BCEmporium
Legendary
Offline
Activity: 1218
Merit: 1000
|
|
December 09, 2015, 11:20:56 PM |
|
|
|
|
|
Gleb Gamow
In memoriam
VIP
Legendary
Offline
Activity: 1428
Merit: 1145
|
|
December 09, 2015, 11:22:28 PM |
|
Well, we might as well add plagiarism to Craig Wright's list of accomplishments: http://attrition.org/errata/plagiarism/it_regulatory_standards_compliance_handbook.htmlSnippet: Craig S. Wright - "The IT Regulatory and Standards Compliance Handbook" Contains Plagiarism Sat Jan 7 19:25:05 CST 2012
[Update: Beginning on January 8, 2012, Craig Wright wrote an original rebuttal, a second follow-up a day after, and a third follow-up with additional information (We take some issue with the third, but will not get into it here). In it, he says that he did not properly cite some sources, but also gives additional details saying that some of the material was originally written by him, or as part of a group he was in. Mr. Wright indicates that some of this material, in its original form, is not available on Google, so we cannot verify it. It should be noted that Mr. Wright has spent a considerable amount of time researching each of the points outlined in this article, and determining what happened. This includes posting a sincere apology to the XSS FAQ author after mixing up who to obtain permission from. Many of the points Mr. Wright offers rebuttal to seem valid, that he was likely one of several contributors to work that eventually got used and re-used, and ultimately ended up in his book as well. We leave it up to the readers to determine the culpability of Mr. Wright in all of this.]
|
|
|
|
countryfree
Legendary
Offline
Activity: 3066
Merit: 1047
Your country may be your worst enemy
|
|
December 09, 2015, 11:51:46 PM |
|
If this man is the real Satoshi, it should be easy to prove: he must own the key to the wallet which holds a million BTC. I don't understand that story about a trust which prevents him from cashing them. If he's the inventor, he must have the key to this wallet, and he just need to make one little transaction (eventually to another wallet he owns) to get everyone convinced.
|
I used to be a citizen and a taxpayer. Those days are long gone.
|
|
|
Gleb Gamow
In memoriam
VIP
Legendary
Offline
Activity: 1428
Merit: 1145
|
|
December 10, 2015, 12:00:35 AM |
|
https://www.csu.edu.au/anrl/peoplehttps://who.is/whois/information-defense.com/Name PDR LTD. D/B/A PUBLICDOMAINREGISTRY.COM Whois Server whois.PublicDomainRegistry.com Referral URL http://www.PublicDomainRegistry.com Status ok http://www.icann.org/epp#ok Important Dates Expires On January 23, 2019 Registered On January 23, 2009 Updated On February 16, 2015 Name Servers ns1.whois.com 162.251.82.123 ns2.whois.com 162.251.82.248 ns3.whois.com 162.251.82.118 ns4.whois.com 162.251.82.252 Raw Registrar Data Domain Name: INFORMATION-DEFENSE.COM Registry Domain ID: 1538797474_DOMAIN_COM-VRSN Registrar WHOIS Server: whois.publicdomainregistry.com Registrar URL: www.publicdomainregistry.com Updated Date: Creation Date: 2009-01-23T00:31:03Z Registrar Registration Expiration Date: 2019-01-23T00:31:03Z Registrar: PDR Ltd. d/b/a PublicDomainRegistry.com Registrar IANA ID: 303 Domain Status: OK https://icann.org/epp#OK Registry Registrant ID: Registrant Name: C Wright Registrant Organization: C01N Registrant Street: 502/ 32 Delhi Rd North Ryde Registrant City: Sydney Registrant State/Province: Registrant Postal Code: 2113 Registrant Country: AU Registrant Phone: +02.0417683914 Registrant Phone Ext: Registrant Fax: Registrant Fax Ext: Registrant Email: Email Masking Image@hotwirepe.com Registry Admin ID: Admin Name: C Wright Admin Organization: C01N Admin Street: 502/ 32 Delhi Rd North Ryde Admin City: Sydney Admin State/Province: Admin Postal Code: 2113 Admin Country: AU Admin Phone: +02.0417683914 Admin Phone Ext: Admin Fax: Admin Fax Ext: Admin Email: Email Masking Image@hotwirepe.com