Is there any tutorial on how to use rana? I was working on a Python script to mine keys but itās probably terribly inefficient in comparison š
Discussion
Iām using a m1 MacBook and it did a pow34 in about 24 hours - and it actually gave me a pow36! I can probably answer questions on the rana usage if you wanna ask.
Thoughts on public key PoW as one measure for spam deterrence?
Donāt like that it potentially forces you to migrate to a new key if the difficulty increases. How about posting notes which attach a piece of PoW to the key you already have?
Donāt think Iāll increase the PoW requirement any time soon. Itās a good deterrent as-is. The reason the relay has pow32 in the name should serve as an indication of that.
Nevertheless, Iām playing with other ideas to allow standard pubkeys from accessing the relay with other means of PoW: Satoshiās.
Iām counting 39 zero bits actually⦠I guess Rana doesnāt report the zeroes of the first non-zero nibble?
https://github.com/grunch/rana
I installed it via cargo.
Then simply:
rana --vanity-n=myvanity
"myvanity" can be textual or traditional pow (zeros)
Thanks! And āmyvanityā is for the bech32 encoding, so limited to that char set? Has anyone done the math on the probability of mining one with a vanity prefix of length N?
That notebook I posted above also has some simple functions for predicting probabilities/times based on hashrate
FYI here is how I installed approached it in python. You may be able to pip install this, but I might still need to add a couple pip dependencies.
It was a bit slower than some numbers Iāve seen from rana, but Iām running on a 2015 MacBook. Want to run some testing soon.
https://github.com/armstrys/nostrfastr/blob/main/nbs/04_vanity.ipynb