Scammers are very sly - can you spot the difference between the real https://www.cryptopia.co.nz and the fake https://www.cryptopía.co.nz ? Click on them and see the difference. Often users think that their accounts are getting hacked or the exchange has been compromised. This is usually not the case. Most of the time users have been the victim of a phishing scam. Some quite basic but often quite sophisticated. Some exchanges do not have a phone app - MOST advertised apps are scams Be extremely careful clicking links from search engines - popular search engines like Google and Bing have scam sites listed. Most exchanges do not have a support phone number - phone numbers advertised on third party sites or forums are usually scams Official Twitter accounts are often spoofed - Make sure the twitter account is REAL and not a scammers CLONE. Differences are often very subtle. Cryptopia does NOT have 2FA via SMS - this is a scam Exchanges send emails using their registered domain - anything else is a scam. BinanceSupport@gmail.com is not real. Also make sure that the email is not spoofed - it may look like the genuine sender. Don't click on links in emails. BOTs are great but also carry risk - If you use a BOT you may get scammed. Free BOTs are often a scam. Exchange staff will NEVER ask for your password or 2FA - if you give it to someone you will get scammed The ONLY safe way to resolve a support issue is through a support ticket on the site you have the problem with. Social media and forum help is unable to be safely verified. - You won't know for sure if they are staff or a scammer. Social media accounts have been hacked and fake accounts have been verified by twitter. People need to take more security precautions: Use google Authenticator or alternative DYNAMIC 2FA. Use an email account with 2FA enabled and used the highest security settings that is not used for anything other than the exchange. (gmail or protonmail) Do not use apps on your phone if you use your phone for Crypto or the crypto email. Scam apps target crypto users. Other apps on your phone can compromise the security of your phone. Do not have Crypto wallets on the computer you use for account access. BEWARE : Some coin personal wallets contain viruses and keystroke loggers that may steal the information from your computer. Have a firewall, anti virus and anti malware from a reputable provider. Do not click on links from seach engines or other sites to go to your exchange. Always check the site security certificate. Do not use bots unless you are 100% certain the bot is safe. Limit bot access to your funds by having multiple accounts. Most advertised bots are scams and will steal your crypto. Only get your bot from a reputable vendor. Avoid WIFI - public wifi and unsecured WIFI is very unsafe. All WIFI is vulnerable. Do not log onto and exchange with computers you don't own or have full control over. NEVER EVER give your password or 2FA to someone else. Use different email addresses and different passwords for different exchanges. Scammers are now using DODGY security certificates. Make sure the security certificate is from the correct certifier. TROJAN ALERT: https://www.bleepingcomputer.com/news/security/evrial-trojan-switches-bitcoin-addresses-copied-to-windows-clipboard/ is a trojan virus which changes any cryptocurrency address that is on your clipboard to a different address - ALWAYS take care to ensure the address that has been entered is the one you're intending to send to. Using a pin for 2FA is not recommended. It is easy for a hacker to use a keystroke logger on your computer to gain access to your password and pincode. Some recent coin wallets have had keystroke loggers and viruses built into them. For this reason you should never have coinwallets on the computer you use to access an exchange. An exchange has no way of identifying a thief if they use valid logon credentials. It is like when your bank card AND PIN have been stolen - the ATM or bank is not at fault. If you visit a scam site that looks like your exchange you are giving the scammer your email address, password and 2FA That is not hacking - it is known as phishing. The exchange has no way of knowing that a scammer has all your VALID login cerdentials because YOU have accidentally given it to them. For this reason you should take extreme care in keeping your logon credentials safe. For extra security use a unique email address that you only use for only one exchange. Have 2FA enabled on that email addres as well. SMS reset or SMS for 2FA is not particularly safe. https://haveibeenpwned.com/ You can check here if your email address has been compromised by a previous hack. Unfortunately if your account has been phished the scammers remove the funds within a few minutes. (Unless your withdrawal limit prevents them for doing this). All phishing attacks should be reported to the police. https://chrome.google.com/webstore/detail/metamask/nkbihfbeogaeaoehlefnkodbefgpgknn Metamask chrome (also available for firefox) can warn you about phishing sites. IMPORTANT: If your email has been hacked or you have been phished please make a support ticket immediately. Change your password and 2FA immediately on your exchange account AND your change the email address you use for the exchange. A great 'one stop shop' for everything you need to ensure your account has security wise: EDIT: Added image: Source: Scammers spoofing cryptocurrency exchangesMy earlier post on another forum
|
|
|
Bittrex, Binance, Bitfinex, Coinexchange.io, Coinhako, Coinpayments, Cryptopia, Exodus, Kucoin, Koinex, Ledger, Liqui, SimplexFX , Bithumb and Huobi all don't accept smart contracts. (Incomplete list). What makes it particularly awkward is that some exchanges like Bitstamp, Coinmama and Lykke send withdrawals as smart contract payments. Bitstamps has the following warning when you send Ethereum. WARNING: Do not send funds directly to exchanges which do not support smart contract deposits. Either check with the destination exchange first or send your funds to your private wallet.
A lot of exchanges warn: Deposits from contracts currently unsupported.
