A Short Human-Verifiable Proof that Craig Wright has Cheated the Press

Hours after his TV interview and his coming out in The Economist and elsewhere, I can confirm beyond reasonable doubt that Craig Wright (CW) has cheated us about his ability to sign messages with Satoshi’s private key. Here is a short executive summary of facts guaranteed to be 100% exact.This is also a short and …

Continue reading ‘A Short Human-Verifiable Proof that Craig Wright has Cheated the Press’ »

Is Satoshi Nakamoto Back?

Today the Economist publishes a picture of Craig Wright, who decided to confirm and embrace the claim that he is the mysterious creator of bitcoin, Satoshi Nakamoto. The picture and the paper portrays a sad man who is badly struggling “to convince the world that he is indeed who he claims to be”. He also …

Continue reading ‘Is Satoshi Nakamoto Back?’ »

On Forces of Self-Destruction in Bitcoin

I have worked for several years in bitcoin community. In May 2014 I have published a paper in which I formulated the theory of programmed self-destruction of crypto currency.   Few points about this My conclusion was that many crypto currencies were genetically programmed or bound to self-destruct. This is absolutely certain. Not because they were …

Continue reading ‘On Forces of Self-Destruction in Bitcoin’ »

RNG – Do Not Stop Worrying About Linux urandom

I have spend a few recent days at 2015 CCC congress in Hamburg. CCC is the biggest security conference in Europe with 12,000 participants, and potentially more [tickets were sold out]. Most talks I have attended were really good! 90% are really excellent. CCC is IMHO also the best security conference in Europe. A place like …

Continue reading ‘RNG – Do Not Stop Worrying About Linux urandom’ »

Stop Using Passwords, Now!

Edward Lucas wrote a nice piece on how businesses can dramatically improve their cyber-security. He says that: “Well-run organisations will stop using passwords and logins in 2016. Instead they will use identifiers that are harder to copy, fake, steal or guess […] Security questions will stop being […] “mother’s maiden name”. Instead they will ask …

Continue reading ‘Stop Using Passwords, Now!’ »

How Islamic State Terrorists Encrypt Their Messages

      According to BBC and many other sources, islamic state terrorists use a messaging app called Telegram to encrypt communications for groups of users. On the surface, Telegram developers seem to support high security standards: they have published the spec and API and funded in November 2014 a handsome 300,000 USD cash prize for cracking …

Continue reading ‘How Islamic State Terrorists Encrypt Their Messages’ »

Criminals Exploit Lack Of Knowledge of How Bitcoin Works

A so called Bitcoin Generator Tool v.2.9 have been released today (Sat 3 Oct 2015) and already 260 downloads within a few hours! It is a ZIP file which claims that it performs full access on the Bitcoin central SQL database and allows one to add bitcoins to his account. Needless to say there is no such …

Continue reading ‘Criminals Exploit Lack Of Knowledge of How Bitcoin Works’ »

Is Bitcoin Going to Split in Two?

Two prominent bitcoin gurus Gavin Andresen and Mike Hearn decided to release their own software distribution of bitcoin and ALTER the specification of bitcoin! There will be a possibility to mine blocks with a new version number and new rules. This is meant to make bitcoin more democratic: larger blocks, more transactions per second, lower fees, wider …

Continue reading ‘Is Bitcoin Going to Split in Two?’ »

Trojanized TrueCrypt Software

Open source security software also helps criminals. For example TrueCrypt being free and easy to modify has lowered entry barriers for establishing criminal and cyber-espionnage operations (the same applies, well to Bitcoin software!). Example: Operation Potato Express. A fully functional clone of TrueCrypt was since at least 2011 distributed from Russian web sites such as …

Continue reading ‘Trojanized TrueCrypt Software’ »