Registry Tech ID: Tech Name: C Wright Tech Organization: C01N Tech Street: 502/ 32 Delhi Rd North Ryde Tech City: Sydney Tech State/Province: Tech Postal Code: 2113 Tech Country: AU Tech Phone: +02.0417683914 Tech Phone Ext: Tech Fax: Tech Fax Ext: Tech Email: Email Masking Image@hotwirepe.com Name Server: ns1.whois.com Name Server: ns2.whois.com Name Server: ns3.whois.com Name Server: ns4.whois.com DNSSEC:Unsigned Registrar Abuse Contact Email: Email Masking Image@publicdomainregistry.com Registrar Abuse Contact Phone: +1-2013775952 URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/ >>>Last update of WHOIS database: 2015-09-08T02:54:59+0000Z<<< For more information on Whois status codes, please visit https://icann.org/epp
Registration Service Provided By: WHOIS.COM
Information Updated: Tue, 8 Sep 2015 02:55:01 UTC http://web.archive.org/web/20131001000000*/http://INFORMATION-DEFENCE.COMredirects to: http://web.archive.org/web/20140104224830/http://idef.ca/http://web.archive.org/web/20110225151016/http://idef.ca/carl-anctil/Carl Anctil, GSEC CD Analyst & Owner
Carl joined the Canadian Forces as an infantry soldier. During the first five years of his military career, he served in various positions in the 2nd Battalion Princess Patricia’s Canadian Light Infantry.
In 1999 he changed element from army to air force. He attended the Canadian Forces School of Communications and Electronics in Kingston. He completed Performance Oriented Electronics Training and obtained his Aerospace, Telecommunications & Information Systems technician qualifications.
Upon graduation as an ATIS technician, he was posted to 3 Wing Bagotville to assumed radar and navaids responsibilities. In 2003, he was part of a team to implement a nation wide military automated air traffic system formally named MAATS. Carl has demonstrated the ability to quickly learn and effectively adapt to new environments in diverse technology areas.
Carl has been serving in the Canadian Forces for 17 years. He proudly holds several military awards for peacekeeping and peacemaking deployments. In addition, he has earned the Canadian Forces Decoration which is awarded after completing 12 years of dedicated service.
Carl was initiated to network security several years ago while he was employed as a Banyan Vines system administrator. Since that time, he has been involved in the information security scene as a hobbyist. As he researched and gained more understanding about computer and network security, he realized how much he truly enjoy information security.
As a result, in 2009, he decided to turn his passion for information security into a career. Carl has attained the GIAC - GSEC certification. Carl is a member with the local ISSA Ottawa Chapter. Further, he has recently successfully completed SANS training in Computer Forensics.
Carl is planning his retirement from the Canadian Forces to transform his passion into a second career as a information security professional. Carl can be reached at carlanctil (at) idef (dot) ca. https://twitter.com/canctil
|
|
|
|
mrdavis
|
|
December 10, 2015, 12:04:34 AM |
|
Indeed... that's weird how an IT security and forensics expert got doxxed by "leaked emails"... Eh, even Hackingteam got hacked and all of their emails are on Wikileaks now. Which is why we have Wright asking them about a $20k SQL injection tool https://wikileaks.org/hackingteam/emails/?q=cwright
|
|
|
|
TERA
|
|
December 10, 2015, 12:10:37 AM |
|
No. (Re topic)
|
|
|
|
|
Gleb Gamow
In memoriam
VIP
Legendary
Offline
Activity: 1428
Merit: 1145
|
|
December 10, 2015, 12:11:13 AM |
|
http://marc.info/?l=security-basics&m=114408728823821&w=1Craig -----Original Message----- From: Craig Wright Sent: Sat 1/04/2006 7:45 AM To: Ansgar -59cobalt- Wiechers; security-basics@securityfocus.com Cc: Subject: How DNS works
Hello,
To alleviate some ignorance regarding the DNS process and public servers.