It avoids problems if you send smart contract payments to MEW or a personal wallet and then to an exchange. It will reach the other exchange but cannot be processed by them. Some exchanges will manually recover it. Some exchanges will charge a fee for manual recovery and some exchanges won't recover it. A lot of exchanges do not accept smart contracts. There are good reasons for this.With a NORMAL transaction the ETH is sent from the senders address via the blockchain to the receiver address. With a SMART CONTRACT a 0 ETH transaction with instructions (code) is sent to the CONTRACT address. The contract address then executes a internal transaction (code) to the receiver address. Smart contracts also don't have just a single way it can be coded - or by who. A smart contract is custom code. Smart contracts can be vulnerable for exploits: Smart contracts leave millions vulnerable Security Vulnerabilities in Smart Contracts Smart contract exploit trainingNORMAL transaction and how it appears on the block explorer SMART CONTRACT transaction and how it appears on the block explorer It avoids problems if you send smart contract payments to MEW or a personal wallet and then to an exchange.
|
|
|
Waddafunk! I am replying here to say that I nearly fell for it, had no clue about this bomb in the Ethereum Foundation. I think I got saved by insufficient gas! Having said that, what is the point of running an ETH exchange and not support a central ETH feature! Damn cryptokitties and damn these exchanges
Due to the way smart contracts work and the way most exchange APIs work there is a risk in accepting payments from smart contracts. Smart contracts are not without risk. There is also no universal standard as to the code of a smart contract https://www.bleepingcomputer.com/news/cryptocurrency/researchers-find-34-200-vulnerable-ethereum-smart-contracts/
|
|
|
Hello, I have one account on cryptopia since 6 months, and impossible to make a withdraw. I sent 15 email since 4 months, only 2 useless answers. - I connect me with 2 FA. - When i try to withdraw: it asks me a PIN code. My 2FA doesn't work. - In security settings: I have "pin number" in "withdraw 2 factor". When I click on "remove 2 factor", it asks me pin code! I can't change. And the support says me to this manipulation. Very funny.
Questions: what's the pin code? How can i withdraw?
I'm in crypto-currency since 3 years, first time I see that.
Thanks
The pincode is what you selected when you signed up. You can request a 2FA reset. If you cannot access your account and need to reset your 2FA, Cryptopia Support Team will need to assist you. Please, send an email to support@cryptopia.co.nz and they will be able to help you reset your 2FA. Otherwise you need to make a support ticket and ask to reset your 2FA. In your email, to enable them to verify that you are the account owner, please, provide them with a minimum of three records of your account information from the list below: Recent deposits Withdrawals and trades Your balances Wallet address Payment IDs Tx ID’s Login dates IP address Registration date https://support.cryptopia.co.nz/csm?id=kb_article&sys_id=e6065021dbed1f009990f6fcbf96195a
|
|
|
--snip--
Prior to this Cryptography was a military secret.
Beg you pardon but... https://en.wikipedia.org/wiki/Caesar_cipherand it has been used in business for many centuries. Why do people tend to think that the world was born with them? You are probably pointing to the fact that "encryption" was well known and not so much a military secret. Encryption achieved by mechanical methods or simple juggling techniques surely existed but the techniques of cryptography in electronic communication is something that wasn't publicly known. If a method could be intercepted, it could be interpreted. A lot of millitary research and early computer development revolved around the coding and code-breaking of war messages. Enigma and Alan Turing come to mind. These techniques evolved much more and were pretty much secret till the cypherpunk movement decided that normal individuals should have access to privacy and encryption techniques which would be as powerful as those employed by the government agencies. paxmao and amishmanish Thank you for pointing this out. I've updated the post to reflect your corrections. I've also added a link to a great post by subvolatil
|
|
|
https://youtu.be/NCRh6zzWnVY Craig Wright interview. Craig Wright is not Satoshi. He has a temper that would have shown at some stage of the writings. I think he and Dave Kleiman have mined a lot of blocks but I think he has lied to the estate. In my opinion his evasiveness, temper and broken promises are classic signs that he doesn't have the evidence to back up his claims and is not telling the full truth. Even if Kleiman was Satoshi - I don't think Wright has got the private keys. A lot of the claims made by Wright were made in 2011 before people were actively tracking bitcoin addresses and a lot of his claims are demonstratively false. Technically it doesn't matter whether you defraud for $1 million or $1 billion - the punishment is the same. The notoriety is more if it is for $1 billion. I'd love to see some more emails written by Kleiman. That Wizsec article also doesn't believe Craigs stories. https://blog.wizsec.jp/2018/02/kleiman-v-craig-wright-bitcoins.htmlWright claimed AU$54 million in tax rebates for R&D in 2014/15. That is a lot of motive for a hoax. https://www.businessinsider.com.au/the-australian-who-may-have-invented-bitcoin-claimed-to-have-landed-54m-in-taxpayer-funded-rebates-2015-12Wrights own mother claims he has a habit of lying: http://archive.is/kjuLi#selection-1655.0-1655.94Craig Wrights MtGox account also is not that of a "whale" https://np.reddit.com/r/Bitcoin/comments/4hx3q9/according_to_the_mtgox_leaks_from_early_2014_our/Wright also claimed to have a PhD in computer science with Sydney's Charles Sturt University (CSU). But the university denied ever handing him a Phd. Satoshi definitely deserves his privacy. He gifted us Bitcoin, and if he wants to remain anonymous, he should! Besides, I'm pretty sure a few governments would like to have a talk with him if he was identified...
Even if I knew who he or she was I wouldn't out them publicly. But speculation will never stop. But I'd hate it if a fraud is identified as the real Satoshi. This thread is a consolidation of all the theories. Logical, imagined and just plain goofy. While their identity may never be known, Satoshis writing is his real legacy.
|
|
|
Thank to OP for putting such an enormous effort to put together this thread. However, I believe the community respects Mr. Nakamoto for his invention but they are not interested to know who the person really is! Because bitcoin is a revolution and for every revolution to take shape and to shake the world, the propagator must stay safe! Otherwise the revolution is bound to fail. If, by any chance his real identity is established, do you think the enforcement agencies will let him live his life peacefully?
Can we reach a consensus here to stop finding who the Satoshi Nakamoto is and let him live his life peacefully?? He needs respect and not the investigation on his real identity!
