Thanks Fart-box. PM-ed our list!
I built a different version of genpass5268... I'm getting the echos but much more consistent, hence I get keys that are a few points off from yours but they ALL result in the correct answer for example pwd=2aek7%tyw+nt
All these keys give the correct password (it doesn't skip like yours)
557810668266750
1423898784903950054
2847239759139633358
4270580733375316662
5693921707610999966
7117262681846683270
8540603656082366574
9963944630318049878
11387285604553733182
12810626578789416486
Which brings me to the multiplier/divisor/seed. I think I can brute force it, but it'll take years to get to 5 decimal places. With the 589 we can spot the minimum at a 0.1 resolution and can refine it after that to get more decimal places. What is the clever way to do it?
I built a different version of genpass5268... I'm getting the echos but much more consistent, hence I get keys that are a few points off from yours but they ALL result in the correct answer for example pwd=2aek7%tyw+nt
All these keys give the correct password (it doesn't skip like yours)
557810668266750
1423898784903950054
2847239759139633358
4270580733375316662
5693921707610999966
7117262681846683270
8540603656082366574
9963944630318049878
11387285604553733182
12810626578789416486
Which brings me to the multiplier/divisor/seed. I think I can brute force it, but it'll take years to get to 5 decimal places. With the 589 we can spot the minimum at a 0.1 resolution and can refine it after that to get more decimal places. What is the clever way to do it?