1 DNS
DNS Servers are public if they are a part of the public domain hierarchy. \ This is NOT that they are on the Internet. This is NOT if anyone can \ connect to port 53 and use them.
DNS Servers are public if and ONLY if they have become an authorised part \ of the DNS infrastructure.
This is a contractual agreement. To connect a DNS Server to the hierarchy \ it needs to serve a domain. To do this the higher level domain server and \ your domain system have an agreement – a contract (and please contracts are \ not required to be written) which exists with implied rights and restraints \ as dictated by the Internet community and the standards associated with use \ and the various domain bodies.
How this works;
Say I want to register satoshi.com
I have to go to a register and apply to register the domain (in this case \ with a .com authority). There are terms in the contract which is formed.
Thus the name servers which are listed in the application and thus in the \ DNS hierarchy are public.
If I stick a server -ex satoshi.private
On the internet for the use of the Internal network, than this is PRIVATE. \ If it is secure of not has NO relevance to the status of being public or \ private – this is a separate issue.
|
|
|
|
countryfree
Legendary
Offline
Activity: 3066
Merit: 1047
Your country may be your worst enemy
|
|
December 10, 2015, 12:17:09 AM |
|
Hey, couldn't Gavin Andresen confirm? Didn't he say once, that he knew who Satoshi was? I'm not sure, and I can't find a link but I think I read an article where he said he had met or talked with Satoshi once.
Anyway, if not him, some one else must be able to confirm.
|
I used to be a citizen and a taxpayer. Those days are long gone.
|
|
|
Gleb Gamow
In memoriam
VIP
Legendary
Offline
Activity: 1428
Merit: 1145
|
|
December 10, 2015, 12:19:52 AM |
|
Grandpa Satoshi is 94 years old. 32 SWAT officers armed to the gills to raid his home in 5..... 4.... 3...
|
|
|
|
glon
|
|
December 10, 2015, 12:24:36 AM |
|
http://marc.info/?l=security-basics&m=114408728823821&w=1Craig -----Original Message----- From: Craig Wright Sent: Sat 1/04/2006 7:45 AM To: Ansgar -59cobalt- Wiechers; security-basics@securityfocus.com Cc: Subject: How DNS works
Hello,
To alleviate some ignorance regarding the DNS process and public servers.
1 DNS
DNS Servers are public if they are a part of the public domain hierarchy. \ This is NOT that they are on the Internet. This is NOT if anyone can \ connect to port 53 and use them.
DNS Servers are public if and ONLY if they have become an authorised part \ of the DNS infrastructure.
This is a contractual agreement. To connect a DNS Server to the hierarchy \ it needs to serve a domain. To do this the higher level domain server and \ your domain system have an agreement – a contract (and please contracts are \ not required to be written) which exists with implied rights and restraints \ as dictated by the Internet community and the standards associated with use \ and the various domain bodies.
How this works;
Say I want to register satoshi.com
I have to go to a register and apply to register the domain (in this case \ with a .com authority). There are terms in the contract which is formed.
Thus the name servers which are listed in the application and thus in the \ DNS hierarchy are public.
If I stick a server -ex satoshi.private
On the internet for the use of the Internal network, than this is PRIVATE. \ If it is secure of not has NO relevance to the status of being public or \ private – this is a separate issue. What are you quoting dude? The linked email doesn't have the domain example "satoshi", but "ignorant".
|
|
|
|
Trading
Legendary
Offline
Activity: 1455
Merit: 1033
Nothing like healthy scepticism and hard evidence
|
|
December 10, 2015, 12:26:13 AM Last edit: December 10, 2015, 12:48:29 AM by Trading |
|
Satoshi has always kept his identity private at all costs, even to people he worked with on bitcoin's code. Would he post on his blog, with his real name, that he was the creator of bitcoin?