That is also my viewpoint. I rather not know. I think the mystery makes it more intriguing. Some legends are better as legends. Like Merlin and Robin Hood.It is better to focus on his writing rather than his identity. It is quite obvious that he was very concerned about privacy. His association with the cypherpunks proves he was deeply concerned about privacy. There are also some other very smart people who were involved in the creation of bitcoin and some of them lurk on bitcointalk. It is also quite possible and quite likely that he was involved in Government level work and divulging his identity might have caused serious issues for him.
|
|
|
Afgelopen dagen gaat er wel een gerucht in de rondte dat Cryptopia mogelijk is gehacked/compromised. Trade met caution dus.
Nee niet compremised. Ze hebben hun 2FA verandered. 2FA probleem
|
|
|
My current portfolio is: -60% in real-estates -10% in banks and precious metals -30% in crypto-currencies
Each portfolio needs to be based on its own merits and risks assessed. I don't think there is a magic formula. Only time will tell. In the US Housing prices peaked in early 2006, started to decline in 2006 and 2007, and reached new lows in 2012. 1890s Australian banking crisis. Population contracted by 12% and the Melbourne property market fell 51%. It took the market 19 years to return to its peak of 1889. Sydney’s property market also fell, but by the smaller amount of 36%. Property that is unable to be rented out (still have to pay real estate based taxes) or has a value below the mortgage value is a liability. Property that is able to grow food or firewood in a crisis can be an asset. The Greek government extended bank closures and a €60 (£43; $66) daily limit on ATM withdrawals. Banks can close and money in banks can be lost in an financial crisis. A lot of people lost their savings. Cash can be subject to hyperinflation in a financial crisis but it can also be useful in a natural disaster. Executive Order 6102. Executive Order 6102 is a United States presidential executive order signed on April 5, 1933, by President Franklin D. Roosevelt "forbidding the Hoarding of gold coin, gold bullion, and gold certificates within the continental United States". Untraceable bullion can be hoarded and used (illegally) on the black market when such regulations are made. Crypto currencies won't work well in a solar flare, cyber war, power crisis, major internet infrastructure damage etc. Crypto can potentially be very profitable.
|
|
|
Some more less likely theories: Satoshis missing posts: Here are those posts of his from the Staff forum that may be interesting. I'll paraphrase non-Satoshi posts where necessary for the posts to make sense. Note that he never actually said "bitcointalk.org" -- this appears due to automatic text substitution by the board. I left the admin account set to the original SMF theme so if I somehow completely wedge the custom theme I can still get in to fix it.
I've got a neat little 12x12 coin image to replace those pip stars with. Should look nice. Also some nice button images to try.
The registration page has "hide your e-mail address" unchecked by default. I must fix that in php before we can open up.
The Announcements forum is currently moderator access only.
12x12 coin for pip stars done.
Registration page "hide your e-mail address" checked by default done, haven't tested it yet.
Sirius: Let's get a proper SSL certificate I think I could receive @bitcoin.org, but I'd rather procrastinate on this and work on other things first. Is there a reason we need this sooner?
Sirius: All internal links are pointing to https, so everyone always gets an SSL warning. I didn't know all the forum links point to https. I always use https so I wouldn't have noticed. SMF is supposed to detect and give you the same as what you've got. If you're on an http page, then all the links should also be http. If that's not working then I need to fix it.
OK, the problem was that $boardurl was switched to https://www.bitcoin.org/smf again. It's supposed to be http://bitcointalk.org and the software will replace http with https as needed. It always assumes the base $boardurl is http. It can't switch it in the other direction. $boardurl is "Forum URL" under: Under Admin->Server Settings->Core Configuration The cause of the problem is that the default fill-in for "Forum URL" is the cooked $boardurl, with https in it. So, if you are logged in with https, it fills it in with https, so if you submit that page as is, you change it to https. It's an accident waiting to happen if you ever submit that page without changing the https to http each time, that happens. I switched it back to http, please doublecheck that all the links are now http if you're using the forum as http. I don't have time to fix the admin page right now so it's not an accident waiting to happen. It would be nice if the forum could be at www.bitcoin.org/forum/ instead of www.bitcoin.org/smf/ but that's a whole nother thing. Would you be in favour of that change? If we want to do that, I should do it because I already know where all the path settings are and how to do it, since I had to figure all this stuff out the first time there was the Forum URL https/http problem. There are other urls under Admin->Themes and Layout. I think if a mirror directory forum -> smf was created, it would be possible to change the urls in the admin interface without the forum software stopping working. Is there any reason to have e-mail confirmation?
If you're doing that out of spam concerns, I've already got that covered. I made some customizations to the registration HTML so any spambots designed for SMF won't be able to figure it out. The CAPTCHA image URL requires an extra parameter, and there are 3 different CAPTCHA images, but only one shows because the others have stuff like width=0 height=0.
