forked from madacol/btcrecover
-
Notifications
You must be signed in to change notification settings - Fork 191
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Running BTCrecover from savefile impossibly slow at skipping passwords #325
Comments
Sounds like you are running out of memory, have you enabled no-dupckecks? |
I did enable it. I would copy and paste the original command line, but I
lost that in the original crash. Is there a way to pull it from the
savefile? Running out of memory seems like a reasonable cause, but looking
at process viewer, terminal doesn't seem to have excessive memory use and
memory pressure on the computer is unchanged between the process running
and suspended.
…On Mon, Jan 31, 2022 at 4:26 PM 3rd Iteration ***@***.***> wrote:
Sounds like you are running out of memory, have you enabled no-dupckecks?
—
Reply to this email directly, view it on GitHub
<#325 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AS2CBYHCBPBE7LYT7WTQJRTUY35B3ANCNFSM5NFF3NHQ>
.
Triage notifications on the go with GitHub Mobile for iOS
<https://apps.apple.com/app/apple-store/id1477376905?ct=notification-email&mt=8&pt=524675>
or Android
<https://play.google.com/store/apps/details?id=com.github.android&referrer=utm_campaign%3Dnotification-email%26utm_medium%3Demail%26utm_source%3Dgithub>.
You are receiving this because you authored the thread.Message ID:
***@***.***>
|
The save file just saves all the arguments and a constantly updating --skip command. Uneven skip performance could also be related to the structure of your tokenlist, anchors, etc. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Wallet Type: btcrpass.WalletBlockchain
Wallet difficulty: 5,000 PBKDF2-SHA1 iterations
Starting with password # 1708283059
After initially skipping passwords 200k passwords/sec, slows down to less than half that speed at 150 million and then gets progressively slower as the number skipped gets larger. At 170 million, it's over 10 seconds per 100k skipped. This is on an m1 macbook running Big Sur at python 3.
The text was updated successfully, but these errors were encountered: