Oh my Satoshi
Rumours continue to circulate as to the person who wrote the Bitcoin paper. Occasionally they are directed at self, but they can equally be directed at all the superlative financial cryptographers listed on this site and many others.
Let's take a moment to ask what we are doing here.
*Satoshi Nakamoto chose to do his work in anonymity*.
Or more technically in psuedoanonymity, as someone who claims to be 'anon' leaves no individual name and cannot be connected forward or backwards in time.
He, assuming it is a he, probably had good reasons for this. Which leaves us pondering why we would disrespect those reasons?
We, all of us, in today's Bitcoin world and yesterday's precursors to that world: cypherpunks, crypto, FC, privacy, mobile money, Tor, the Internet in general, ... we all hold privacy as an article of faith. We built the thing to protect people, and protect their privacy.
If Satoshi Nakamoto chose privacy, by what right or motive do we breach that? None.
There is no doctrine that permits anyone out there to arbitrarily strip out someone's privacy and remain one of us. Quite the opposite: our beliefs and existence call for protecting this person.
Indeed, revealing a stated secret of someone is more or less a crime in many contexts. Intelligence agencies can of course spy on whosoever, but they are not allowed to reveal that information (or, so says the doctrine). Police can demand information, but only pursuant to a crime -- probable cause and all that.
Freedom of the press? Public figures are by their nature afforded less 'privacy' because they are public; but they chose that path, and the courts grant the ability of the paparazzi only certain abilities, in line with the public figures' choice of public life. Paparazzi aren't allowed to chase ordinary folk, and Satoshi Nakamoto clearly chose to be out of that game.
Freedom of the press doesn't cut it. Nor does whistleblower status. Nor does 'public interest' as the public has no conceivable benefit to knowing more.
Those people who are digging around trying to strip this person's privacy are doing so because they haven't been called on it. Because they think it is cool. Because they feel intellectually challenged by the use of nyms, and using a nym is a licence to curiosity.
I call you now: what you are doing is wrong.
In some places it is a crime, because breaching privacy presumes there is another crime to follow: theft or fraud or extortion. It's a good presumption. In all civilised places, breaching privacy is an anathema. We all in this business -- save those sad damned souls with 5 eyes -- are working to *protect our community* not single out vulnerable persons and burn them at the stake.
Get you gone, get you out of our community. Anyone who publically reveals anyone else's private information has no common part with us. Anyone who goes on a witchhunt is our enemy. We are not doing all this work to give a few paparazzi a special scoop. To the person who eventually outs Satoshi Nakamoto I say this: the only place you'll be welcome is the NSA. Get ye there, scum.
In the words of that old film, we are all Satoshi Nakamoto.
Posted by iang at December 23, 2013 03:37 AM
The Hidden Dangers of Bitcoin
Published by Stefan Molyneux on 6 Nov 2014
Bitcoin is a revolutionary decentralized architecture which can be used for an untold number of incredibly valuable services – including the transfer of financial value. As Bitcoin adoption continues to expand, significant interests are threatened and early users could face an incredibly dangerous backlash. Please protect yourself, a fight is coming…
The Bitcoin Song
Published by Tatiana Moroz on Jun 2, 2014
This is a live version of the Bitcoin Jingle that will become a full band version on the upcoming album. We have created the first ever artist crypto currency "Tatiana Coin" to fund that record and this song.
Interview with Craig Wright, Cyber Security Expert who trains governments on cyber defense
Published on 2 Jun 2014 by CGTN America
Satoshi Nakamoto - Thank you Bitcoin Community
published by aantonop
on Apr 22, 2014
Dorian Satoshi Nakamoto's message to the bitcoin community, at the conclusion of the Dorian Fundraiser.
Left: Dorian Satoshi Nakamoto
Right: Andreas M. Antonopoulos
Why Bitcoin Must Die. Long Live Bitcoin 2.0.
published by Bill Frezza, Feb 7, 2014
One day, there will be a global digital currency in widespread commercial use whose value will not be controlled by central banks. Governments can forestall this day, as they have for the past 20 years since the first digital currencies were launched, but the market demand for an alternative to inflation-prone fiat money that can be conveniently, securely, and inexpensively exchanged over digital networks will be too strong to resist. Alas, the currency described above will not be Bitcoin, at least not in its current configuration.
Why not today’s Bitcoin? Because the digital currency of the future must choose between two mutually exclusive paths. It can either be anonymous, enabling black market transactions in the shadow economy, or it can be fully compliant with the growing body of know your customer, anti-money laundering laws that constrain global financial markets. A single digital currency cannot do both.
Keynote: Mike Hearn, Bitcoin Core Developer
Mike Hearnshows a critical view of the development process behind bitcoin. Only 10 people make the bitcoin software core. This is done in a non sustainable way and needs to change.