Twice I've seen reports of Live Protection causing initial block download to stall out early. http://bitcointalk.org/index.php?topic=305Just brainstorming here how this could happen. Someone saying they got 513 or 1001 blocks before it stalled, yet they report having 10 connections. The person had port forwarding, and must have since this is Windows and outbound from windows is limited to 8, and they had 10 connections. With port forwarding usually you'd have more than 10, but if IRC was blocked, I could see how inbound would be a lot more limited like 10. Seems like Live Protection is allowing connections to be made, but keeping them silent. Or maybe only allowing a little data to go out but not much, which is strange. Maybe it doesn't want to block outbound requests like browser page requests, which are less than 1K or so, but it wants to shut down large data transfer, so it stops it after just a little bit of data like the size of a URL. If IRC is blocked, you typically do get like 501 or 5?? or 1001 blocks at first from the seed node. You connect to a seed node, get the address list, then disconnect from the seed node but it usually slips in one or two block requests before the disconnect, hence around 500 or 1000 blocks. If Live Protection zombies all further connections, that would give the result the guy got. Maybe it zombies all inbound connections, and after the first seed node, the inbound connections came and gave him 10 connections so he didn't connect outward anymore, so it's all inbound connections. That seems to fit what happened the best. IRC blocked by Live Protection. The node connects to a seed node, gets roughly 500 or 1000 blocks, broadcasts inbound IP address to the net, disconnects seed node, doesn't get any more outbound connections before the inbound connections give him 10 connections and it stops looking for outbound. Now all his connections are inbound, and maybe Live Protection zombies the inbound, letting them connect but not letting any data through (or only one direction). He doesn't get the usual 50 or so connections because he's not visible on IRC. I still don't see a pegged thread about Microsoft Security Essentials Live Protection. Someone needs to write a thread telling people if they have Microsoft Security Essentials how to exempt or whatever bitcoin.exe and pin it ASAP. I'm really busy, surely someone else can do this?!! I'm adding this to the readme.txt of the 0.3.1 release: If you have Microsoft Security Essentials, you need to add bitcoin.exe to its "Excluded Processes" list. Kind of a blind guess because I don't have it so I can't look exactly what it says, but going on what others have said. Here's another case: http://bitcointalk.org/index.php?topic=323.0I used that link to write the following in the readme.txt:
If you have Microsoft Security Essentials, you need to add bitcoin.exe to its "Excluded processes" list. Microsoft Security Essentials->Settings tab, select Excluded processes, press Add, select bitcoin.exe, OK, Save changes.
Is there anything else we should do? Maybe a link on the lower part of the homepage like "If you have Microsoft Security Essentials, see these instructions to add bitcoin.exe to the Excluded processes list."
You shouldn't chat in the #bitcoin room.
Do you think it'll gravitate toward #bitcoin-dev on freenode or lfnet? freenode's the better choice because you may get noticed by other people on freenode.
Does anyone want to take over management of the .po files?
You would monitor the translation forum when translators come along with .po files.
The job is basically what I've been doing with them, which includes editing the .po file as a text file to fix up spacing, using poedit on it to update the strings from the latest sourcecode and maybe fixing up anything the automatic update got wrong, generating the .mo file. Edit their e-mail address out of the header, put their forum name instead. Need to know how to use SVN. Attach the .po file back to the person so if they make any more changes they can go from the edited version. Would make more sense for a non-developer since you don't need any development skills for this.
Gavin: Is there a DoS attack on the network happening now? I'll take a look a the logs.
It could be someone's server farm all starting at once.
There have been some issues with garbage addr messages in previous versions. Not saying that's the problem now, just want to make you aware.
In 0.1.5 there was a bug where a socket could get closed twice, which (maybe only on linux) could end up closing another random socket that could get reopened by IRC. If that node was in the middle of receiving an addr message, IRC content could be converted into addr messages.
0.3.0 ignores addr messages from 0.1.5, but a 0.2.0 node could relay it. I don't think there are any 0.1.5 nodes left anymore though.
In 0.2.9, I added a checksum to the message headers so no unintended messages can get into the system. The new verack message is part of the version negotiation used to switch to the new header. I'm embarrassed that I didn't do this originally, but I thought TCP already does that.
I have seen addr messages that are made of other addr messages shifted by 3 bytes. I added some filtering in 0.2.9 for that in net.h. The comment there explains how a 3-byte shift might happen if just the right bytes are garbled.
Garbage addr messages always have something else in the pchReserved field, so no nodes actually try to connect to the garbage addresses.
These problems should improve as more 0.2.0 nodes upgrade.
0.2.0 obsoletes on 20 Feb 2012. 0.3.0 nodes will require the checksum header on that date and refuse to talk to 0.2.0 nodes.
I looked at the logs. It looks like it's just heavy addr traffic. I only saw a few garbage addresses, it's mostly well formed addresses.
There's much too much addr traffic though. I'm making adjustments to quiet it down.
I added some code in 0.3.0 to limit the amount of addr messages, but the limits were pretty loose. I'm limiting it down much more in 0.3.2. In 0.3.0, it only sent to 10 other nodes, but those 10 nodes changed every hour, so you could have the same addr going around every hour. In 0.3.2 I'm lowering it to 4 nodes and every 12 hours.
I suspect the reason e-mails from bitcoin.org such as the validation e-mail from the wiki are getting spamblocked is because we didn't have e-mail validation turned on for the forum, so maybe spammers used the forum to set their e-mail to people they wanted to send spam to and then PM themselves so it would e-mail there. The only way to really know would be to look at the mail server logs and see if there's a large volume and what it is.
I turned on e-mail validation of new accounts on the forum, but now people can't sign up because the validation e-mail gets spamblocked. Someone said gmail is one case.
So here we are, nobody new can sign up to the forum.
It would help if we could turn off the forum's notification e-mail features. I tried to disable what I could, but it only had settings for forum thread notifications. Can someone tell me if PM notifications are still active or any e-mail notification anywhere else on the forum.
Maybe we should disable the forum's access to the e-mail server entirely, then turn off registration e-mail until we work this out further. I don't know where that setting is in the SMF interface.
Gavin: I've unstickied the "Post your Static IP" thread Good, it really isn't needed anymore. The old IP's listed aren't known to have -allowreceivebyip so they're not much use, and we're downplaying the send-by-IP option anyway. Laszlo's IRC allows TOR users, and also they can get seeded with the seed nodes, so it's not needed for that anymore either.
grondilu deleted the whole "What will governments do against Bitcoin?" thread, which had diverged more into a philosophical debate about politics.
I removed the "Remove own topics" permission for regular users. I didn't know they could do that. It would be OK if it only deleted if it only has your own posts in it, like if you accidentally posted in the wrong place.
