I used to be trying on the historical past of BTCPuzzle, and it seems that two wallets that solved the puzzles didn’t obtain their award as a result of it was “intercepted”.
I do not know what this implies or the way it may presumably work. Right here is the hyperlink the place I noticed this.
And right here is the precise textual content:
2024-09-12
Puzzle #66 (6.6 BTC) was solved by 1Jvv4y (tx1) however the authentic spending transaction was changed by bc1qpk (tx2) spending solely 5.94 BTC. Lastly, one other deal with 15XVN6 took the remainder of the prize: 0.66 BTC (tx3).
2025-02-21
Puzzle #67 (6.7 BTC) was solved by bc1qfk and the transaction was mined bypassing the general public mempool to keep away from interception as within the case of puzzle #66.
2025-04-06
Puzzle #68 (6.8 BTC) was solved by bc1qfw and the transaction was mined bypassing the general public mempool to keep away from interception as within the case of puzzle #66.
2025-04-30
Puzzle #69 (6.9 BTC) was solved by bc1qlp in lower than one month, probably because of its place on the very starting of the search vary (0.72%). Nonetheless, the unique transaction (tx1) was publicly broadcast, resulting in it being changed a number of instances (tx2, tx3). Finally, 15g7XH managed to steal the prize (tx4).
The thought of transactions being merely intercepted and rerouted is insanity. Did the attackers in a short time re-compute the non-public key in some way, the second the transaction entered the mempool? What the hell is occurring right here?