And a public post about such a controversial issue, posted 6 years ago, didn't attract any attention for this long? No one read his blog? Edited post...
Satoshi made it clear that he wasn't interested in working any longer on bitcoin. He wouldn't talk on a bitcoin conference. That would attract too much attention. And he wouldn't keep mining bitcoin.
Furthermore, as other posted, there are problems with the PGP key.
Maybe this guy is an old bitcoiner or maybe he is faking even this. But I would be very surprised if he was Satoshi.
Clearly, those reporters from Wired are much more careful and intelligent than previous so-called discoverers of the real Satoshi (you are looking for a mastermind of disguise, so, where do you find him? Of course, on the yellow pages, using his real name!), they too are very suspicious.
I could write "Next"! Or write about the probable candidate. But I won't. Respect Satoshi privacy. Leave him alone. We owe him this and much more than this.
|
|
|
|
BCEmporium
Legendary
Offline
Activity: 1218
Merit: 1000
|
|
December 10, 2015, 12:28:06 AM |
|
He replaced ignorant with satoshi. Still his basic explain on how DNS works seams pretty lame for someone with his said curriculum.
|
|
|
|
owlcatz
Legendary
Offline
Activity: 3780
Merit: 1974
|
|
December 10, 2015, 12:33:53 AM |
|
He replaced ignorant with satoshi. Still his basic explain on how DNS works seams pretty lame for someone with his said curriculum.
As someone familiar with academia, this is quite normal. I've seen many people with 10+ "Book-smart" type certs, - CISSP/MSCE/SANS/GIAC etc etc etc,.. then you work with them and you realize they are book-brilliant, but have zero real-life experience (usually, I should add, as there are exceptions there).
|
. I C Λ R U S | | | | █████▄▄█████▄▄ ████████▀▀▀████ ██████▀█████▀███ ████████████████ ████████████████ ████████████████ ░▄█████████████████ ███████████████████ ███████████████████ ████████░░░▀▀▀▀▀▀▀▀ ████████▄▄▄████████ ███████████████████ █████████████████▀ | ░░░███ ▄▄▄███ ██████ ░░░███ ░░░███ ░░░███ ░░░███ ░░░███ ░░░███ ░░░███ ▄████████ ███▌░▐███ ████████▀ | | | | | █████████████████████ █████████████████████ █████████████████████ ██████▀▀▀▀████▀▀█████ █████░░▄▄░░██░░░█████ █████▄▄██░░███░░█████ █████▀▀▀▀░░▀██░░█████ ████░░░░▄▄▄▄█▀░░▀████ ████░░░░░░░░█░▀▀░████ █████████████████████ █████████████████████ █████████████████████ █████████████████████ | ████ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ████ | ████ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ████ | ████ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ████ | | | | ████ ██
██ ████ | | ████ ██
██ ████ |
[/ce
|
|
|
SirArthur
Member
Offline
Activity: 183
Merit: 43
|
|
December 10, 2015, 12:39:05 AM |
|
Nothing to see here, move along. Bottom line, that guy isn't Satoshi and his story makes no sense.
|
|
|
|
chek2fire
Legendary
Offline
Activity: 3416
Merit: 1142
Intergalactic Conciliator
|
|
December 10, 2015, 12:41:40 AM |
|
|
|
|
|
johnyj
Legendary
Offline
Activity: 1988
Merit: 1012
Beyond Imagination
|
|
December 10, 2015, 12:43:49 AM |
|
At this stage, technically it does not really matter who is Satoshi, similar to it does not matter who invented nuclear weapon. But those 1 million coins that possibly Satoshi is still holding obviously attract lots of people, thus the raid In future, anyone who have more than 1 bitcoin need to hire a bodyguard
|
|
|
|
Gleb Gamow
In memoriam
VIP
Legendary
Offline
Activity: 1428
Merit: 1145
|
|
December 10, 2015, 12:58:55 AM |
|
http://marc.info/?l=security-basics&m=114408728823821&w=1Craig -----Original Message----- From: Craig Wright Sent: Sat 1/04/2006 7:45 AM To: Ansgar -59cobalt- Wiechers; security-basics@securityfocus.com Cc: Subject: How DNS works
Hello,
To alleviate some ignorance regarding the DNS process and public servers.