At the same time, I enabled "Move own topic".
|
|
|
https://bitcointalk.org/index.php?topic=37743.0A long time ago I did a quick survey of Satoshi's posts just for fun and found that he seemed to be posting with a US time zone. Here is the graph (X axis are hours, Y axis is posts, times are GMT): And the data itself: [[0,32],[1,23],[2,15],[3,10],[4,9],[5,3],[6,3],[7,0],[8,0],[9,1],[10,0],[11,0],[12,3],[13,5],[14,14],[15,18],[16,46],[17,65],[18,65],[19,43],[20,42],[21,55],[22,46],[23,42]] As you can see the night dip is between 6-11am GMT, so assuming this person sleeps at night, he should live in GMT-5 to GMT-7 somewhere which is the Americas. Anyway, this was just a quick fun thing I did way back when. The reason I'm posting it now is that somebody dug up my IRC logs where I promised that I'd post it on the forums. Stefan Thomas did a symilar experiment in 2011 and concluded that if Satoshi Nakamoto is a single individual with conventional sleeping habits, it suggests he resided in a region using the UTC−05:00 or UTC−06:00 time offset. This includes the parts of North America that fall within the Eastern Time Zone and Central Time Zone, as well as parts of Central America, the Caribbean and South America. It is a large and populated area. It also gives some credibility to the theory that Hal Finney was Satoshi. I've just been researching Satoshi and stumbled onto your post. Satoshi was also a very careful person that was very concerned about privacy so he may have deliberately posted between certain times or if he was from Japan it wouldn't have been unusual for him to be working throughout the weekends. The times he didn't post could also indicate he was working at that time. Perhaps as a University lecturer. After his first post, in which he used American spelling, he switched to English spelling for all the rest. I think you proved Theymos rarely sleeps. Let suppose these two things
- He was human, not a bot not an alien
Are you sure ? Who is Satoshi Nakamoto ? Suspects, frauds and conspiracies.
|
|
|
I often try to find out about Satoshi Nakamoto but no one can understand him who. Even on Wikipedia, there is no Satoshi Nakamoto biodata. I am confused, he is very good at hiding his true identity. What is clear is that he is the man who created the Bitcoin with sophisticated technology. Whatever he thinks, why he did not take the opportunity to be famous for having created Bitcoin that has been known by people around the world.
I've just answered that in this thread Who is Satoshi Nakamoto ? Suspects, frauds and conspiracies.
|
|
|
Who is Satoshi Nakamoto ?Satoshi Nakamoto is a talented cipher and coder. Wrote the whitepaper on bitcoin "Bitcoin: A Peer-to-Peer Electronic Cash System" and published it on the cypherpunks mailing list in October 2008 Developed the code for bitcoin and founded https://bitcointalk.org He used an e-mail address and a web site that is untraceable. In 2009 and 2010, he wrote hundreds of posts in flawless English. He invited other software developers to help him improve the code, and corresponded with them, He never revealed any personal details. Stefan Thomas, a Swiss coder and active community member, graphed the time stamps for each of Nakamoto's bitcoin forum posts and found: He made almost no posts between the hours of 5 a.m. and 11 a.m. Greenwich Mean Time. In April, 2011, he sent a note to a developer saying that he had “moved on to other things.” He has not been heard from since.
His birthday is said to be on April 5, 1975 according to this post. (But it is likely that he didn't select his real birth-date)
His writing is clean, with few typos. He shows a high proficiency in English. Making very few mistakes. After his first post, in which he used American spelling, he switched to English spelling for all the rest. From: "Satoshi Nakamoto" < satoshi@anonymousspeech.com> Sent: Friday, August 22, 2008 4:38 PM To: "Wei Dai" < weidai@ibiblio.org> Cc: "Satoshi Nakamoto" < satoshi@anonymousspeech.com> Subject: Citation of your b-money page I was very interested to read your b-money page. I'm getting ready to release a paper that expands on your ideas into a complete working system. Adam Back (hashcash.org) noticed the similarities and pointed me to your site. I need to find out the year of publication of your b-money page for the citation in my paper. It'll look like: [1] W. Dai, "b-money," http://www.weidai.com/bmoney.txt, (2006?). You can download a pre-release draft at http://www.upload.ae/file/6157/ecash-pdf.html Feel free to forward it to anyone else you think would be interested. Title: Electronic Cash Without a Trusted Third Party Abstract: A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without the burdens of going through a financial institution. Digital signatures offer part of the solution, but the main benefits are lost if a trusted party is still required to prevent double-spending. We propose a solution to the double-spending problem using a peer-to-peer network. The network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof-of-work. The longest chain not only serves as proof of the sequence of events witnessed, but proof that it came from the largest pool of CPU power. As long as honest nodes control the most CPU power on the network, they can generate the longest chain and outpace any attackers. The network itself requires minimal structure. Messages are broadcasted on a best effort basis, and nodes can leave and rejoin the network at will, accepting the longest proof-of-work chain as proof of what happened while they were gone. Satoshi Was Satoshi a good coder ? It was pretty good: I'd give it a grade of B+. The worst problem was that there were only a few, huge files, but if you ignored that then it made a lot of sense. It was written in (then-)modern C++, clearly with a lot of care. It was clearly not written in a stream-of-consciousness manner. There were very few bugs that you could blame on lack of programming skill.
My personal suspicion in this area is that Satoshi was never (or not recently) a full-time programmer, but he was pretty familiar with computer science (maybe a student or academic?), and he'd read some comprehensive C++ book just before starting on Bitcoin, so he made full and correct usage of C++ features in a slightly messy way.
