Is there any tutorial on how to use rana? I was working on a Python script to mine keys but it’s probably terribly inefficient in comparison šŸ˜‚

Reply to this note

Please Login to reply.

Discussion

I’m using a m1 MacBook and it did a pow34 in about 24 hours - and it actually gave me a pow36! I can probably answer questions on the rana usage if you wanna ask.

Thoughts on public key PoW as one measure for spam deterrence?

Don’t like that it potentially forces you to migrate to a new key if the difficulty increases. How about posting notes which attach a piece of PoW to the key you already have?

Don’t think I’ll increase the PoW requirement any time soon. It’s a good deterrent as-is. The reason the relay has pow32 in the name should serve as an indication of that.

Nevertheless, I’m playing with other ideas to allow standard pubkeys from accessing the relay with other means of PoW: Satoshi’s.

Where can I learn about the raw probability of and computational resources required to generate POW of N length?

also curious on this front. I'll put in 1000 sats per good link

Same =D

I’m counting 39 zero bits actually… I guess Rana doesn’t report the zeroes of the first non-zero nibble?

https://github.com/grunch/rana

I installed it via cargo.

Then simply:

rana --vanity-n=myvanity

"myvanity" can be textual or traditional pow (zeros)

Thanks! And ā€œmyvanityā€ is for the bech32 encoding, so limited to that char set? Has anyone done the math on the probability of mining one with a vanity prefix of length N?

That notebook I posted above also has some simple functions for predicting probabilities/times based on hashrate

FYI here is how I installed approached it in python. You may be able to pip install this, but I might still need to add a couple pip dependencies.

It was a bit slower than some numbers I’ve seen from rana, but I’m running on a 2015 MacBook. Want to run some testing soon.

https://github.com/armstrys/nostrfastr/blob/main/nbs/04_vanity.ipynb