Advertisements

Archive for the ‘authentication’ Category

Nakamoto Family Foundation

July 7, 2018

Over what now approaches a decade since Satoshi first published the Bitcoin white paper there has been continued speculation of who might be Satoshi. Over time, various people—myself included—have been imagined to be Satoshi for various reasons. Certain would-be Satoshis have made attempts to claim that they are Satoshi. Unfortunately some have even been so persistent in their claims that they have been able to confuse newcomers to the distributed ledger and blockchain space and have been able to get seats on conference panels using these claims. Last week was the most recent version of this with the release of an excerpt from a book that accompanied a website, allegedly in advance of a forthcoming book.

Let me be clear: All of the information that relates to me in this published excerpt from the book can be sourced either from the emails that I published previously in my “I am Not Satoshi” blog post or can be sourced from conversations that I had with Satoshi on public forums in the earliest days of the Bitcoin project. The author does demonstrate some knowledge around software development and debugging in his synthesis of Satoshi and I’s published interactions, but this proves nothing. The excerpt (and presumed forthcoming book) strikes me more like an extremely well researched piece of performance art or first-person fan fiction than any new revelation-containing update or direct claim of the Satoshi identity.

I would also expect the real Satoshi to both be capable of devising and have the desire to publish a much more challenging crypto puzzle than the one accompanying the excerpt on the website.

Unless the real Satoshi has since destroyed the relevant private keys, it should be really straightforward for the real Satoshi—should he/she/they ever decide to go public—to make it absolutely certain that their words are their own: sign a message with Satoshi’s PGP key or presumed early bitcoin key(s). That’s the only proof that I’ll accept, and I advise you to demand the same of anyone’s claim to the Satoshi identity.

The author of this excerpt has not done that, nor has anyone else since the real Satoshi went dark.

Advertisements

ToorCon 12

October 27, 2010

After a two year absence due to unavoidable other obligations like good friends’ weddings, I finally made it back to one of my favorite hacker conferences, Toorcon.  San Diego is always beautiful when I happen to be there with nice weather and a cool mix of people, both locals and visitors who are there for the conference, and this year was no exception.

(more…)

REcon 2010

July 16, 2010

This last weekend I took a trip up to Montreal for REcon.  If you’re unfamiliar with REcon, it’s a small security conference focused on topics most interesting to reverse engineers.  As such, the talks are more technical than you will find at other more mainstream conferences like BlackHat or DEFCON, and generally require a certain level of expertise as a baseline.  If you don’t understand assembly language, you’ll probably not get much out of at least half of the lectures.

(more…)

SmartPhone Unlock Screens: Moving in the Wrong Direction

November 10, 2009

I recently purchased the Motorola Droid from Verizon, and am so far very happy with it.  Other than finding the physical keyboard a bit lacking from being extremely spoiled by the Sidekick’s physical keyboard to which no other physical keyboard could ever hope to live up to, I’ve really had no complaints with the device or the Android 2.0 operating system that runs on it.  I have however, noticed that touch-screen smart-phone unlock screens (not just the Droid’s) are getting progressively less secure.

(more…)