Someone hacked Satoshis email account to try and discover who he is: https://bitcointalk.org/index.php?topic=2062951.0There are websites dedicated to preserving the writings of Satoshi Nakamoto: https://satoshi.nakamotoinstitute.org/http://satoshinakamoto.me/The Dai / Nakamoto Emails: https://www.gwern.net/docs/bitcoin/2008-nakamotoSatoshi Nakamoto translated (meaning) https://steemit.com/bitcoin/@decentro/satoshi-nakamoto-a-comprehensive-translation-of-an-enigmahttps://bitcointalk.org/index.php?topic=399281.msg4336076#msg4336076Lots of people have been suspected of being Satoshi:People who corresponded with him have all been named as suspects: Hal Finney, Martti Malmi, Adam Back, Michael Marquardt, Gavin Andresen and Wei Dai. But in doing so are we minimising those individuals own contribution to Bitcoin. They may not be the founder but they are the apostles.
Bitcoin is a collaboration of efforts based on a combination of ideas all consolidated in this whitepaper It was then executed by a group of individuals, both identified and anonymous.
Many threads with some compelling arguments have been made about it. I'm not going to duplicate the theories but have instead provided the links to various theories on here:People or organisations that have been suspected of being Satoshi: Charles Bry, David Chaum, Neal J. King, Shinichi Mochizuki, John Nash, Tatsuaki Okamoto, Vladimir Oksman, Gavin Andresen, Andreas Antonopoulos, Peter Bachman, John Perry Barlow, Doug Barnes, Michel Bauwens, BCNext, Tim Berners-Lee, Jim Bell, Kay Bell, Tamas Blummer, Nicholas Bohm, S. Boxx, Stefan Brands, Eli Brandt, Greg Broiles, Patrick Byrne, Jan Camenisch, Arthur Chandler, Jim Choate, Igor Chudov, Bram Cohen, Nick Collision, Matt Corallo, Geoff Dale, Luke Dashjr, L.Detweiler, Whitfield Diffie, Ray Dillinger, Jamie Dinkelacker, James A. Donald, Dooglus, Barry Downey, Evan Duffield, Vincent Durham, Tony Eng, Dan Fabulich, Niels Ferguson, Paul Ferguson, Amos Fiat, Art Forz, Matthew Franklin, Patri Friedman, Curtis D. Frye, Tony Gallippi, Jeff Garzik, Matthew Gaylor, John Gilmore, David Gordon, James Orlin Grabbe, Ron Gross, Ashish Gulhati, Laszlo Hanyecz, Martin Hellman, Michael Hendrix, Eyal Hertzog, Robert A. Hettinga, Eric Hughes, Mike Ingle, David Irvine, Douglas Jackson, Victor K., Jeff Kane, Mark Karpeles, Sunny King, Steve Klingsporn, Con Kolivas, Dave Krieger, Nick Lambert, Matthew B. Landry, Laurie Law, Charles/Charlie Lee, Vili Lehdonvirta, Hendrik Lenstra, Romana Machado, Michael Marquardt, Yossi Matias, Gregory/Greg Maxwell, Timothy C. May, Jed McCaleb, Stanton McCandlish, James McCarthy, Jim McCoy, Alfred J. Menezes, Perry E. Metzger, Jude Milhon, Max More, David Naccache, Daniel A. Nagy, Dorian Prentice Satoshi Nakamoto, Moni Naor, Satoshi Obana, Kazuo Ohta, Donald O'Mahony, Jackson Palmer, Torben Pedersen, Michael Peirce, Jean-Marc Piveteau, Naval Ravikant, Ben Reeves, Ron Rivest, Meni Rosenfeld, Nikolay Rozhok, Gary Rowe, Susan Sabett, Mayank Sahu, Steve Schear, Andreas Schildbach, Nils Schneider, Berry Schoenmakers, Adi Shamir, Carol Shaw, Charlie Shrem, Barry Silbert, Jerry Solinas, Markus Stadler, Bill Stewart, Patrick Strateman, Aaron Swartz, Amir Taaki, Yael Tauman, Hitesh Tewari, Will Thomas, Peter Todd, Zhou Tong, Dustin D. Trammell, Patrick P. Tsang, Wladimir J. van der Laan, Thomas Vartanian, Roger Ver, Paul Vernon, Sebastiaan von Solms, Erik Voorhees, Michael Weber, Russell E. Whitaker, Zooko Wilcox-O’Hearn, Peter Wuille, Moti Yung, Phil Zimmerman, Haibin Zhang, Theymos, Marti Malmi , Hal Finney #1 , #2 ' Nick Szabo #1, #2, #3, Mike Hearn, Michael Clear, Dave Kleiman, Not Wright or Kleiman (good post), Craig Steven Wright #1, #2, Ross Ulbricht, Julian Assange, Wei Dai, Ben Laurie, Nick Szabo, Adam Back, Japanese mathematician Shinichi Mochizuki,#1, #2 Craig Steven Wright lawsuit by Dave Kleiman Estate https://www.scribd.com/document/372445546/Bitcoin-Lawsuit (external link) Private key for the GENESIS block hidden in these equations?IBM, DARPA, Google FBI, CIA, NSA, MI5, FSB, Mossad YOU ? Articles involving writing analysis: Bootstrapped Gavin: Satoshi Nakamoto’s identity revealed!Research on Satoshi Nakamoto identityForbes journalist, Andy Greenberg discovered that a man by the name of Dorian Nakamoto, (born Satoshi) was living only a few blocks from Hal Finney. (The man who received the first bitcoin transaction) https://bitcointalk.org/index.php?topic=769004.0 Dorian Nakamoto and Hal Finney The impact was so adverse on Dorian Nakamoto that Andreas Antonopoulos ran a fundraiser for him.Check fundraising address here: https://blockchain.info/address/1Dorian4RoXcnBv9hnQ4Y2C1an6NJ4UrjX (Given to him in March 2014) Most comprehensive list of suspects.Conspiracies: Conspiracy theories Gavin Andreson and the CIA killed Satoshi Satoshi is an AI robotFrauds: a fake Satoshi repliedanother fake Satoshi "Satoshis spokesperson" -Miss Roselyn Hamilton Craig Wright “Mr Fake”Convicted fraudster