Published by Dutch Blockchain Conference on 24 May 2014
The incredible career of Craig Steven Wright — the Australian scientist who claims he created Bitcoin
In the early 1990s, long before he was suspected of being the elusive creator of the cryptocurrency Bitcoin, Brisbane-raised Craig Steven Wright worked as a saute chef, having trained in French cuisine.
He specialised in game meats and spent three years working with a catering company according to his lengthy and remarkable LinkedIn profile.
In addition to his consulting engagements he is also named as an author of several books and articles on digital forensics.
Dr Craig Steven Wright’s first PhD was in theology, achieved in 2003 with a dissertation titled “Gnarled roots of a creation theory”.
In November 1997, he launched a Sydney-based company DeMorgan, apparently named after Augustus De Morgan, a 19th century British mathematician and logician.
DeMorgan is described as “a pre-IPO Australian listed company focused on alternative currency, next generation banking and reputational and educational products with a focus on security and creating a simple user experience”.
The business has more than a dozen companies focussed on crypto-currency under its umbrella, including his proposed bank, Denariuz, while others are directed towards online education.
Bitcoin May Be the Global Economy's Last Safe Haven
The anarchist virtual currency may be a hoax. It could also be the global economy’s last safe haven
by Paul Ford, March 28, 2013
"The Internet is a big fan of the worst-possible-thing. Many people thought Twitter was the worst possible way for people to communicate, little more than discourse abbreviated into tiny little chunks; Facebook was a horrible way to experience human relationships, commodifying them into a list of friends whom one pokes. The Arab Spring changed the story somewhat. (BuzzFeed is another example - let them eat cat pictures.) One recipe for Internet success seems to be this: Start at the bottom, at the most awful, ridiculous, essential idea, and own it. Promote it breathlessly, until you’re acquired or you take over the world. Bitcoin is playing out in a similar way. It asks its users to forget about central banking in the same way Steve Jobs asked iPhone users to forget about the mouse."
Why the blocksize limit keeps Bitcoin free and decentralized
Published by Keep Bitcoin Free! on 16 May 2013
The blocksize limit is what ensures everyone can participate in the Bitcoin network, and it ensures everyone can participate anonymously should they choose too. Some people want to remove this protection to make Bitcoin scale, but we can have the best of both worlds: high transaction volume and true decentralization with off-chain transactions. Learn more at http://keepbitcoinfree.org
Hotwire PE Group
Founded in 2013
Our mission is to lead the development of technologies that will reinvent the internet, one transaction at a time
Hotwire PE is creating systems that merge the benefits of traditional banking and finance with payment technologies of the future.
Craig Steven Wright
Chief Executive Officer
September 2014 – Present (1 year 4 months)
DeMorgan is a pre-IPO Australian listed company focused on alternative currency, next generation banking and reputational and educational products with a focus on security and creating a simple user experience.
We control the following companies:
• Panopticrypt Pty Ltd
• Cloudcroft Pty Ltd
• Coin-Exch Pty Ltd
• C01N Pty Ltd
• CHAOS AND NONLINEAR FORECASTABILITY IN ECONOMICS AND FINANCE PTY. LTD.
• DASO Pty Ltd
• Denariuz Pty Ltd
• Denariuz Pte Ltd (Singapore)
• EzAs Pty Ltd
• Integyrz Pty Ltd
• DeMorgan Ltd (Panama)
• Pholus Pty Ltd
• Zuhl Pty Ltd
• Zuhl Corp Ltd (USA)
• Misfit Games Pty Ltd
• Denariuz Ltd (UK)
Our group of companies has received a series of Advance Findings from AusIndustry around the two HPC systems we run and the AI and machine learning activities we conduct. In total, we have received Core Technology and Advance Finding certificates for 110 million in research activities.
In the six years since the first company in the group started, we have completed several Bitcoin based research projects that have lasted over and are now ready to start commercialising.
“Craig is a little bit crazy, as in Orville & Wilbur Wright craziness of deciding to add an engine to a glider. … a true visionary”.
Steven Lipke, employee at Hotwire PE
Dave Kleiman - RIP (1967 - 2013)
Published by Craig Wright on Apr 29, 2013
Daniel Larimer - CEO, Invictus Innovations Introduces BitShares
Published on Oct 20, 2013
Satoshi Nakamoto is (probably) Nick Szabo
Published by Dec 1, 2013 by LikeInAMirror
Craig Steven Wright
Chief Executive Officer
Hotwire Pre-Emptive Intelligence Group
The world grows through change and knowledge. To thrive, people need to develop wisdom in a social web. To enable this, we must look ahead, understand the trends and forces that will shape society and business in the future and move swiftly to prepare people for what's to come. We will help the world to get ready for tomorrow today. That's what our 2020 Vision is all about. It creates a long-term destination for our business and provides us with a "Roadmap" for winning together with our community and the society we will help to foster through trust and assurance.
