upgrade their nodes and secure the network and those wallets. At least that’s how I believe it works, it’s been years since I first began researching it.

    As an aside,
    Bitcoin isn’t for me because I hate the environment impact. I hope one day it will become green, because it’s never going to go away. But I don’t blame the people that believe in it. In a world where the rich own everything and control the rules, these people are trying to opt out I guess - use a form of money that can’t be easily controlled or censored. Granted it’s all based on speculation, and whenever we run out of Bitcoin is probably when the system will become useless. Spending is discouraged when you run out of coins, so I don’t know how the Bitcoiners defend that argument. So definitely not for me.

    Edit, on mobile so fixed some typos and clarified the 51% attack.

    This is correct for a given transaction, but there's no consensus needed to open a Bitcoin wallet. That is usually just a private key in an encrypted envelope.

  • This sounds fishy.

    What if somebody found out the private key for those accounts? Like, brute forced them?

    Is it even technologically possible?

    Bitcoin private keys are 256 bit long. That means, there are 115792089237316195423570985008687907853269984665640564039457584007913129639936 (1.15*10^77) possible private keys.

    Say you are using a bitcoin miner that's roughly 4x as fast as the curretly fastest one at 1PH/s (1*10^15), they you'll need roughly 1*10^62 seconds or 3*10^54 years.

    Lets say you got a million of these miners, then you are down to 3*10^48 years, or 2*10^38 times as long as the universe has existed.

    I was going to calculate how much electricity this would consume and how expensive it would be, but the answer to that is plainly "too much to imagine".

  • There's a window between the proof of concept success and Bitcoin being worthless where the attacker could attack any wallet and collect/sell while people figure out what is happening. The only question at that point is do you attack and sell aggressively to beat the clock, or do you slowly and carefully attack to try and stay under the radar? If one person has the ability to break crypto, then it follows that other people working towards it only have to align the same pieces before the window shuts.

    Crypto is and always has been a scam.

    Considering that you'd need a paradigm-breaking revolutionary and incredibly expensive device to do so, I'd find it hard to believe that you could stay under the radar with it.

    What I'd expect to happen is that some big corporation and/or university manages to build a quantum computer capable of breaking 256bit encryption, and quite instantly after the announcement bitcoin will tank into nothingness or will change the algorithm to something quantum-computer safe. Well before some shady actor will get their hands on a quantum computer to crack wallets.

  • Bitcoin private keys are 256 bit long. That means, there are 115792089237316195423570985008687907853269984665640564039457584007913129639936 (1.15*10^77) possible private keys.

    Say you are using a bitcoin miner that's roughly 4x as fast as the curretly fastest one at 1PH/s (1*10^15), they you'll need roughly 1*10^62 seconds or 3*10^54 years.

    Lets say you got a million of these miners, then you are down to 3*10^48 years, or 2*10^38 times as long as the universe has existed.

    I was going to calculate how much electricity this would consume and how expensive it would be, but the answer to that is plainly "too much to imagine".

    • brainwallet has entered the chat
  • Btw, banks will flag multiple transactions of $9,999 even if the reporting threshold is $10k USD. Structuring to avoid the $10k reporting requirement is well known and no guarantee of remaining under the radar.

    Not even that close. They'll flag any recurring fairly large transactions under 10k.

  • I hear this a lot but I don’t put any confidence behind it. This argument suggests that one day we’ll be able to brute force into lost wallets when we can break the encryption. Who knows how far in the future that will be.

    But if I recall correctly, Bitcoin’s protocol is consensus driven. If there is an imminent threat of quantum computing, the developers could just improve the code base to resist it. Or fork the protocol to one that is resistant (Bitcoin 2). Then it’s up to 51% of the Bitcoin node operators to adopt the protocol. As soon as 51% of them upgrades, you immediately stop the threat.

    I think the only reason Bitcoin is around is for two reasons: speculation, or the persons that actually believe it’s decentralised hard money free from control. I’d like to believe that there are a ton of people out there that run the BTC nodes to keep it decentralised. If there is an update that will resist quantum computing, I’m sure they’ll be eager to immediately upgrade their nodes and secure the network and those wallets. At least that’s how I believe it works, it’s been years since I first began researching it.

    As an aside,
    Bitcoin isn’t for me because I hate the environment impact. I hope one day it will become green, because it’s never going to go away. But I don’t blame the people that believe in it. In a world where the rich own everything and control the rules, these people are trying to opt out I guess - use a form of money that can’t be easily controlled or censored. Granted it’s all based on speculation, and whenever we run out of Bitcoin is probably when the system will become useless. Spending is discouraged when you run out of coins, so I don’t know how the Bitcoiners defend that argument. So definitely not for me.

    Edit, on mobile so fixed some typos and clarified the 51% attack.

    This argument suggests that one day we’ll be able to brute force into lost wallets when we can break the encryption. Who knows how far in the future that will be.

    Nobody knows if a quantum computer is actually possible to build, but in theory, if a quantum computer is built, RSA would be exponentially easier to crack.