Ronald Keala Kua Maria Satoshi is writing a bookPaper: Duality: An excerptThere is a theory that the name is made up of common industrial companies. SA TOSHi NAKA MOTO Samsung Toshiba Nakamichi Motorola If Satoshi Nakamoto wanted to be known by another identity it is up to him or her to make that move. It is clear from the writing that they were deeply concerned about privacy. Here are the writings of the real Satoshi https://www.reddit.com/r/Bitcoin/comments/229qvr/happy_birthday_satoshi_nakamoto/https://bitcointalk.org/index.php?topic=775174.0The current most popular theory:Satoshi Nakamotos' current github is showing a photo of Dave Kleiman https://github.com/satoshinnakamotoMr Wright has also demonstrated this verification in person to The Economist—and not just for block 9, but block 1. Such demonstrations can be stage-managed; and information that allows us to go through the verification process independently was provided too late for us to do so fully. Still, as far as we can tell he indeed seems to be in possession of the keys, at least for block 9. This assessment is shared by two bitcoin insiders who have sat through the same demonstration: Jon Matonis, a bitcoin consultant and former director of the Bitcoin Foundation, and Gavin Andresen
https://ftalphaville.ft.com/2016/05/02/2160632/oh-my-craig-wrights-keys-of-revelation/This in combination to the claims made in the Dave Kleiman Estate lawsuit against Craig Wright makes Dave Kleiman the current most plausible suspect.Craig Wright filed a motion to dismissBut I'm still skeptical of the claim because it is reliant on Craig Wrights testimony. In my opinion he has a $54 million reason to lie.Adresses debunked: https://blog.wizsec.jp/2018/02/kleiman-v-craig-wright-bitcoins.htmlHas Craig Wright Committed Perjury? https://hackernoon.com/has-craig-wright-committed-perjury-new-information-in-the-kleiman-case-cbaaf2628e93Wright claimed AU$54 million in tax rebates for R&D in 2014/15. That is a lot of motive for a hoax. https://www.businessinsider.com.au/the-australian-who-may-have-invented-bitcoin-claimed-to-have-landed-54m-in-taxpayer-funded-rebates-2015-12Wrights own mother claims he has a habit of lying: http://archive.is/kjuLi#selection-1655.0-1655.94Craig Wrights MtGox account also is not that of a "whale" https://np.reddit.com/r/Bitcoin/comments/4hx3q9/according_to_the_mtgox_leaks_from_early_2014_our/Wright also claimed to have a PhD in computer science with Sydney's Charles Sturt University (CSU). But the university denied ever handing him a Phd. Cybersecurity firm Wizsec dismisses the Wright claims on which the Kleiman lawsuit is based as "fantasy" https://blog.wizsec.jp/2018/02/kleiman-v-craig-wright-bitcoins.htmlMy conclusion:I rather not know. I think the mystery makes it more intriguing. Some legends are better as legends. Like Merlin and Robin Hood.Further reading: https://www.newyorker.com/magazine/2011/10/10/the-crypto-currencyRe: Satoshi is Back, suggests Fortune - https://bitcointalk.org/index.php?topic=4575874.msg41411073#msg41411073Satoshis missing posts -Theymos (also quoted below) https://bitcointalk.org/index.php?topic=56272.msg669898#msg669898This is a work in progress, corrections and additions are welcome. Sources: UsernameBitcoin, AGD, BitcoinFX
|
|
|
Two publications brought electronic encryption into the public domain. (EDITED) (The application of cryptography to computer data.) The US government publication of the Data Encryption Standard and Dr Whitfield Diffie and Dr Martin Hellmans public-key cryptography, "New Directions in Cryptography"Prior to this electronic encryption was developed mainly by the military - in secret. A lot of millitary research and early computer development revolved around the coding and code-breaking of war messages. i.e. Arthur Scherbius' Enigma electro-mechanical rotor cipher machines and Alan Turing who worked at the Government Code and Cypher School (GC&CS) at Bletchley Park, (Britain's codebreaking centre) who created the "Turing machine" (A mathematical model of computation). In the 1980s, Dr David Chaum wrote extensively on topics such as anonymous digital cash and pseudonymous reputation systems, which he described in his paper "Security without Identification: Transaction Systems to Make Big Brother Obsolete".In late 1992, Eric Hughes, Timothy C May, and John Gilmore founded a small group. At one of the first meetings, Jude Milhon (a hacker and author better known by her pseudonym St. Jude) described the group as the “Cypherpunks”. The Cypherpunks mailing list was formed at about the same time, and just a few months later, Eric Hughes published "A Cypherpunk's Manifesto". "Privacy is necessary for an open society in the electronic age. Privacy is not secrecy. A private matter is something one doesn't want the whole world to know, but a secret matter is something one doesn't want anybody to know. Privacy is the power to selectively reveal oneself to the world."