1 DNS
DNS Servers are public if they are a part of the public domain hierarchy. \ This is NOT that they are on the Internet. This is NOT if anyone can \ connect to port 53 and use them.
DNS Servers are public if and ONLY if they have become an authorised part \ of the DNS infrastructure.
This is a contractual agreement. To connect a DNS Server to the hierarchy \ it needs to serve a domain. To do this the higher level domain server and \ your domain system have an agreement – a contract (and please contracts are \ not required to be written) which exists with implied rights and restraints \ as dictated by the Internet community and the standards associated with use \ and the various domain bodies.
How this works;
Say I want to register satoshi.com
I have to go to a register and apply to register the domain (in this case \ with a .com authority). There are terms in the contract which is formed.
Thus the name servers which are listed in the application and thus in the \ DNS hierarchy are public.
If I stick a server -ex satoshi.private
On the internet for the use of the Internal network, than this is PRIVATE. \ If it is secure of not has NO relevance to the status of being public or \ private – this is a separate issue. What are you quoting dude? The linked email doesn't have the domain example "satoshi", but "ignorant". That damn Carl Wright is rewriting history again, or:
|
|
|
|
keepdoing
|
|
December 10, 2015, 01:00:56 AM |
|
The dude is a vaporware conman taking money from investors and running dozens of fake companies, he's been masquerading as SN for years, how could you people fall for this crap?
And yet you still cannot list the victims, point to any prior actual scams, and in contradiction it can be proved he operates a supercomputer (definitely the area of expertise for the average scam artist - probably just a hobby side job) and has access to millions of dollars.
|
|
|
|
Spoetnik
Legendary
Offline
Activity: 1540
Merit: 1011
FUD Philanthropist™
|
|
December 10, 2015, 01:12:16 AM |
|
I'm glad you're on the case Bruno. You seem to have a talent for digging stuff up. I've lost track - Klieman's the dead dude, right? The holder of the trust? Did I see elsewhere he's an ex-cop with a background hacking investigations? Take a look at this from 2008: http://www.vidarholen.net/~vidar/overwriting_hard_drive_data.pdfIt's possible that Craig Wright did some legit work with Dave Kleiman back in the day unrelated to Bitcoin, then Craig developed some scheme in his Serial Uni mind to take advantage of Dave's demise, i.e., making it look like Dave was Satoshi since he's no longer around to deny it, thinking it prudent to not claim he and Hal Finney were Team Satoshi just in case the Popsicle came back to life, exiting his cryo chamber earlier than expected. That was what i was thinking too. And that 2008 bit of info is bullshit. I wiped data for the Canadian govt.. 4 years before that was posted. And i had to choose what pattern / passes etc. This expert was spouting nonsense.. even a retard knows that spots on drives are flagged right from the factory. they are made flawed before they leave the factory and in time those bad blocks pop up more and more as the drive dies. When that happens it takes spare blocks from the pool and redirects to the good block instead the bad flagged one. That is how all hard drives work. Only a few years ago i threw away my old 256 mb had drives (or smaller) I had too much crap collecting dust. So his point of writing to the same spot will of course never work because the spots are different on ever drive *almost guaranteed. And the hacker man found out how to press the service buttons on his coffee maker and break it needing service ? Wow what a hacker LOL I thin k this guy has a habit of flapping his gums and tooting his horn but doesn't have the game to back it up. And in case anyone cares i used US DOD something like 3 passes back in 2004'sih and that took like 24hrs to do in DOS. Wright is an idiot.
|
FUD first & ask questions later™
|
|
|
|