  • This sounds fishy.

    What if somebody found out the private key for those accounts? Like, brute forced them?

    Is it even technologically possible?

    Yes, it's possible, but more like "brute forcing the password of a wallet software and get the keys that way".

  • Somebody found their missing hard drive

    That guy who want to search a landfill probably.

  • Bitcoin private keys are 256 bit long. That means, there are 115792089237316195423570985008687907853269984665640564039457584007913129639936 (1.15*10^77) possible private keys.

    Say you are using a bitcoin miner that's roughly 4x as fast as the curretly fastest one at 1PH/s (1*10^15), they you'll need roughly 1*10^62 seconds or 3*10^54 years.

    Lets say you got a million of these miners, then you are down to 3*10^48 years, or 2*10^38 times as long as the universe has existed.

    I was going to calculate how much electricity this would consume and how expensive it would be, but the answer to that is plainly "too much to imagine".

    I was going to calculate how much electricity this would consume and how expensive it would be, but the answer to that is plainly “too much to imagine”.

    Purely hypothetically speaking, but, what if someone had their own private Dyson Sphere generating electricity? (Asking for a friend.)

  • Not even that close. They'll flag any recurring fairly large transactions under 10k.

    I'm unfamiliar as I've never had such. What counts as re-occuring? Is two payments always considered re-occuring?

  • Bitcoin private keys are 256 bit long. That means, there are 115792089237316195423570985008687907853269984665640564039457584007913129639936 (1.15*10^77) possible private keys.

    Say you are using a bitcoin miner that's roughly 4x as fast as the curretly fastest one at 1PH/s (1*10^15), they you'll need roughly 1*10^62 seconds or 3*10^54 years.

    Lets say you got a million of these miners, then you are down to 3*10^48 years, or 2*10^38 times as long as the universe has existed.

    I was going to calculate how much electricity this would consume and how expensive it would be, but the answer to that is plainly "too much to imagine".

    Yeah, my password was Hunter2
    Username: Username

  • I was going to calculate how much electricity this would consume and how expensive it would be, but the answer to that is plainly “too much to imagine”.

    Purely hypothetically speaking, but, what if someone had their own private Dyson Sphere generating electricity? (Asking for a friend.)

    The power consumption would be 5*10^62 Wh.

    The sun outputs 3.9*10^26 W. If you captured all that energy with 100% efficiency, you would need 1.3*10^36 hours or roughly 1*10^22 times the age of the universe to collect enough energy.

    That's incidentally roughly the estimated number of stars in the universe.

    So if you put a dyson sphere around every star in the universe, right after the big bang (ignoring that stars didn't form instantly after the big bang) and you ran them until today, then you'd have just about enough energy to crack one wallet with current tech.

  • This is correct for a given transaction, but there's no consensus needed to open a Bitcoin wallet. That is usually just a private key in an encrypted envelope.

    Got it, thanks for that distinction. It’s been years since I last looked into this stuff. Makes sense for a dormant wallet.

    If a wallet is not dormant in this scenario, then active users could just migrate their wallet to another wallet and then they’ll be good to go.

  • If he made the Silk Road mostly to kickstart BTC, after buying a pile of BTC, and then waited till now to sell it - then he's kinda smart.

  • This post did not contain any content.

    Sizable inactive accounts that wake up after years of dormancy draw investor attention because of the potential market impact if those coins are sold.

    It would make me very happy if they liquidated and destroyed the market overnight.

  • Maybe because I'm high, but you just made me ugly laugh on the bus. I just saw fireworks. And now I'm remembering that plan I had to go back to the early 90s, and buy stock in yahoo. But through a telephone error, I ended up buying cases of yoohoo instead. Still worth it. I got to go back in time and see a micheal jackson concert when he was still black, and a Nirvana concert back before they were heard of.

    Still though.....to be a billionaire.

    early 90s

    micheal jackson still black

    Nirvana before they were heard of

    🤔

  • I'm unfamiliar as I've never had such. What counts as re-occuring? Is two payments always considered re-occuring?

    It can be, if they're fairly close in time and total just past 10k.

    Every bank has their own algorithm and they try to ride the line between catching criminals and not having too many false positives.

  • If he made the Silk Road mostly to kickstart BTC, after buying a pile of BTC, and then waited till now to sell it - then he's kinda smart.

    Who says human traffickers have to be dumb?

  • Sizable inactive accounts that wake up after years of dormancy draw investor attention because of the potential market impact if those coins are sold.

    It would make me very happy if they liquidated and destroyed the market overnight.

    Buttcoiner

  • 97 Stimmen
    6 Beiträge
    0 Aufrufe
    F
    Anybody got a time machine? Stop this man!
  • New Google AdSense Fill Empty In-Page Ads

    Technology technology
    2
    1
    21 Stimmen
    2 Beiträge
    3 Aufrufe
    S
    I've not seen an ad in years, so they can try to monetize me but will fail spectacularly
  • OSTP Has a Choice to Make: Science or Politics?