The Cypherpunks mailing list was started in 1992, and by 1994 had 700 subscribers Some notable Cypherpunks and their achievements: Jacob Appelbaum: Tor developer Julian Assange: Founder of WikiLeaks Dr Adam Back: Inventor of Hashcash, co-founder of Blockstream Wei Dai : creator of B-money Bram Cohen: Creator of BitTorrent Philip Zimmermann: Creator of PGP 1.0 Hal Finney: Main author of PGP 2.0, creator of Reusable Proof of Work Tim Hudson: Co-author of SSLeay, the precursor to OpenSSL Paul Kocher: Co-author of SSL 3.0 Moxie Marlinspike: Founder of Open Whisper Systems (developer of Signal) Steven Schear: Creator of the concept of the "warrant canary" Bruce Schneier: Well-known security author Zooko Wilcox-O'Hearn: DigiCash developer, Founder of Zcash Dr Pieter Wuille: authored BIP32, hierarchical deterministic (HD) wallets, which makes it much simpler for bitcoin wallets to manage addresses. Peter Todd: Stealth Addresses Justus Ranvier: BIP47 Justin Newton: BIP75 Out of Band Address Exchange Gregory Maxwell: CoinJoin CoinSwap Chris Belcher: JoinMarket
In 1997, Dr Adam Back created Hashcash, which was designed as an anti-spam mechanism that would add time and computational cost to sending email, thus making spam uneconomical. Later in 1998, Wei Dai published a proposal for "b-money", a practical way to enforce contractual agreements between anonymous parties. In 2004, Hal Finney created reusable proof of work (RPOW), which built on Back's Hashcash. Bitcoin uses the Hashcash “proof of work (POW)” concept while quite a few other cryptocurrencies have implemented a variant known as "proof of stake" (POS). Nick Szabo published a proposal for "bit gold" in 2005 – a digital collectible that built upon Finney's RPOW proposal. Finally, in 2008, Satoshi Nakamoto, a pseudonym for a still-unidentified individual or individuals, published the bitcoin whitepaper, citing both hashcash and b-money. Satoshi emailed Wei Dai directly and mentioned that he learned about b-money from Dr Back. Cypherpunks are pro open-source Cypherpunks Anti-License (CPL) The CPL is written from a mindset which derides the very concept of Intellectual Property restrictions as being incompatible with a free society. Sources: https://www.cryptocompare.com/coins/guides/who-are-the-cypherpunks/https://medium.com/swlh/the-untold-history-of-bitcoin-enter-the-cypherpunks-f764dee962a1https://en.wikipedia.org/wiki/Cypherpunkhttps://blockonomi.com/cryptography-cypherpunks/https://itsblockchain.com/cypherpunk/https://www.coindesk.com/the-rise-of-the-cypherpunks/Further reading: http://projects.csmonitor.com/cypherpunkThis is a work in progress - I intend to edit it to include more links and information. Corrections, additions and comments are welcomed. Contributions: paxmao amishmanish
|
|
|
#
I also have the similar thread like this, but yours is much wider, it was interesting to read some new information to me Привет. Yes- someone pointed out your thread Legendary profiles of bitcointalk. to me after I made this one Your post features and details particular people while my post is more like a treasure hunt through bitcointalk history. There are certainly some interesting characters on here. My inspiration for the post came from bitcoin pizza day (22 May) Great post! I’ve been reading most posts. It is a pity that most early bitcointalkers are not active any more or they still log in but not write. It might be because they are dead, millionaire or fed up with spam; or maybe a combination of the three. But it would be very interesting to know what is going on with their lives, if they are still alive.
It would definitely be interesting to find out what happened to some of the early pioneers. I noticed that a lot of the early posts were discussions about coding and technical aspects. I imagine that these sort of discussions are still taking place but in a much less public setting. Some of the early pioneers that I have spoken to have security concerns about being publicly identifiable and get more messages than they can cope with. It would be great to chat with some of the early pioneers "off the record". It is great work, how much did it take you to gather all of the information? I am rather new to crypto, not much epic events to remember, now I can study some history It took me about a day to sort through the events and find the relevant posts. I was reading about bitcoin pizza day and looked for it on bitcointalk. Then I started looking for more historic events and it struck me just how much history is on here. I'm only getting started on this post. This is the most enjoyable thing I've done on bitcointalk. EDIT: I've been working on this for days now. There is so much cool info. So many bitcoins stolen in the early hacks.I wonder how many were "cashed out" and how many are still "dormant". I found it interesting to see Mark Karpeles was providing the hosting for Bitcointalk. I'm looking for when the hosting changed after the MtGox collapse.
|
|
|
Thanks for this. I always wanted to do this myself. There is a wealth of knowledge and inspiration in the archives. I'd highly recommend adding the "Bitcoin and me" post by Hal Finney. I'll be sure to go through these. These posts should be mandatory reading for all the new people arriving at the forum.
Thank you for that. That post definitely belongs on the list ! I've highlighted that post in red. Being an icon for being the first bitcoin recipient and contributor to the bitcoin protocol is increased by the knowledge that it was written using an eye-tracker while he was paralyzed from ALS. Take Responsibility, Build Things, Be Kind & Share - is a great motto. I've put the Cryptsy post on the timeline and included the other two in the additional information section. Doing some of the research made me realize just how much we are surrounded by legends on this forum. Not just the ones that were phenomenally successful but also some that tried and failed with catastrophic results. Then there are those that scammed at the expense of others.
|
|
|
It would have been nice to get this attention in any other context. WikiLeaks has kicked the hornet's nest, and the swarm is headed towards us.
Sorry for bumping this old thread. I find this post of satoshi very intriguing. It is one of the few posts of him that is not about coding. If i interpreter this right we could say that we could throw away all the theories about bitcoin being secretly launched by some government. What are your thoughts? edit: And indeed that he got scared because of this and backed off. I think your interpretation is spot on. In retrospect, Satoshi seems to have predicted something (even collectors) to start the increase of value. And he was obviously politically privacy-inclined. But my guess is the speed with which WikiLeaks seems to have discovered Bitcoin startled him. The problem with Wikileaks is that it draws the attention from the NSA and other organisations very keen to follow the trail of funding. Privacy and anonymity is not 100% guaranteed and the increased surveillance is what made him disappear. I don't think he was in it for the $. https://words.democracy.earth/follow-the-bitcoin-wikileaks-f2218dece347It had the unfortunate effect of politicizing bitcoin. It may have led to more public exposure but also carried risks. In July 2015, Wikileaks wallet was the target of what in Bitcoin lingo is called a “flood attack” or “dust attack”. The amount of dust for this huge attack was worth 30 BTC (or U$D 8,000 at the time). It demonstrates the extend of what some people are prepared to do.
|
|
|
|