Our Roadmap starts with our mission, which is enduring. It declares our purpose as a company and serves as the standard against which we weigh our actions and decisions.
• To make the world wiser and better...
• To inspire enduring optimism and trust...
• To create value and make a difference.
Hotwiring the world
The world grows through change and knowledge. To thrive, people need to develop wisdom in a social web. To enable this, Hotwire PE must look ahead, understand the trends and forces that will shape society and business in the future and move swiftly to prepare people for what's to come. We will help the world to get ready for tomorrow today. That's what our 2020 Vision is all about. It creates a long-term destination for our business and provides us with a "Roadmap" for winning together with our community and the society we will help to foster through trust and assurance.
CRAIG STEVEN WRIGHT
SENIOR MANAGEMENT EXECUTIVE INFORMATION SECURITY SPECIALIST
► CTO / CIO / CISO /CSO
Multi-certified Expert in Enterprise Security and Cloud Strategies
If you want to sell me SEO, look at what I do first.
Respected executive and technology leader delivering proven ability to capitalize on enterprise-level technologies and pioneering strategies. A sought-after internationally recognized author and public speaker, delivering solutions to government and corporate departments in SCADA security, Cyber Security and Cyber Defense, as well as leading the uptake of IPv6 and Cloud technologies. Drives innovative strategies that result in the strategic redevelopment and invigoration of both startups and established firms. Futurist, thought leader and expert with proven innovation in program leadership, execution design and strategic redevelopment.
► Technology Leadership Results
Trusted member of senior executive team driving results driven innovation focused strategies that take core business competencies and deliver profitable client centric results and growth.
► Centre of Excellence Leader delivering to government and corporate clients pathways to IPv6 and secure cloud based solutions.
► Led the migration of a new core banking platform based on .Net and cloud technologies delivering a forward client centered banking platform.
► Oversight and governance in the profitable management of a $5 billion financial trust.
Distinguished by designing the security architecture and environment for Lasseter’s On-Line Casino allowing approval by the NT Government for the first online gaming license globally.
Developed board level security policies and procedural practices within Mahindra and Mahindra, India’s largest vehicle manufacturer. The Mahindra group employee over 50,000 people in total and has numerous business interests from Car to Tractor manufacture, through to IT outsourcing.
The Global Intelligence Files
The Bitcoin currency
On Monday February 27th, 2012, WikiLeaks began publishing The Global Intelligence Files, over five million e-mails from the Texas headquartered "global intelligence" company Stratfor. The e-mails date between July 2004 and late December 2011. They reveal the inner workings of a company that fronts as an intelligence publisher, but provides confidential intelligence services to large corporations, such as Bhopal's Dow Chemical Co., Lockheed Martin, Northrop Grumman, Raytheon and government agencies, including the US Department of Homeland Security, the US Marines and the US Defence Intelligence Agency. The emails show Stratfor's web of informers, pay-off structure, payment laundering techniques and psychological methods.
Bernhard von Nothaus, Monetary Architect of the Liberty Dollar
Rare Interview with Visionary Bernhard von Nothaus. The Monetary Architect of the Liberty Dollar was charged and found guilty of federal crimes for "making, possessing, and selling his own currency"
The Byzantine Generals' Problem
A number of Byzantine Generals each have a computer and want to attack the King's wi-fi by brute forcing the password, which they've learned is a certain number of characters in length. Once they stimulate the network to generate a packet, they must crack the password within a limited time to break in and erase the logs, lest they be discovered. They only have enough CPU power to crack it fast enough if a majority of them attack at the same time.
They don't particularly care when the attack will be, just that they agree. It has been decided that anyone who feels like it will announce an attack time, which we'll call the "plan", and whatever plan is heard first will be the official plan. The problem is that the network is not instantaneous, and if two generals announce different plans at close to the same time, some may hear one first and others hear the other first.
They use a proof-of-work chain to solve the problem. Once each general receives whatever plan he hears first, he sets his computer to solve a difficult hash-based proof-of-work problem that includes the plan in its hash. The proof-of-work is difficult enough that with all of them working at once, it's expected to take 10 minutes before one of them finds a solution and broadcasts it to the network. Once received, everyone adjusts the hash in their proof-of-work computation to include the first solution, so that when they find the next proof-of-work, it chains after the first one. If anyone was working on a different plan, they switch to this one, because its proof-of-work chain is now longer.
After about two hours, the plan should be hashed by a chain of 12 proofs-of-work. Every general, just by verifying the difficulty of the proof-of-work chain, can estimate how much parallel CPU power per hour was expended on it and see that it must have required the majority of the computers to produce in the allotted time. At the least, most of them had to have seen the plan, since the proof-of-work is proof that they worked on it. If the CPU power exhibited by the proof-of-work is sufficient to crack the password, they can safely attack at the agreed time.
Original from bitcoin.org