Skip to content

Instantly share code, notes, and snippets.

🚀
stacking sats

Steven Miyakawa "SAM" SamSamskies

🚀
stacking sats
Block or report user

Report or block SamSamskies

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
@SamSamskies
SamSamskies / keybase.md
Created Sep 22, 2019
Keybase verification
View keybase.md

Keybase proof

I hereby claim:

  • I am samsamskies on github.
  • I am samsamskies (https://keybase.io/samsamskies) on keybase.
  • I have a public key ASA4rOHq-mqzOR0DTvzU6RcSZ75KorcOFjqCLbeBogQObQo

To claim this, I am signing this object:

@SamSamskies
SamSamskies / leporine.md
Created May 4, 2019 — forked from johncantrell97/leporine.md
How To Obtain The Leporine Key
View leporine.md

Hello again.

I was not the first to find the key this time, props to EnigmaZer0 for this one! After seeing that everyone enjoyed understanding how the first clues were solved I thought I'd provide an explanation for The Leporine Key.

The second clue dropped early afternoon EDT on (easter) Sunday April 21 2019. The clue can be viewed on the satoshis treasure website here and looked like this:


 _____       _            _     _ _       _____
/  ___|     | |          | |   (_| )     |_   _|
@SamSamskies
SamSamskies / satoshistreasure.md
Created Apr 16, 2019 — forked from johncantrell97/satoshistreasure.md
How I Obtained Satoshi's Treasure Keys 1, 2, and 3 in Minutes
View satoshistreasure.md

Today (April 16th 2019 at noon) the first major clues to discover key #1 was set to be released in a few cities. A QR code with the words 'orbital' were found at these locations and looked like this: (https://imgur.com/a/6rNmz7T). If you read the QR code with your phone you will be directed to this url: https://satoshistreasure.xyz/k1

At this URL you are prompted to input a passphrase to decrypt the first shard. An obvious first guess was to try the word 'orbital' from the QR code. Not suprisingly this worked! This reveals a congratulations page and presents the first key shard:

ST-0001-a36e904f9431ff6b18079881a20af2b3403b86b4a6bace5f3a6a47e945b95cce937c415bedaad6c86bb86b59f0b1d137442537a8.

Now, we were supposed to wait until April 17th to get clues from the other cities for keys #2 and #3 but that wouldn't stop me from digging around with all the new information we had. All that time "playing" notpron (http://notpron.org/notpron/) years ago was going to help me here.

The first thing I noticed was

@SamSamskies
SamSamskies / ip-protocol-numbers.json
Last active Jul 23, 2018
IANA list of IP protocol numbers
View ip-protocol-numbers.json
{
"0": {
"keyword": "HOPOPT",
"protocol": "IPv6 Hop-by-Hop Option",
"reference": "[RFC8200]"
},
"1": {
"keyword": "ICMP",
"protocol": "Internet Control Message",
"reference": "[RFC792]"
View Blockstack verification
Verifying my Blockstack ID is secured with the address 14MRKfWcYQiKSe5JhwxsCwQZzA11M6gy6V https://explorer.blockstack.org/address/14MRKfWcYQiKSe5JhwxsCwQZzA11M6gy6V
View csv-to-json.js
var fs = require('fs');
var Converter = require('csvtojson').Converter;
var converter = new Converter({});
var filename = 'FILENAME_WITHOUT_EXTENSION';
converter.transform = function(json) {
// transformation for each row
};
converter.on('end_parsed', function (jsonArray) {
View simple-progress-bar.html
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="utf-8" />
<title>Blank HTML 5 Template</title>
<style>
#progress-bar {
width: 0;
height: 50px;
background-color: black;
View remDups.js
function remDups(arr) {
return arr.reduce((memo, num) => {
if (memo.numMap[num]) return memo;
memo.numMap[num] = true;
memo.noDupArr.push(num);
return memo;
}, { noDupArr: [], numMap: {} }).noDupArr;
}
View sample-print.css
@media print {
* {
background: transparent !important;
color: black !important;
box-shadow: none !important;
text-shadow: none !important;
}
}
View scraper.rb
require 'rubygems'
require 'mechanize'
require 'byebug'
a = Mechanize.new { |agent|
agent.user_agent_alias = 'Mac Safari'
key = 'JSESSIONID'
value = '3a70858e14aca4f6aac9ec59d95d13d86e0b4e755b40b67bb56f96f27fbf05b2.e3qSc3iTc34Oe3iNaO0'
cookie = Mechanize::Cookie.new(key, value)
You can’t perform that action at this time.