    Technology technology
    7
    1
    30 Stimmen
    7 Beiträge
    25 Aufrufe
    B
    Ye I expect so, I don't like the way this author just doesn't bother explaining her points. She just states that she disagrees and says they should be left to their own rules. Which is probably fine, but that's just lazy or she's not mentioning the difference for another reason
  • (azazoaoz)

    Technology technology
    1
    1
    0 Stimmen
    1 Beiträge
    11 Aufrufe
    Niemand hat geantwortet
  • 1 Stimmen
    2 Beiträge
    6 Aufrufe
    A
    If you're a developer, a startup founder, or part of a small team, you've poured countless hours into building your web application. You've perfected the UI, optimized the database, and shipped features your users love. But in the rush to build and deploy, a critical question often gets deferred: is your application secure? For many, the answer is a nervous "I hope so." The reality is that without a proper defense, your application is exposed to a barrage of automated attacks hitting the web every second. Threats like SQL Injection, Cross-Site Scripting (XSS), and Remote Code Execution are not just reserved for large enterprises; they are constant dangers for any application with a public IP address. The Security Barrier: When Cost and Complexity Get in the Way The standard recommendation is to place a Web Application Firewall (WAF) in front of your application. A WAF acts as a protective shield, inspecting incoming traffic and filtering out malicious requests before they can do any damage. It’s a foundational piece of modern web security. So, why doesn't everyone have one? Historically, robust WAFs have been complex and expensive. They required significant budgets, specialized knowledge to configure, and ongoing maintenance, putting them out of reach for students, solo developers, non-profits, and early-stage startups. This has created a dangerous security divide, leaving the most innovative and resource-constrained projects the most vulnerable. But that is changing. Democratizing Security: The Power of a Community WAF Security should be a right, not a privilege. Recognizing this, the landscape is shifting towards more accessible, community-driven tools. The goal is to provide powerful, enterprise-grade protection to everyone, for free. This is the principle behind the HaltDos Community WAF. It's a no-cost, perpetually free Web Application Firewall designed specifically for the community that has been underserved for too long. It’s not a stripped-down trial version; it’s a powerful security tool designed to give you immediate and effective protection against the OWASP Top 10 and other critical web threats. What Can You Actually Do with It? With a community WAF, you can deploy a security layer in minutes that: Blocks Malicious Payloads: Get instant, out-of-the-box protection against common attack patterns like SQLi, XSS, RCE, and more. Stops Bad Bots: Prevent malicious bots from scraping your content, attempting credential stuffing, or spamming your forms. Gives You Visibility: A real-time dashboard shows you exactly who is trying to attack your application and what methods they are using, providing invaluable security intelligence. Allows Customization: You can add your own custom security rules to tailor the protection specifically to your application's logic and technology stack. The best part? It can be deployed virtually anywhere—on-premises, in a private cloud, or with any major cloud provider like AWS, Azure, or Google Cloud. Get Started in Minutes You don't need to be a security guru to use it. The setup is straightforward, and the value is immediate. Protecting the project, you've worked so hard on is no longer a question of budget. Download: Get the free Community WAF from the HaltDos site. Deploy: Follow the simple instructions to set it up with your web server (it’s compatible with Nginx, Apache, and others). Secure: Watch the dashboard as it begins to inspect your traffic and block threats in real-time. Security is a journey, but it must start somewhere. For developers, startups, and anyone running a web application on a tight budget, a community WAF is the perfect first step. It's powerful, it's easy, and it's completely free.
  • [paper] Evidence of a social evaluation penalty for using AI

    Technology technology
    10
    28 Stimmen
    10 Beiträge
    44 Aufrufe
    vendetta9076@sh.itjust.worksV
    I'm specifically talking about toil when it comes to my job as a software developer. I already know I need an if statement and a for loop all wrapped in a try catch. Rather then spending a couple minutes coding that I have cursor do it for me instantly then fill out the actual code. Or, ive written something in python and it needs to be converted to JavaScript. I can ask Claude to convert it one to one for me and test it, which comes back with either no errors or a very simple error I need to fix. It takes a minute. Instead I could have taken 15min to rewrite it myself and maybe make more mistakes that take longer.
  • 141 Stimmen
    4 Beiträge
    20 Aufrufe
    P
    The topic is more nuanced, all the logs indicate email/password combos that were compromised. While it is possible this is due to a malware infection, it could be something as simple as a phishing website. In this case, credentials are entered but no "malware" was installed. The point being it doesn't look great that someone has ANY compromises... But again, anyone who's used the Internet a bit has some compromised. For example, in a password manager (especially the one on iPhone), you'll often be notified of all your potentially compromised accounts. [image: 7a5e8350-e47e-4d67-b096-e6e470ec7050.jpeg]
  • 552 Stimmen
    30 Beiträge
    72 Aufrufe
    swelter_spark@reddthat.comS
    Yeah, I don't prefer that. But with some things I feel like it's barely a downside, and I'd put Boxes into that category. It's useful and well-designed enough in terms of functionality that I'm willing to overlook the Gnominess.